Skip to Main Content
USA
Select regional store:
Get ahead in Cloud security – save 25% on selected training courses. Find out more.

Search results for e-learning suite

Showing 221 - 240 of 443 results
/iso-22301-consultancy
IT Governance's expert consultants can provide whatever you want to achieve ISO 22301 certification. ...
/cobit-solutions
Solutions for effective implementation of COBIT 5 ...
/it_governance/auditing
The governance of ICT is a key contributor to strategic organisational success. Internal auditors therefore have a key role to play in terms of giving top management assurance that IT governance is effective in their organisation. ...
/Cyber-Resilience-Critical-Issues
We discuss critical issues that affect Cyber resilience implementation ...
/Cyber-Resilience-Training
The training of staff is a key element in the implementation and success of a cyber resilience strategy. The traditional roles and skills of information security and business continuity IT staff must be combined to create a new breed of ‘cyber resilience professionals’. ...
/Cyber-resilience-books-and-implementation-tools
Our selection of books and toolkits give you all you need to include cyber resilience in your management systems. The documentation toolkits provide the policies and procedures needed to roll out a system that aligns with the international standards, while our books and pocket guides give you the key knowledge to develop and implement cyber resilience in practice. ...
/Find-out-more-about-Cyber-Resilience
IT Governance's 7-step guide to developing an effective Cyber Resilience strategy. ...
/Glossary
IT Governance have documented all the acronyms and terms within our industry with a brief description to help better your understanding. Find what you're looking for below. ...
/penetration-test-levels
Discover which level of penetration test you need to assess and fix the vulnerabilities on your networks and systems. ...
/3-Course-Training-Passport-Sale
Purchase any three different ITG training courses before the end of March 2014 and save up to 30% on booking fees. ...
/secure-configuration
Details of the one of the five recommended controls of the Cyber Essentials Scheme: Secure configuration. ...
/boundary-firewalls-and-internet-gateways
Details of the one of the five recommended controls of the Cyber Essentials Scheme: Boundary firewalls and internet gateways. ...
/Why-Pen-Tests-are-crucial
A guide for selling penetration tests to the board - Why frequent penetration tests and vulnerability assessments are crucial. ...
/privacy-impact-assessment-pia
A PIA is a process for evaluating a proposal to identify potential effects on individual privacy and data protection compliance. Learn about PIAs and why they are becoming more important as regulation around data processing increases. ...
/iso27001-solutions
Implementing ISO 27001 isn’t as expensive or as difficult as you might think. Sign up for bestselling tools, software, guides, training and online consultancy. ...
/COBIT-5-training
A complete COBIT 5 training programme including foundation, implementer and assessor courses. With each course gain an industry-recognised ISACA qualification awarded by APMG International. ...
/cyber-essentials-infographic
Visual representation explaining Cyber Essentials Certification. ...
/cyber-essentials-certified-organisations
The following companies have been certified by IT Governance to Cyber Essentials or Cyber Essentials Plus. ...
/Daily-Sentinel
The Daily Sentinel email is the ideal way for you and your colleagues to receive and share information about global breaches, regulations, security tips, products, services, special offers and the latest certifications in the IT GRC space. ...
/ISO27001-Certification-Costs
When budgeting for an ISO 27001 project, it’s important to take certification costs into account as well as the actual cost of implementing the Standard. ...
top
This website uses cookies. View our cookie policy
Save on
Training
Loading...