Skip to Main Content
USA
Select regional store:
Get ahead in Cloud security – save 25% on selected training courses. Find out more.

Search results for e-learning suite

Showing 161 - 180 of 443 results
/penetration-testing
Find vulnerabilities in your applications and networks with penetration testing - spot the weaknesses that cyber criminals could exploit and remediate them. ...
/pmbok
Get books and tools to help with PMBOK, the project management body of knowledge, one of the most widely used project management methodologies in the world. ...
/project_governance
Learn more about Project Governance, including Prince 2 project management and PMBoK, through Prince 2 and many other project management manuals, a free board briefing on project governance, and an introduction to project management based on Prince 2. ...
/home-old
IT Governance - the one-stop-shop for IT Governance including books, tools, learning and consultancy so that your organization can compete and win in today's world. ...
/compliance
Access a wide range of books and tools to help with HIPAA, GLBA, SOX, Data Protection Act, and many others. ...
/social-media-governance
Understand social media and how it can help grow your business’ sales, brand and reach. ...
/consulting
Find out more about our consultancy services - we can deliver a complete solution and manage the project from start to finish. ...
/basel
A clear and concise introduction to the Basel accords: Basel I, II and III. Understand certification and the implications for financial institutions ...
/cyber-resilience
Find out more about the IT Governance Cyber Resilience Framework, a four-part approach your organization can use to achieve cyber resilience. ...
/supplier-audit
The IT Governance supplier audit and supply chain auditing and assurance service ensures you deliver the degree of assurance you and your stakeholders require about your supply chain. ...
/iso9001-quality-management-standards
Everything you need to know about ISO9001:2015 including a free conversion tool, gap analysis guidance and tools for implementation. ...
/cismp
Everything you need to know about the BCS’s CISMP qualification: syllabus content, study guides, training courses and latest exam dates. ...
/Cloud-Governance
An organization’s board is responsible – and accountable to shareholders, regulators and customers - for the framework of standards, processes and activities that, together, ensure the organization benefits securely from Cloud Computing. ...
/lrqastandards
LRQAstandards - the one-stop-shop for LRQA - standards, books and tools for best practice so that your organization can compete and win in today's world ...
/cloud-computing
Cloud computing, the use of multiple server computers via a digital network as if they were one can pose significate risk and governance challenges. Understand the benefits and risks presented by Cloud computing and learn how to maximise the opportunities ...
/gambling-commission-compliance
IT Governance consultants have the experience to assiste you map a route to compliance simultaneously with the technical requirements of the Gambling Commission (based on Annex A on ISO/IEC 27001) together with those of PCI DSS. ...
/sarbanes-oxley
Sarbanes-Oxley Implementation & Compliance Course ...
/Advanced-Persistent-Threats-APT
Advanced Persistent Threat (APT) is the description applied to the coordinated cyber activities of sophisticated criminals and state level entities, targeted on large corporations and foreign governments, with the objective of stealing information or compromising information systems. ...
/cybersecurity-standards
When identifying the most useful best-practice standards and guidance for implementing effective cyber security, it is important to establish the role that each fulfils, its scope and how it interacts (or will interact) with other standards and guidance. ...
/computer_forensics
Computer forensics (also referred to as digital forensics) is the analysis of information contained within and created with computer systems and computing devices. All UK government departments require a digital forensics readiness policy. ...
top
This website uses cookies. View our cookie policy
Save on
Training
Loading...