Business Continuity Practitioner Training Course
This course is tailored to assist participants in building organizational resilience against various threats, ensuring that businesses can effectively respond to incidents, maintain operational continuity, and protect their interests.
This course is available as onsite live training in Taiwan or online live training.Course Outline
After Completing the course candidates should be able to demonstrate knowledge and understanding of Business
Continuity Management principles and techniques.
Key areas are:
- The function of and the need for Business Continuity Management within an organization
- The Business Continuity Management life cycle
- The main components of a Business Continuity Management programme
- The need for risk assessment within Business Continuity Management
- The options for development of a Business Continuity Management strategy
- How to prepare and develop plans for Business Continuity Management response
- The need for exercising, maintenance, and review of plans
- The need for embedding Business Continuity Management awareness within the organization
Requirements
Work experience in an IT or IT-related role
Basics of Information Security
Basics of Risk management
Open Training Courses require 5+ participants.
Business Continuity Practitioner Training Course - Booking
Business Continuity Practitioner Training Course - Enquiry
Business Continuity Practitioner - Consultancy Enquiry
Testimonials (3)
Questions, that helps me a lot to understand the characteristics of CRISC examination.
Masakazu Yoshijima - Bank of Yokohama, Ltd.
Course - CRISC - Certified in Risk and Information Systems Control
The training was excellent, than you Ditmar.
Maria Gagliardi - EY Global Services (Poland) Sp. z o.o.
Course - CISSP - Certified Information Systems Security Professional
I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.
Andreas Rhein
Course - Certified Information System Security Professional (CISSP) CBK Review
Upcoming Courses
Related Courses
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® is the globally renowned and highly sought-after certification for professionals in the field of IS audit and IT risk consulting.
Our CISA course is an intensive, highly competitive, and exam-focused training program. With a track record of delivering over 150+ CISA trainings across Europe and around the world, and training more than 1200+ CISA delegates, Net Security's CISA training materials are developed in-house with the primary goal of ensuring that CISA delegates pass the ISACA CISA® Exam. The training methodology emphasizes a deep understanding of CISA IS auditing concepts and extensive practice with a large number of ISACA-released question banks from the past three years. Over time, there has been a significant demand for CISA holders in renowned accounting firms, global banks, advisory, assurance, and internal audit departments.
While delegates may have years of experience in IT auditing, their ability to solve CISA questionnaires will depend on their understanding of globally accepted IT assurance practices. The CISA exam is particularly challenging due to the potential for closely related answer choices, which tests candidates' knowledge of global IT auditing practices. To help participants overcome these challenges, we always provide top-tier trainers with extensive experience in delivering CISA training worldwide.
The Net Security CISA manual comprehensively covers all exam-relevant concepts, case studies, and Q&A sessions across the five domains of CISA. Additionally, the trainer provides key supporting materials such as relevant CISA notes, question banks, a CISA glossary, videos, revision documents, exam tips, and CISA mind maps throughout the course.
Goal:
The ultimate goal is to pass your CISA examination on the first attempt.
Objectives:
- To apply the knowledge gained in a practical manner that benefits your organization
- To provide audit services in accordance with IT audit standards
- To offer assurance on leadership and organizational structure and processes
- To ensure assurance during the acquisition, development, testing, and implementation of IT assets
- To provide assurance on IT operations, including service operations and third-party relationships
- To offer assurance on the organization's security policies, standards, procedures, and controls to ensure the confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, IT professionals, internal and external auditors, information security experts, and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 Hours
The training takes the form of a workshop supplemented with comprehensive knowledge. Classes are based on the official CISA certificate framework. During the workshop, case studies will be discussed to address specific issues. Classes will be conducted in English (and can be provided in Polish upon request) using the ISACA handbook in English.
Scope of CISA Exam Material:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development, and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Type: multiple choice test
Volume: 200 questions
List of the requirements that you must meet to be eligible for the CISA qualification:
- Pass the CISA exam. The passing score is a mark of 450 or higher.
- Adhere to the ISACA Code of Professional Ethics
- Commit to following the CISA Continuing Professional Education Policy
- Accumulate at least 5 years of professional experience in information systems auditing, control, or security.
- Comply with Information Systems Auditing Standards
If you have passed the exam and believe you meet these requirements, you can start the application for certification: certification page here. There is a $50 fee for this application.
Additionally, there is an annual fee to maintain your certification after it has been granted. The fee is $40 per year for ISACA members and $75 for non-members.
CISSP Certification Preparation: Mastering the Eight Domains
35 HoursThe Certified Information Systems Security Professional (CISSP) certification, issued by (ISC)², is a globally recognized credential for senior information security professionals. It validates expertise across eight security domains and establishes credibility in roles such as chief information security officer (CISO), security engineer, and senior security manager.
This instructor-led, live training (online or onsite) is designed for intermediate to advanced-level security practitioners who aim to gain both a deep understanding and practical readiness to successfully pass the CISSP certification exam on their first attempt, while applying these principles in real-world organizational settings.
By the end of this training, participants will be able to:
- Understand and apply the eight CISSP domains in security governance and practice.
- Develop, evaluate, and enhance organizational security policies, architectures, and controls.
- Design and implement security solutions that align with legal, compliance, and business objectives.
- Interpret and answer exam-style CISSP questions with confidence and strategy.
Format of the Course
- Lectures and guided domain walkthroughs.
- Practice questions, scenario-based discussions, and quizzes.
- Hands-on labs, case studies, and group exercises.
Course Customization Options
- To request a customized focus on specific domains or extended exam review sessions, please contact us to arrange.
Certified Information System Security Professional (CISSP) CBK Review
35 HoursA CISSP is an information assurance professional responsible for defining the architecture, design, management, and controls that ensure the security of business environments. The extensive breadth of knowledge and the experience required to pass the exam distinguish a CISSP from other professionals. This credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, such as cloud computing, mobile security, application development security, risk management, and more.
This course aids in reviewing the 10 domains of information security practices. It also serves as an effective learning tool for mastering concepts and topics related to all aspects of information systems security.
Objectives:
- To review the main topics of the CISSP CBK (Common Body of Knowledge).
- To prepare for the CISSP examination.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This class is designed as an intense and rigorous exam preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. It will cover the latest four domains of ISACA’s CRISC syllabus, with a strong emphasis on the examination itself. The Official ISACA CRISC Review Manual and Question, Answer, and Explanation (Q&A&E) supplements will also be provided to attendees. The Q&A&E is particularly useful in helping participants understand the style of questions ISACA uses, the type of answers they expect, and it aids in rapid memory retention of the material.
The technical skills and practices promoted by ISACA through the CRISC certification are essential for success in the field. Achieving the CRISC certification demonstrates your proficiency and commitment to the profession. With a growing demand for professionals with risk and control expertise, ISACA’s CRISC has become the preferred certification program for individuals and organizations worldwide. The CRISC certification signifies a dedication to serving an enterprise and the chosen profession with excellence.
Objectives:
- To help you pass the CRISC examination on your first attempt.
- Possessing this certification will demonstrate your commitment to serving an enterprise with distinction.
- The increasing demand for professionals with risk and control skills will enable holders of this certification to secure better positions and higher salaries.
You will learn:
- To assist enterprises in achieving their business objectives by designing, implementing, monitoring, and maintaining risk-based, efficient, and effective IS controls.
- The technical skills and practices promoted by CRISC, which are the foundational elements of success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
- Understand the security oversights that can bring about significant damage and disruption to a supply chain.
- Break down a complex security problem into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Cyber Resilience RESILIA Foundation
14 HoursThe RESILIA course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.
Data Breach Management
14 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at intermediate-level to advanced-level IT professionals and business leaders who wish to develop a structured approach to handling data breaches.
By the end of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Business Continuity Management
35 HoursDescription:
This is a 'Practitioner' course that emphasizes practical exercises to reinforce the concepts being taught and build delegates' confidence in implementing business continuity management. The course also encourages debate and the sharing of knowledge and experience among participants. Delegates will benefit from the practical and extensive experiences of our trainers, who are active business continuity management professionals and ISO 22301:2019 specialists.
Delegates will learn how to:
- Explain the importance of business continuity management (BCM) in all organizations
- Define the business continuity lifecycle
- Manage a business continuity programme
- Understand their organization well enough to identify mission-critical impact areas
- Determine their organization's business continuity strategy
- Establish a business continuity response plan
- Exercise, maintain, and review plans
- Integrate business continuity into an organization
- Define terms and definitions relevant to business continuity
By the end of the course, delegates will have a comprehensive understanding of all key components of business continuity management and be equipped to return to their work and make significant contributions to the business continuity management process.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Snyk
14 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course delves into the fundamental principles of security and IT Security, focusing on protecting networks from potential threats. Participants will acquire a solid understanding of key security protocols and the essential concepts underlying web service security. The curriculum also includes discussions on recent attacks against cryptosystems and related vulnerabilities.