Information Security Training and Certification Schedule

Oct 18th, 2013 | By | Category: Training

INFORMATION SECURITY MANAGEMENT TRACKS 3-in-1 Information Assurance Professional Training (CISSP-CISM-ISMS) 20 – 25 April 2015 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge Training 20 – 24 April 2015 ISO 27001 Information Security Management System (ISMS) Lead Implementer Training  23 –  25 April 2015 Security Information and Event Management (SIEM) Training to be […]



3-in-1 Information Assurance Professional, April 20-25, 2015

Oct 18th, 2013 | By | Category: Training

“Be A World Class Information Security Professional” Testimonies CISSP#324472 : “Significantly improve my information security knowledge. Very useful to help me become a CISSP!” CISSP#344880: “After following the XecureIT’s CISSP CBK Training, I had had more confidence to take CISSP Exam. Especially, because Gildas, the trainer, has solid information security experience and have in-depth knowledge of the […]



Substantive IT Security Audit using In-Depth Vulnerability Assessment Techniques, 5 Days

Mar 27th, 2012 | By | Category: Training

Many auditors find that doing substantive IT security audit is very challenging. Most of audit checklists are not comprehensive, do not provide the security reasons behind them and treat each checklist item as an independent issue. We strongly recommend this training for any auditors, IT professionals or IT security professionals who can not clearly answer […]



3-in-1 Information Assurance Professional

Aug 14th, 2011 | By | Category: Training

“Be A World Class Information Security Professional” Testimonies CISSP#324472 : “Significantly improve my information security knowledge. Very useful to help me become a CISSP!” CISSP#344880: “After following the XecureIT’s CISSP CBK Training, I had had more confidence to take CISSP Exam. Especially, because Gildas, the trainer, has solid information security experience and have in-depth knowledge of the […]



ISO 27001 ISMS Lead Implementer Training, 3 Days

Dec 21st, 2010 | By | Category: Training

ISO 27001 Information Security Management System (ISMS) is a controlled approach to managing sensitive company information so that it remains secure. ISMS integrates people, processes and technology, ensures continuous improvement, and especially clearly shows management commitment. This three-day intensive training provides participants with comprehensive and practical coverage of all aspects of implementing ISO27001 for real. […]



Real Time IT Security Monitoring and Audit Using SIEM Technology, 3 Days

Dec 21st, 2010 | By | Category: Training, XSIRT

Effectively manage the security information and events produced by your network is a very important process in holistic information security strategy. It is almost impossible to ensure your information protection without doing appropriate real time log analysis. Who should attend? IT and Information Security Professional, such as: Consultant, Auditor, Manager, Engineer and Administrator. Benefits The […]



Advanced Wireless Hacking Countermeasure Training, 2 Days

Dec 15th, 2010 | By | Category: Training

As organizations provide greater mobility to their users, the risk of threats to security grows and the need for secure wireless networks becomes one of most importance concerns. Without physical boundary and solid security strategy, corporate internal network is just like a sitting duck, waiting to be owned by attacker. Who should attend? IT and […]



Advance Penetration Testing – Wireless, 2 Days

Dec 15th, 2010 | By | Category: Training

Wireless LAN is very popular because it is very easy to implement and cost effective. Those advantages are not only for good people, but also for attacker. Attacking wireless network is very easy since there is no physical boundary. There are too many real cases that sensitive information has been stolen from wireless connection. It […]



Advance Penetration Testing – Web Application, 3 Days

Dec 15th, 2010 | By | Category: Training

Web application is a critical point of vulnerabilities in organization nowadays.  Web application holes have resulted theft in many financial sectors for company, organization, enterprises even compromised browsing machines that visited web sites changed by attacker. Who should attend? IT and Information Security Professional, such as: Consultant, Auditor, Manager, Engineer and Administrator. Benefits This course […]



Advanced Web Application Hacking Countermeasure, 3 Days

Dec 15th, 2010 | By | Category: Training

Attackers are exploiting web application vulnerabilities. The vulnerabilities can be exploited to obtain confidential information and compromise organizational integrity. In consequences, organizations must  integrate strong security measures into the Web application development process. Advanced Web Application Hacking Countermeasures is a security training essential  to have secure web applications by integrating various security measures into the […]