
Online or onsite, instructor-led live Information System Security (ISS) training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Information System Security.
Information System Security training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Information System Security training can be carried out locally on customer premises in the Philippines or in NobleProg corporate training centers in the Philippines.
NobleProg -- Your Local Training Provider
Testimonials
Lap Qradar
Sutthikan Noisombat - Sutthikan Noisombat, NTT
Course: IBM Qradar SIEM: Beginner to Advanced
Everything - thank you
Akram Amin - Akram Ibrahim Elsheikh Amin, Injazat
Course: Certified Information System Security Professional (CISSP) CBK Review
Instructor Hany, was fantastic, very accommodating on questions and getting back to us with answers when he didn't have them at time of the question.
Levon Petrosyan - Crunchyroll
Course: Certified Information System Security Professional (CISSP) CBK Review
Instructor was well versed in the subject matter and was able to explain the content in detail.
Crunchyroll
Course: Certified Information System Security Professional (CISSP) CBK Review
Complementary knowledge
Crunchyroll
Course: Certified Information System Security Professional (CISSP) CBK Review
in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!
Andreas Rhein
Course: Certified Information System Security Professional (CISSP) CBK Review
I liked mix of theory and practical case example. Very good overview of each topic then going through slides.
Leszek Wislowski - Joanna Banaszewska, EY GLOBAL SERVICES (POLAND) SP Z O O
Course: CISSP - Certified Information Systems Security Professional
all , examples, content, detailed explanation, good manner
Aleksandra Kusiak - Joanna Banaszewska, EY GLOBAL SERVICES (POLAND) SP Z O O
Course: CISSP - Certified Information Systems Security Professional
The training was excellent, than you Ditmar.
Maria Gagliardi - EY Global Services (Poland) Sp. z o.o.
Course: CISSP - Certified Information Systems Security Professional
The overall training was beneficial and contain good topics to learn
ADNAR Group
Course: CISSP - Certified Information Systems Security Professional
See above
Sharon Woodcock - KPMG LLP
Course: CISMP - Certificate in Information Security Management Principles
Interaction between the trainer and other students. Size was about right.
Sajid Ibrahim - KPMG LLP
Course: CISMP - Certificate in Information Security Management Principles
Trainer had very good rapport with the attendees. He used practical examples and videos to better explain the more complicated/stodgy subjects. Good use of visual aids to better enable understanding for visual learners such as myself.
KPMG LLP
Course: CISMP - Certificate in Information Security Management Principles
The training was paced well and was very engaging. With some virtual training, it's very easy to 'switch off', however the content and presentation made the course enjoyable and interesting.
Victoria Orchard - KPMG LLP
Course: CISMP - Certificate in Information Security Management Principles
Trainer's vast knowledge
FUJITSU TECHNOLOGY SOLUTIONS SP. Z O.O.
Course: CISMP - Certificate in Information Security Management Principles
Examples provided
Department for Communities
Course: CISMP - Certificate in Information Security Management Principles
Depth and breadth of the course. Trainer was excellent also.
Department for Communities
Course: CISMP - Certificate in Information Security Management Principles
The delivery
Department for Communities
Course: CISMP - Certificate in Information Security Management Principles
Martin was very knowledgeable and gave really good tips; he allowed plenty of time for discussion and allowing us to ask questions. It was really well delivered, even virtually which sometimes is a difficult medium to work with.
Kewal Rai - Knowledgepool Group Ltd
Course: Introduction to ISO27001
Information System Security Subcategories in the Philippines
Information System Security Course Outlines in the Philippines
- To review of the main topics of CISSP CBK (Common Body of Knowledge).
- To prepare for a CISSP examination
- Use the knowledge gained in a practical manner beneficial to your organisation
- Protect your organisational assets using access control techniques and strengthen confidentiality and integrity controls from the world of cryptography
- Secure your network architecture and design (implement Cyber security)
- Achieve your organisational objectives such as legal & compliance, Information assurance, security and data governance
- Enhance IT services secure delivery via Security operations, architecture and design principles
- Implement business resiliency via Business Continuity Plan
- You will gain a thorough understanding of the 8 domains as prescribed by (ISC)2®.
- To pass your CISSP examination first time.
- Use the knowledge gained in a practical manner beneficial to your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
- Use the knowledge gained to benefit your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
- Understand, evaluate and adopt different approaches to managing usernames and passwords.
- Setup a single login system that works across all applications used in a telecom environment.
- Use identity technology to get a clear understanding of their customers and their needs.
- Implement an authentication system that works across different platforms (laptop, mobile, etc.).
- Understand information security at both the computer level, as well as the communications level.
- Prevent physical and digital access to private information systems.
- Prevent the modification of information that is stored, being processed, or being transmitted.
- Protect against denial of service to authorized users.
- Take the necessary measures to detect, document, and counter security threats.
- Ensure that organizational information is kept confidential.
CISA Exam Material Scope:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development and implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Type: multiple choice test
Volume: 200 questions List of the requirements that you must meet in order to be able to claim the CISA qualification:
- Pass the CISA exam. The CISA passing score is a mark of 450 or higher on the exam.
- Abide by the ISACA Code of Professional Ethics
- Promise to obey the CISA Continuing Professional Education Policy
- Gain at least 5 years of professional information systems auditing, control or security work experience.
- Comply with Information Systems Auditing Standards
There is a fee of $50 for this application. There’s also a yearly fee that you must pay to maintain this certification after you’ve been granted it. The fee is $40 per annum for ISACA members, and $75 for non-members.
- Understand the concepts and benefits of Open Data.
- Identify the different types of data.
- Understand the risks of Open Data and how to mitigate them.
- Learn how to manage Open Data risks and create a contingency plan.
- Implement Open Data risk mitigation strategies to reduce disaster risk.
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Last Updated: