Business Continuity Practitioner Training Course
This course aims to empower attendees to enhance organizational resilience against diverse threats, enabling effective incident response, sustaining business operations, and protecting organizational interests.
This course is available as onsite live training in Malaysia or online live training.Course Outline
Upon completing the course, candidates will be able to demonstrate knowledge and understanding of Business
Continuity Management principles and techniques.
Key areas are:
- The function of and the need for Business Continuity Management within an organization
- The Business Continuity Management life cycle
- The main components of a Business Continuity Management programme
- The need for risk assessment within Business Continuity Management
- The options for development of a Business Continuity Management strategy
- How to prepare and develop plans for Business Continuity Management response
- The need for exercising, maintenance, and review of plans
- The need for embedding Business Continuity Management awareness within the organization
Requirements
Work experience in an IT or IT-related role
Basics of Information Security
Basics of Risk management
Open Training Courses require 5+ participants.
Business Continuity Practitioner Training Course - Booking
Business Continuity Practitioner Training Course - Enquiry
Business Continuity Practitioner - Consultancy Enquiry
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® is the globally recognised and most sought-after certification for professionals working in IS audit and IT risk consulting.
Our CISA course offers intense, highly competitive, and exam-oriented training. With a track record of delivering over 150 CISA trainings across Europe and worldwide, and having trained more than 1,200 delegates, Net Security has developed its training material in-house. The primary focus is ensuring that CISA delegates successfully pass the ISACA CISA® Exam. Our methodology emphasises a deep understanding of CISA IS auditing concepts and extensive practice with question banks released by ISACA over the last three years. CISA holders are in high demand among renowned accounting firms, global banks, advisory and assurance firms, as well as internal audit departments.
While delegates may possess years of IT auditing experience, their approach to solving CISA questions depends heavily on their grasp of globally accepted IT assurance practices. The CISA exam is challenging because there are often two plausible answers with only a slight difference, which tests the candidate's understanding of global IT auditing standards. To help address these challenges, we provide highly experienced trainers who have delivered CISA training internationally.
The Net Security CISA manual covers all concepts relevant to the exam, including case studies and Q&A sessions across the five CISA domains. Additionally, trainers share key supporting materials such as CISA notes, question banks, glossaries, videos, revision documents, exam tips, and mind maps throughout the course.
Goal:
The ultimate goal is to pass the CISA examination on the first attempt.
Objectives:
- Apply gained knowledge practically to benefit your organisation.
- Deliver audit services in compliance with IT audit standards.
- Provide assurance on leadership, organisational structure, and processes.
- Provide assurance on the acquisition, development, testing, and implementation of IT assets.
- Provide assurance on IT operations, including service operations and third-party management.
- Provide assurance on the organisation’s security policies, standards, procedures, and controls to ensure the confidentiality, integrity, and availability of information assets.
Target Audience:
Finance and CPA professionals, IT professionals, internal and external auditors, and information security and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 Hours
This workshop-style training combines theoretical insights with practical knowledge, grounded in the official CISA certification framework. The sessions utilize case studies to explore specific industry challenges and are delivered in English (with Polish available upon request), following the ISACA handbook.
CISA Exam Content Coverage:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Format: Multiple-choice test
Number of Questions: 200
To claim the CISA qualification, you must satisfy the following requirements:
- Pass the CISA exam with a minimum scaled score of 450.
- Adhere to the ISACA Code of Professional Ethics.
- Commit to complying with the CISA Continuing Professional Education (CPE) Policy.
- Possess a minimum of 5 years of professional experience in information systems auditing, control, or security work.
- Comply with Information Systems Auditing Standards.
If you have passed the exam and believe you meet these criteria, you may begin the certification application process via the ISACA certification page. A processing fee of $50 applies.
Additionally, there is an annual renewal fee to maintain your certification. ISACA members pay $40 per annum, while non-members pay $75.
CISSP Certification Preparation: Mastering the Eight Domains
35 HoursThe Certified Information Systems Security Professional (CISSP) certification, issued by (ISC)², is a globally recognized credential for senior information security professionals. It validates mastery across eight security domains and establishes credibility in roles such as chief information security officer (CISO), security engineer, and senior security manager.
This instructor-led, live training (online or onsite) is aimed at intermediate-level to advanced-level security practitioners who wish to gain both conceptual mastery and practical readiness for successfully passing the CISSP certification exam on the first attempt, while applying principles in real-world organizational contexts.
By the end of this training, participants will be able to:
- Understand and apply the eight CISSP domains in security governance and practice.
- Develop, assess, and strengthen organizational security policies, architectures, and controls.
- Design and implement security solutions aligned with legal, compliance, and business objectives.
- Interpret and answer exam-style CISSP questions with confidence and strategy.
Format of the Course
- Lectures and guided domain walkthroughs.
- Practice questions, scenario-based discussions, and quizzes.
- Hands-on labs, case studies, and group exercises.
Course Customization Options
- To request customized domain focus or extended exam review sessions, please contact us to arrange.
Certified Information System Security Professional (CISSP) CBK Review
35 HoursA CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.
This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security.
Objectives:
- To review of the main topics of CISSP CBK (Common Body of Knowledge).
- To prepare for a CISSP examination
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led live training in Malaysia (online or onsite) is designed for beginner to intermediate system administrators and security professionals seeking to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
Upon completion of this training, participants will be equipped to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course serves as an intensive, rigorous preparation for ISACA’s Certified in Risk and Information Systems Control (CRISC) examination. It thoroughly covers the latest four (4) domains of the ISACA CRISC syllabus, with a strong emphasis on exam success. Official ISACA CRISC Review Manuals and Question, Answer, and Explanation (Q&A&E) materials will be provided to all attendees. These resources are invaluable for helping participants understand ISACA’s question style, identify the types of answers examiners seek, and facilitate rapid assimilation of the course material.
The technical competencies and best practices promoted and evaluated by ISACA within the CRISC certification form the foundation for success in this profession. Holding the CRISC certification demonstrates your professional expertise. With the increasing demand for experts in risk and control, ISACA’s CRISC has become the preferred certification program for individuals and enterprises globally. This certification signifies your dedication to serving both your organisation and your profession with excellence.
Objectives:
- To assist you in passing the CRISC examination on your first attempt.
- To demonstrate your commitment to serving an enterprise with distinction through certification.
- To leverage the growing market demand for professionals with risk and control skills, enabling holders of this certification to secure better career positions and salary packages.
You will learn:
- How to help enterprises achieve business objectives by designing, implementing, monitoring, and maintaining efficient and effective risk-based IS controls.
- The technical skills and practices championed by CRISC, which are essential building blocks for success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in Malaysia (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Malaysia (online or onsite) is designed for supply chain professionals aiming to establish robust control and oversight over their operations, particularly concerning cybersecurity.
Upon completion of this training, participants will be equipped to:
- Identify security oversights that could cause significant damage and disruption to the supply chain.
- Deconstruct complex security challenges into manageable, actionable components.
- Address common supply chain vulnerabilities by analyzing high-risk areas and engaging effectively with stakeholders.
- Implement best practices for securing the supply chain.
- Significantly reduce or eliminate the most critical risks to an organization's supply chain.
Cyber Resilience RESILIA Foundation
14 HoursThe RESILIA course begins by outlining its purpose, key terminology, the distinction between resilience and security, and the advantages of adopting cyber resilience. It introduces risk management along with the essential activities required to address risks and seize opportunities. Additionally, it highlights the importance of widely recognized management standards and best practice frameworks in achieving cyber resilience. The course then identifies the core cyber resilience processes, including their associated control objectives, interactions, and activities, showing how they align with corresponding ITSM processes. Finally, it covers the segregation of duties and dual control measures pertinent to cyber resilience roles and responsibilities.
Data Breach Management
14 HoursThis instructor-led, live training in Malaysia (online or onsite) targets intermediate to advanced IT professionals and business leaders seeking to develop a structured approach for managing data breaches.
Upon completing this training, participants will be able to:
- Grasp the causes and consequences of data breaches.
- Formulate and execute data breach prevention strategies.
- Create an incident response plan to contain and mitigate breaches.
- Perform forensic investigations and evaluate the impact of breaches.
- Adhere to legal and regulatory requirements for breach notification.
- Recover from data breaches and enhance security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Malaysia (online or onsite) is designed for developers and administrators who aim to develop software and products that are HiTRUST compliant.
Upon completion of this training, participants will be able to:
- Grasp the fundamental concepts of the HiTrust CSF (Common Security Framework).
- Identify the administrative and security control domains within the HITRUST CSF.
- Gain insight into the various types of HiTrust assessments and scoring mechanisms.
- Understand the certification process and requirements for HiTrust compliance.
- Master best practices and tips for adopting the HiTrust approach.
Business Continuity Management
35 HoursDescription:
This 'Practitioner' course is heavily focused on practical exercises intended to reinforce taught concepts and build delegates' confidence in implementing business continuity management. The programme is also designed to foster debate and encourage the sharing of knowledge and experience among students.
Delegates will benefit from the practical and extensive experiences of our trainers, who are practicing business continuity management professionals and ISO 22301:2019 specialists.
Delegates will learn how to:
- Explain the need for business continuity management (BCM) in all organisations
- Define the business continuity lifecycle
- Conduct business continuity programme management
- Understand their organisation sufficiently to identify mission-critical impact areas
- Determine their organisation's business continuity strategy
- Establish a business continuity response
- Exercise, maintain and review plans
- Embed business continuity in an organisation
- Define terms and definitions appropriate to business continuity
By the end of the course, delegates will have a detailed understanding of all the key components of business continuity management and be able to return to their work, making a significant contribution to the business continuity management process.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in Malaysia (online or on-site) is designed for security engineers who wish to use IBM QRadar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Snyk
14 HoursThis instructor-led, live training in Malaysia (online or onsite) is designed for developers who wish to integrate Snyk into their development tools to identify and resolve security issues in their code.
Upon completing this training, participants will be able to:
- Grasp the key features and structure of Snyk.
- Utilize Snyk to detect and remediate code security vulnerabilities.
- Integrate Snyk effectively into the software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course explores the fundamental principles of security and IT Security, focusing on safeguarding against network-based threats. Participants will develop a solid grasp of essential security protocols and key security concepts applicable to web services. The curriculum also references recent cryptosystem attacks and associated vulnerabilities to highlight real-world relevance.