V2-Courses/Webinars

Cyber Security Digital Summit: Third Party Risk Management APAC 2022

Organizations of any size go through various vendors to keep operations running and without proper controls in place, leaves organizations vulnerable to third-party breaches that may result in loss of data, downtime as well as financial losses. While third-party risk management is not a new concept, the risk of cyberattacks today is even greater as […]

Cyber Security Digital Summit: Third Party Risk Management APAC 2022 Read More »

Scaling AI Online APAC

This Summit will showcase the emerging trends in AI-driven optimisation, a ‘how-to’ of leveraging advanced ML & DL capabilities, so you can transform your business and deliver advanced organisational knowledge, data, and information. Hear real-word case studies, business insights and lessons learned from leaders in innovation, technology, and integration to discover the best strategies, tools

Scaling AI Online APAC Read More »

How to architect an identity management strategy in AWS

An identity and access management (IAM) strategy can help organizations grant users and customers access to the right resources under the right conditions. In this webinar, SANS and AWS Marketplace will provide guidance on how to architect and execute an IAM strategy with AWS services and third-party identity management solutions.  They will cover defining permission

How to architect an identity management strategy in AWS Read More »

(ISC)² Certified Information Systems Security Professional (CISSP) Training

Leadership and Operations This course is designed for information security professionals with deep technical and managerial knowledge and experience to effectively design, engineer and manage the overall security posture of an organization. This training course provides a comprehensive review of information systems security concepts and industry best practices, covering the following eight domains of the

(ISC)² Certified Information Systems Security Professional (CISSP) Training Read More »

(ISC)² Certified Cloud Security Professional (CCSP) Training

Cloud Security This course provides a comprehensive review of the knowledge required for understanding cloud computing and its information security risks and mitigation strategies. This training course will help students review and refresh their knowledge and identify areas they need to study for the CCSP exam. Course Objectives At the end of this course, learners

(ISC)² Certified Cloud Security Professional (CCSP) Training Read More »

(ISC)² Systems Security Certified Practitioner (SSCP) Training

Security Administration and Operations This course provides a comprehensive review of the knowledge required to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability. This training course will help students review and refresh their knowledge and identify areas they need to study for

(ISC)² Systems Security Certified Practitioner (SSCP) Training Read More »

(ISC)² Certified Secure Software Lifecycle Professional (CSSLP) Training

Software Security This course is designed for software professionals that have the expertise to incorporate security practices – authentication, authorization and auditing – into each phase of the software development lifecycle (SDLC), from software design and implementation to testing and deployment. Led by an (ISC)² authorized instructor, this training seminar provides a comprehensive review of

(ISC)² Certified Secure Software Lifecycle Professional (CSSLP) Training Read More »