Business Continuity Practitioner Training Course
This course is designed to equip participants with the skills to strengthen organizational resilience against various threats, enabling effective incident response, ensuring operational availability, and protecting corporate interests.
This course is available as onsite live training in South Korea or online live training.Course Outline
Upon completion of the course, candidates should be able to demonstrate knowledge and understanding of Business Continuity Management principles and techniques.
Key areas are:
- The function of and the need for Business Continuity Management within an organization
- The Business Continuity Management life cycle
- The main components of a Business Continuity Management programme
- The need for risk assessment within Business Continuity Management
- The options for development of a Business Continuity Management strategy
- How to prepare and develop plans for Business Continuity Management response
- The need for exercising, maintenance, and review of plans
- The need for embedding Business Continuity Management awareness within the organization
Requirements
Work experience in an IT or IT-related role
Basics of Information Security
Basics of Risk management
Open Training Courses require 5+ participants.
Business Continuity Practitioner Training Course - Booking
Business Continuity Practitioner Training Course - Enquiry
Business Continuity Practitioner - Consultancy Enquiry
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® is the globally renowned and most widely recognized certification for professionals specializing in information systems (IS) auditing and IT risk consulting.
Our CISA course is an intensive, highly competitive, and exam-focused training program. With a proven track record of delivering over 150 CISA training sessions across Europe and worldwide, and having trained more than 1,200 delegates, Net Security has developed its CISA training materials in-house. Our top priority is to ensure that all delegates successfully pass the ISACA CISA® exam. The training methodology emphasizes a deep understanding of IS auditing concepts and extensive practice with ISACA question banks released over the past three years. Over time, CISA-certified professionals have become increasingly sought after by prestigious accounting firms, global banks, advisory firms, assurance departments, and internal audit teams.
While delegates may possess years of experience in IT auditing, their ability to answer CISA questionnaire items depends entirely on their grasp of globally accepted IT assurance practices. The CISA exam is notably challenging due to the potential for closely similar answer choices, which is precisely how ISACA tests your understanding of global IT auditing standards. To address these challenges, we consistently provide expert trainers with extensive global experience in delivering CISA training.
The Net Security CISA manual covers all exam-relevant concepts, case studies, and Q&A sections across the five CISA domains. Additionally, trainers share key supporting materials throughout the course, including CISA notes, question banks, glossaries, videos, revision documents, exam tips, and mind maps.
Goal:
The ultimate objective is to pass your CISA examination on the first attempt.
Objectives:
- Apply acquired knowledge practically to benefit your organization.
- Deliver audit services in compliance with IT audit standards.
- Provide assurance on leadership, organizational structure, and processes.
- Provide assurance on the acquisition, development, testing, and implementation of IT assets.
- Provide assurance on IT operations, including service operations and third-party management.
- Provide assurance on the organization’s security policies, standards, procedures, and controls to ensure the confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, IT professionals, internal and external auditors, and information security and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 Hours
This workshop combines practical exercises with in-depth knowledge, following the official CISA certification framework. Participants will analyze case studies to address specific issues, with classes conducted in English (Polish available upon request) based on the ISACA handbook.
CISA Exam Content Scope:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Format: Multiple choice
Number of Questions: 200
To claim the CISA qualification, candidates must meet the following requirements:
- Pass the CISA exam with a score of 450 or higher.
- Adhere to the ISACA Code of Professional Ethics.
- Commit to the CISA Continuing Professional Education (CPE) Policy.
- Obtain at least 5 years of professional experience in information systems auditing, control, or security.
- Comply with Information Systems Auditing Standards.
If you have passed the exam and believe you meet these requirements, you can start the certification application process here: Certification Page
A $50 application fee is required.
Additionally, an annual fee is required to maintain your certification. The fee is $40 per year for ISACA members and $75 for non-members.
CISSP Certification Preparation: Mastering the Eight Domains
35 HoursThe Certified Information Systems Security Professional (CISSP) certification, issued by (ISC)², is a globally recognized credential for senior information security professionals. It validates mastery across eight security domains and establishes credibility in roles such as chief information security officer (CISO), security engineer, and senior security manager.
This instructor-led, live training (online or onsite) is aimed at intermediate-level to advanced-level security practitioners who wish to gain both conceptual mastery and practical readiness for successfully passing the CISSP certification exam on the first attempt, while applying principles in real-world organizational contexts.
By the end of this training, participants will be able to:
- Understand and apply the eight CISSP domains in security governance and practice.
- Develop, assess, and strengthen organizational security policies, architectures, and controls.
- Design and implement security solutions aligned with legal, compliance, and business objectives.
- Interpret and answer exam-style CISSP questions with confidence and strategy.
Format of the Course
- Lectures and guided domain walkthroughs.
- Practice questions, scenario-based discussions, and quizzes.
- Hands-on labs, case studies, and group exercises.
Course Customization Options
- To request customized domain focus or extended exam review sessions, please contact us to arrange.
Certified Information System Security Professional (CISSP) CBK Review
35 HoursA Certified Information System Security Professional (CISSP) is an information assurance expert responsible for defining the architecture, design, management, and controls that ensure the security of business environments. The extensive breadth of knowledge and practical experience required to pass the CISSP exam distinguishes this credential. It demonstrates a globally recognized level of competence defined by the (ISC)2® CBK®, covering critical security topics such as cloud computing, mobile security, application development security, risk management, and more.
This course provides a comprehensive review of the 10 domains of information security practices and serves as a robust learning tool for mastering concepts related to all aspects of information systems security.
Objectives:
- To review the main topics of the CISSP CBK (Common Body of Knowledge).
- To prepare for the CISSP examination.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in South Korea (online or onsite) is designed for beginner to intermediate-level system administrators and security experts aiming to learn how to deploy Cloudflare for content delivery and cloud security, while also mitigating DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course serves as an intensive and rigorous exam preparation program for ISACA’s Certified Risk and Information Systems Control (CRISC) examination. The curriculum covers all four (4) domains of the latest ISACA CRISC syllabus, with a strong emphasis on exam readiness. Official ISACA CRISC Review Manuals, along with the Question, Answer, and Explanation (Q&A&E) supplements, will be provided to all participants. The Q&A&E materials are particularly valuable for helping attendees grasp the specific style of ISACA questions, understand the types of answers expected, and facilitate rapid retention of key concepts.
The technical competencies and practices promoted by ISACA for the CRISC certification form the foundation for success in this profession. Holding the CRISC certification validates your professional expertise. As demand grows for professionals with specialized risk and control knowledge, the CRISC certification has established itself as the preferred credential for individuals and organizations worldwide. It signifies a strong commitment to serving an enterprise and the profession with distinction.
Objectives:
- Enable you to pass the CRISC examination on your first attempt.
- Demonstrate your dedication to serving an enterprise with excellence through certification.
- Leverage the increasing market demand for risk and control expertise to secure better career positions and higher salaries.
You will learn:
- How to support enterprises in achieving their business objectives by designing, implementing, monitoring, and maintaining efficient and effective risk-based IT controls.
- The essential technical skills and practices advocated by CRISC, which serve as the building blocks for professional success.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in South Korea (online or onsite) targets intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risks, implementing information systems controls, and preparing for the CRISC certification exam.
Upon completing this training, participants will be able to:
- Comprehend the governance and risk management dimensions of IT.
- Perform IT risk assessments and execute appropriate risk responses.
- Design and implement information systems controls.
- Effectively prepare for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in South Korea (online or onsite) is designed for supply chain professionals seeking to establish robust control and oversight of their supply chains, with a particular focus on cybersecurity.
Upon completion of this training, participants will be able to:
- Comprehend how security oversights can cause significant damage and disruption to a supply chain.
- Deconstruct complex security challenges into manageable and actionable components.
- Tackle common supply chain vulnerabilities by analyzing high-risk areas and engaging key stakeholders.
- Implement best practices for securing the supply chain.
- Significantly reduce or eliminate the most critical risks facing an organization's supply chain.
Cyber Resilience RESILIA Foundation
14 HoursThe RESILIA course begins by defining its purpose, key terminology, the distinction between resilience and security, and the advantages of implementing cyber resilience. It introduces risk management along with the essential activities required to address both risks and opportunities. The course further explains how common management standards and best practice frameworks contribute to achieving cyber resilience. It then outlines the cyber resilience processes, including their control objectives, interactions, and activities that must align with relevant ITSM activities. In the final section, the course covers the segregation of duties and dual controls associated with cyber resilience roles and responsibilities.
Data Breach Management
14 HoursThis instructor-led, live training in South Korea (online or onsite) is designed for IT professionals and business leaders at intermediate to advanced levels who aim to develop a structured approach to managing data breaches.
Upon completion of this training, participants will be able to:
- Grasp the causes and consequences of data breaches.
- Create and implement strategies to prevent data breaches.
- Establish an incident response plan to contain and mitigate breaches.
- Perform forensic investigations and evaluate the impact of breaches.
- Adhere to legal and regulatory requirements for breach notification.
- Recover from data breaches and enhance overall security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in South Korea (online or onsite) is designed for developers and administrators who aim to produce software and products that are compliant with HiTRUST standards.
Upon completing this training, participants will be able to:
- Grasp the core concepts of the HiTrust CSF (Common Security Framework).
- Identify the administrative and security control domains defined by the HITRUST CSF.
- Gain knowledge regarding various HiTrust assessment types and scoring methods.
- Understand the certification process and prerequisites for achieving HiTrust compliance.
- Apply best practices and tips for adopting the HiTrust approach.
Business Continuity Management
35 HoursDescription:
Designed as a 'Practitioner' level course, this program emphasizes practical exercises aimed at reinforcing core concepts and building delegates' confidence in implementing business continuity management practices. The curriculum also fosters an environment for debate, encouraging the exchange of knowledge and professional experiences among participants.
Participants will gain valuable insights from our trainers' extensive practical experience, leveraging their expertise as active business continuity management practitioners and ISO 22301:2019 specialists.
Key Learning Outcomes:
- Articulate the necessity of business continuity management (BCM) across all organizations
- Define the complete business continuity lifecycle
- Manage business continuity programs effectively
- Assess organizational structure to identify mission-critical impact areas
- Formulate the organization's business continuity strategy
- Establish a robust business continuity response mechanism
- Exercise, maintain, and review continuity plans
- Integrate business continuity practices into the organizational culture
- Define terminology and definitions specific to business continuity
Upon completion of the course, delegates will possess a comprehensive understanding of all key components of business continuity management. This knowledge will enable them to return to their roles and make substantial contributions to their organizations' business continuity management processes.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led live training in South Korea (available online or onsite) is designed for security engineers who wish to use IBM Qradar SIEM to address urgent security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Snyk
14 HoursThis instructor-led live training in South Korea (online or onsite) targets developers seeking to embed Snyk into their development tools to uncover and address security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course explores the fundamental principles of security and IT security, focusing primarily on defending against network-based attacks. Participants will develop a solid understanding of essential security protocols and the security concepts underlying web services. Throughout the practical labs and threat modeling exercises, recent attacks targeting cryptosystems and associated vulnerabilities will be discussed in detail.