Business Continuity Practitioner Training Course
This course is designed to equip participants with the skills to build organizational resilience against a variety of threats, enabling organizations to respond effectively to incidents, maintain business operations availability, and safeguard their interests.
This course is available as onsite live training in Italy or online live training.Course Outline
Upon completing the course, candidates will be able to demonstrate knowledge and understanding of Business Continuity Management principles and techniques.
Key areas are:
- The function of and the need for Business Continuity Management within an organization
- The Business Continuity Management life cycle
- The main components of a Business Continuity Management programme
- The need for risk assessment within Business Continuity Management
- The options for development of a Business Continuity Management strategy
- How to prepare and develop plans for Business Continuity Management response
- The need for exercising, maintenance, and review of plans
- The need for embedding Business Continuity Management awareness within the organization
Requirements
Work experience in an IT or IT-related role
Basics of Information Security
Basics of Risk management
Open Training Courses require 5+ participants.
Business Continuity Practitioner Training Course - Booking
Business Continuity Practitioner Training Course - Enquiry
Business Continuity Practitioner - Consultancy Enquiry
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® stands as the globally recognized and most sought-after certification for professionals specializing in IS auditing and IT risk consulting.
Our CISA course is an intensive, highly competitive, and exam-oriented training program. With a proven track record of delivering over 150 CISA trainings across Europe and the world, and having trained more than 1,200 delegates, Net Security’s CISA training materials have been developed internally with the primary objective of ensuring delegates pass the ISACA CISA® Exam. Our methodology emphasizes a deep understanding of CISA IS auditing concepts alongside extensive practice with question banks released by ISACA over the past three years. CISA holders have seen immense demand from renowned accounting firms, global banks, advisory and assurance departments, and internal audit teams.
While delegates may possess years of IT auditing experience, their ability to tackle CISA questionnaires depends entirely on their grasp of globally accepted IT assurance practices. The CISA exam is notably challenging due to the close similarity between plausible answers, testing your comprehension of international IT auditing standards. To address these challenges, we consistently provide expert trainers with extensive global experience in delivering CISA training.
The Net Security CISA manual encompasses all exam-relevant concepts, case studies, and Q&A across the five CISA domains. Additionally, trainers provide essential supporting materials such as CISA notes, question banks, glossaries, videos, revision documents, exam tips, and mind maps throughout the course.
Goal:
The ultimate objective is to pass your CISA examination on the first attempt.
Objectives:
- Apply acquired knowledge in a practical manner that benefits your organization.
- Deliver audit services in compliance with IT audit standards.
- Provide assurance on leadership, organizational structure, and processes.
- Provide assurance on the acquisition, development, testing, and implementation of IT assets.
- Provide assurance on IT operations, including service operations and third-party management.
- Provide assurance on the organization’s security policies, standards, procedures, and controls to ensure the confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, IT professionals, internal and external auditors, and information security and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 Hours
This training is structured as an interactive workshop, enriched with in-depth theoretical knowledge. The curriculum aligns with the official CISA certification framework. Throughout the sessions, participants will engage in case studies to explore specific real-world challenges. Instruction is delivered in English (Polish available upon request), utilizing the ISACA handbook as the primary reference.
CISA Exam Content Coverage:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development, and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Format: Multiple-choice examination
Number of Questions: 200
To qualify for the CISA certification, candidates must satisfy the following requirements:
- Successfully pass the CISA exam. A minimum scaled score of 450 is required to pass.
- Adhere to the ISACA Code of Professional Ethics.
- Commit to complying with the CISA Continuing Professional Education Policy.
- Acquire at least five years of professional work experience in information systems auditing, control, or security.
- Follow the Information Systems Auditing Standards.
If you have passed the exam and believe you meet these criteria, you may begin the certification application process via this page.
An application fee of $50 applies.
Additionally, there is an annual maintenance fee required to keep your certification active. ISACA members pay $40 per year, while non-members pay $75 annually.
CISSP Certification Preparation: Mastering the Eight Domains
35 HoursThe Certified Information Systems Security Professional (CISSP) certification, issued by (ISC)², is a globally recognized credential for senior information security professionals. It validates mastery across eight security domains and establishes credibility in roles such as chief information security officer (CISO), security engineer, and senior security manager.
This instructor-led, live training (online or onsite) is aimed at intermediate-level to advanced-level security practitioners who wish to gain both conceptual mastery and practical readiness for successfully passing the CISSP certification exam on the first attempt, while applying principles in real-world organizational contexts.
By the end of this training, participants will be able to:
- Understand and apply the eight CISSP domains in security governance and practice.
- Develop, assess, and strengthen organizational security policies, architectures, and controls.
- Design and implement security solutions aligned with legal, compliance, and business objectives.
- Interpret and answer exam-style CISSP questions with confidence and strategy.
Format of the Course
- Lectures and guided domain walkthroughs.
- Practice questions, scenario-based discussions, and quizzes.
- Hands-on labs, case studies, and group exercises.
Course Customization Options
- To request customized domain focus or extended exam review sessions, please contact us to arrange.
Certified Information System Security Professional (CISSP) CBK Review
35 HoursA CISSP is an information assurance professional responsible for defining the architecture, design, management, and/or controls that ensure the security of business environments. It is the extensive breadth of knowledge and the experience required to pass the exam that distinguishes a CISSP. This credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, covering critical topics in today's security landscape, including cloud computing, mobile security, application development security, risk management, and more.
This course assists you in reviewing the 10 domains of information security practices. It also serves as a robust learning tool for mastering concepts and topics related to all aspects of information systems security.
Objectives:
- To review the main topics of the CISSP CBK (Common Body of Knowledge).
- To prepare for a CISSP examination.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in Italy (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course serves as an intensive and rigorous preparation guide for ISACA’s Certified Information Systems Auditor (CRISC) Examination. It covers the latest four domains of the ISACA CRISC syllabus, with a strong emphasis on exam readiness. Participants will receive the Official ISACA CRISC Review Manual and the Question, Answer and Explanation (Q&A&E) supplements during attendance. The Q&A&E resource is particularly valuable for helping delegates grasp the ISACA question format, understand the types of answers sought by ISACA, and facilitate rapid retention of the material.
The technical skills and practices promoted and evaluated by ISACA through the CRISC certification form the foundation for success in this field. Holding the CRISC certification demonstrates your professional expertise. Given the increasing demand for professionals with risk and control expertise, ISACA’s CRISC has established itself as the preferred certification program for individuals and organizations worldwide. The CRISC certification reflects a commitment to serving an enterprise and its chosen profession with distinction.
Objectives:
- To assist you in passing the CRISC examination on the first attempt.
- To signify your dedication to serving an enterprise with excellence upon earning this certification.
- To leverage the growing demand for professionals with risk and control skills, enabling certification holders to secure better positions and salaries.
You will learn:
- How to help enterprises achieve business objectives by designing, implementing, monitoring, and maintaining risk-based, efficient, and effective IT controls.
- The technical skills and practices promoted by CRISC, which serve as the building blocks for success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in Italy (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Italy (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
- Understand the security oversights that can bring about significant damage and disruption to a supply chain.
- Break down a complex security problem into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Cyber Resilience RESILIA Foundation
14 HoursThe RESILIA course begins by exploring its purpose, essential terminology, the differences between resilience and security, and the advantages of adopting cyber resilience. It introduces risk management concepts and the core activities required to tackle both risks and opportunities. Furthermore, it highlights the importance of established management standards and best practice frameworks in achieving cyber resilience. Subsequently, the course outlines the cyber resilience processes, their related control objectives, and the interactions and activities that should align with corresponding ITSM processes. Finally, it covers the segregation of duties and dual controls associated with cyber resilience roles and responsibilities.
Data Breach Management
14 HoursThis instructor-led, live training in Italy (online or onsite) targets intermediate to advanced IT professionals and business leaders who wish to develop a structured approach to managing data breaches.
By the end of this training, participants will be able to:
- Comprehend the causes and repercussions of data breaches.
- Formulate and execute data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Perform forensic investigations and evaluate the impact of breaches.
- Adhere to legal and regulatory mandates for breach notification.
- Recover from data breaches and enhance security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Italy (available online or onsite) is designed for developers and administrators who aim to create software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Business Continuity Management
35 HoursDescription:
This 'Practitioner' course places a strong emphasis on practical exercises intended to reinforce the concepts taught and to build delegates' confidence in implementing business continuity management. The curriculum is also designed to foster debate, as well as the sharing of knowledge and experience among participants.
Delegates will gain valuable insights from the extensive practical experience of our trainers, who are active practitioners in business continuity management and ISO 22301:2019 specialists.
Delegates will learn how to:
- Explain the necessity of business continuity management (BCM) across all organisations
- Define the business continuity lifecycle
- Manage the business continuity programme
- Gain a sufficient understanding of their organisation to identify mission-critical impact areas
- Determine the organisation's business continuity strategy
- Establish a business continuity response
- Exercise, maintain, and review plans
- Embed business continuity within an organisation
- Define terms and definitions appropriate to business continuity
Upon completing the course, delegates will possess a detailed understanding of all key components of business continuity management and will be equipped to return to their roles, making a significant contribution to the business continuity management process.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in Italy (online or on-site) is designed for security engineers who wish to utilize IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and contain risks.
- Detect, identify, and prioritize threats.
Snyk
14 HoursThis instructor-led, live training in Italy (online or on-site) is designed for developers who wish to incorporate Snyk into their development tools to identify and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course explores the fundamental principles of security and IT security, focusing on strategies to protect against network attacks. Participants will develop a solid grasp of critical security protocols and key security concepts applicable to web services. The curriculum also references recent attacks targeting cryptosystems alongside associated vulnerabilities.