Online or onsite, instructor-led live Security Management training courses demonstrate through interactive discussion and hands-on practice how to carry out effective Security Management for government.
Security Management training is available as "online live training" or "onsite live training." Online live training (also known as "remote live training") is conducted via an interactive remote desktop. Onsite live training can be delivered locally on customer premises in Georgia or at Govtra corporate training centers in Georgia.
Govtra -- Your Trusted Training Provider for Government
Atlanta, GA – Regus at Colony Squar
1201 Peachtree Street NE, Suite 200, Atlanta, United States, 30361
The venue is centrally located in Midtown Atlanta within the prominent Colony Square complex at 1201 Peachtree Street NE, easily accessed by car via I‑75/85 or GA‑400, with several parking garages nearby. From Hartsfield–Jackson Atlanta International Airport (ATL), around 15 miles south, a taxi or rideshare typically takes 20–30 minutes north along I‑75/85 N. Public transit users can take MARTA Rail to the Arts Center or Midtown stations (0.3–0.5 miles away) and walk easily, and numerous MARTA bus routes along Peachtree Street stop directly outside the entrance.
Atlanta, GA – The Proscenium
1170 Peachtree Street NE, Atlanta, United States, 30309
The venue is located in the heart of Midtown Atlanta in the Proscenium high–rise at 1170 Peachtree Street NE, easily accessible by car via I‑75/85 and GA‑400 with several parking garages nearby. Visitors arriving from Hartsfield–Jackson Atlanta International Airport (ATL), about 15 miles south, can expect a taxi or rideshare ride taking 20–30 minutes via I‑75/85 North. Public transit is seamless with MARTA Rail service; the Arts Center and Midtown stations are within walking distance (approximately 0.3–0.4 miles), and multiple MARTA bus routes also serve Peachtree Street.
Decatur, GA – Regus at One West Court Square
One West Court Square, Suite 750, Decatur, United States, 30030
The venue is located in the heart of downtown Decatur within One West Court Square, easily reached by car via I‑20 and I‑285, with several public parking decks directly adjacent. Travelers from Hartsfield–Jackson Atlanta International Airport (ATL), approximately 17 miles southwest, can expect a taxi or rideshare ride of around 25–30 minutes via I‑20 East. Public transit is particularly convenient: MARTA rail users can disembark at Decatur Station (about 0.15 miles away) and walk a few minutes to the building entrance. Local bus routes also serve Trinity Place and Swanton Way, putting the center within easy reach.
Atlanta, GA – Regus at One Hartsfield
100 Hartsfield Centre Parkway, Suite 500, Atlanta, United States, 30354
The venue is located in the One Hartsfield Center office building, adjacent to Hartsfield–Jackson Atlanta International Airport, easily reached by car via I‑75/I‑85 or GA‑138, with abundant on-site parking. Visitors arriving from ATL airport can walk or take a shuttle to the building, or opt for a quick 2–3‑minute taxi or rideshare ride. Public transit users can board MARTA from the Airport Station and ride one stop to College Park Station, then catch a connecting shuttle or enjoy a brief walk of about half a mile.
Atlanta, GA – Regus at Peachtree
260 Peachtree Street NW, Suite 2200, Atlanta, United States, 30303
The venue is situated in the iconic Coastal States Building at 260 Peachtree Street in downtown Atlanta, accessible by car via I‑75/85 or I‑20 with convenient parking garages nearby. From Hartsfield–Jackson Atlanta International Airport (ATL), about 12 miles south, a taxi or rideshare along I‑75/85 North takes approximately 15–20 minutes. For public transit, MARTA rail users can disembark at Five Points Station and walk 0.5 miles northeast, or exit at Peachtree Center Station and walk two blocks north—both routes offering easy access.
Augusta, GA – At Broad Street
823 Broad Street, Augusta, United States, 3090
The venue is located in the heart of downtown Augusta on Broad Street, easily accessible by car via I‑20 with several public parking garages nearby. From Augusta Regional Airport (AGS), about 9 miles west, taxis or rideshares typically take 15–20 minutes via I‑20. Public transit is available through Augusta Public Transit buses with routes along Broad Street, stopping within a few blocks of the venue, offering a convenient option for attendees without a car.
Savannah, GA – Regus at Bull Street
100 Bull St Downtown, Suite 200, Savannah, United States, 31401
The venue is located in the historic downtown area on Bull Street in the Altmayer Building, easily accessible by car via I‑16 and U.S. 17, with several public garages nearby. From Savannah/Hilton Head International Airport (SAV), about 12 miles west, taxis or rideshares typically take 15–20 minutes via U.S. 17 South. Public transit is available via Chatham Area Transit (CAT) buses, with frequent service along Bull and Broughton Streets; Johnson Square Station is just a couple minutes’ walk from the venue.
This instructor-led, live training in Georgia (online or onsite) is designed for intermediate-level IT auditors who seek to effectively incorporate artificial intelligence tools into their audit practices.
By the end of this training, participants will be able to:
Understand the fundamental concepts of artificial intelligence and its application in the context of IT auditing for government.
Leverage AI technologies such as machine learning, natural language processing (NLP), and robotic process automation (RPA) to enhance audit efficiency, accuracy, and scope.
Conduct risk assessments using AI tools, facilitating continuous monitoring and proactive risk management for government operations.
Integrate AI into the planning, execution, and reporting phases of IT audits, thereby improving the overall effectiveness of audit processes for government.
Encryption Key Management is the practice of securely creating, storing, distributing, rotating, and retiring cryptographic keys to protect sensitive data and ensure regulatory compliance.
This instructor-led, live training (online or onsite) is designed for intermediate-level IT and security professionals who aim to implement robust encryption key management practices and systems across enterprise environments for government use.
By the end of this training, participants will be able to:
Understand the lifecycle of encryption keys and best practices for their protection.
Set up and manage key management systems (KMS) both on-premises and in the cloud.
Implement access control and auditing mechanisms for key usage.
Comply with regulations and standards related to encryption key security.
Format of the Course
Interactive lecture and discussion.
Hands-on use of key management tools in lab environments.
Guided exercises focused on secure key lifecycle implementation.
Course Customization Options
To request a customized training for this course based on your infrastructure or compliance requirements, please contact us to arrange.
This instructor-led, live training in Georgia (online or onsite) is aimed at advanced-level security analysts who wish to enhance their skills in utilizing advanced Micro Focus ArcSight ESM content to improve an organization's ability to detect, respond, and mitigate cyber threats with greater precision and speed for government operations.
By the end of this training, participants will be able to:
Optimize the use of Micro Focus ArcSight ESM to enhance monitoring and threat detection capabilities for government agencies.
Construct and manage advanced ArcSight variables to refine event streams for more precise analysis in a public sector context.
Develop and implement ArcSight lists and rules for effective event correlation and alerting, ensuring alignment with government workflows and governance standards.
Apply advanced correlation techniques to identify complex threat patterns and reduce false positives, thereby enhancing the overall security posture of government systems.
This instructor-led, live training in Georgia (online or onsite) is aimed at beginner-level law enforcement officers who wish to gain a deeper understanding of human behavior, enhancing their skills in communication, empathy, conflict resolution, and overall effectiveness in their roles for government.
By the end of this training, participants will be able to:
Demonstrate a deeper understanding of human psychology.
Develop advanced communication and conflict resolution skills for more effective interaction with the public, colleagues, and in negotiation scenarios within their official duties.
Promote awareness and understanding of diverse cultural backgrounds, improving community policing and relations with various demographic groups in the context of government service.
This instructor-led, live training in Georgia (online or onsite) is aimed at beginner-level security professionals who wish to acquire the knowledge and skills necessary to adapt to the rapidly evolving digital landscape in the security industry for government.
By the end of this training, participants will be able to:
Understand Digital Transformation in the context of security for government.
Learn how digital solutions can enhance security operations, efficiency, and effectiveness within public sector workflows.
Manage security-related data to support informed decision-making and governance for government.
This instructor-led, live training in Georgia (online or onsite) is aimed at beginner-level security managers who wish to effectively integrate technology into their field for government applications.
By the end of this training, participants will be able to:
Understand the evolution of technology in the security sector for government use.
Learn how to effectively combine traditional security practices with modern technological solutions for government environments.
Grasp the fundamentals of cybersecurity, including the risks associated with digital systems and methods to protect against cyber threats within the security industry for government operations.
This instructor-led, live training in Georgia (online or onsite) is aimed at beginner-level security managers and designers who wish to effectively plan, design, and implement security strategies that are integrated, technologically advanced, and compliant with legal and ethical standards for government.
By the end of this training, participants will be able to:
Understand how to incorporate security considerations into architectural and facility designs.
Evaluate threats and vulnerabilities to inform comprehensive security planning.
Develop robust security plans that address a variety of potential threats.
Create effective emergency response and crisis management plans for government operations.
This instructor-led, live training in Georgia (online or onsite) is designed for beginner-level security administrators who wish to enhance their understanding of security practices within an organization for government settings.
By the end of this training, participants will be able to:
Grasp the foundational principles of security operations and administration.
Identify and address various security threats and vulnerabilities effectively.
Deploy and manage robust security solutions.
Comprehend legal and ethical considerations in security operations for government environments.
Prepare for incident response and disaster recovery procedures.
This instructor-led, live training in Georgia (online or onsite) is aimed at advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
By the end of this training, participants will be able to:
Acquire a thorough understanding of fraud examination principles and the entire fraud examination process.
Learn methods for identifying, investigating, and preventing various types of financial fraud schemes.
Understand the legal framework related to fraud, including the legal elements, relevant laws, and regulations applicable for government.
Develop practical skills in conducting fraud investigations, such as evidence collection, interviewing techniques, and data analysis.
Learn how to design and implement effective fraud prevention and deterrence programs within organizations.
Gain the confidence and knowledge necessary to successfully pass the Certified Fraud Examiner (CFE) exam.
This instructor-led, live training in Georgia (online or onsite) is designed for advanced-level security managers who wish to acquire the knowledge and skills necessary to excel in their roles as security management professionals and succeed in the ISSMP certification exam.
By the end of this training, participants will be able to:
Comprehend the five domains of ISSMP.
Develop competencies to manage an information security program for government.
Learn to establish and maintain effective security governance.
Gain insights into risk management, incident response, and continuity planning.
Prepare thoroughly for the ISSMP certification exam.
This instructor-led, live training in Georgia (online or onsite) is aimed at beginner-level security professionals who wish to thoroughly understand how to protect physical assets, people, and facilities for government use.
By the end of this training, participants will be able to:
Comprehend the fundamentals of physical security for government operations.
Learn about risk assessment and management in the context of physical security for government facilities.
Examine various physical security measures and technologies relevant to government environments.
Understand the integration of physical security with other security domains within government workflows.
Acquire skills in designing and implementing effective physical security plans for government entities.
This instructor-led, live training in Georgia (online or onsite) is aimed at IT professionals who wish to understand how to use the CipherTrust Solution suite for government applications.
By the end of this training, participants will be able to:
Comprehend the CipherTrust Solution and its fundamental functions.
Assess device architecture and usage strategies.
Administer the CipherTrust product suite effectively.
This instructor-led, live training in Georgia (online or onsite) is aimed at security managers who wish to acquire basic to intermediate-level skills in CCTV security surveillance and management for government use.
By the end of this training, participants will be able to:
Understand the various types of CCTV systems and their benefits and features for government applications.
Comprehend cabling requirements and setup procedures for CCTV systems in a public sector context.
Install, configure, and manage CCTV systems to meet the specific needs of government operations.
Disclaimer: Please be advised that this updated CISM exam content outline is applicable to exams starting 1 June 2022.
The Certified Information Security Manager (CISM®) is the most prestigious and demanding qualification for information security managers globally. This certification provides a platform for professionals to become part of an elite peer network, equipped with the ability to continuously learn and adapt to the evolving opportunities and challenges in information security management.
Our CISM training methodology offers comprehensive coverage of the four CISM domains, focusing on building foundational concepts and solving ISACA-released CISM exam questions. The course is designed as an intensive training program and rigorous exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination.
Our instructors encourage all attendees to review the ISACA-released CISM QA&E (Questions, Answers, and Explanations) for exam preparation. This resource is invaluable in helping participants understand the style of questions, effective problem-solving approaches, and rapid assimilation of CISM concepts during live classroom sessions. All our trainers have extensive experience in delivering CISM training and are dedicated to thoroughly preparing you for the CISM examination.
Goal:
The ultimate goal is to pass your CISM examination on the first attempt.
Objectives:
Apply the knowledge gained in a practical manner that benefits your organization
Establish and maintain an information security governance framework to achieve organizational goals and objectives
Manage information risk to an acceptable level to meet business and compliance requirements
Establish and maintain information security architectures (people, process, technology)
Integrate information security requirements into contracts and activities of third parties/suppliers
Plan, establish, and manage the capability to detect, investigate, respond to, and recover from information security incidents to minimize business impact
Target Audience:
Security professionals with 3-5 years of front-line experience
Information security managers or those with management responsibilities
Information security staff, information security assurance providers who require an in-depth understanding of information security management, including: CISOs, CIOs, CSOs, privacy officers, risk managers, security auditors and compliance personnel, BCP/DR personnel, executive and operational managers responsible for assurance functions
This training is designed to support professionals in enhancing their skills and knowledge for government and organizational success.
This instructor-led, live training in Georgia (online or onsite) is designed for government security professionals who wish to enhance their ability to manage security threats and conduct thorough security risk assessments.
By the end of this training, participants will be able to:
Effectively manage security systems and respond to any hostile environments.
Identify and mitigate any security risks or threats.
Acquire the skills necessary to conduct comprehensive security risk assessments for government operations.
This instructor-led, live training in Georgia (online or onsite) is designed for government professionals at the beginner level who wish to gain an understanding of ISO 27001 and its role in enhancing information security within their organizations.
By the end of this training, participants will be able to:
Understand the purpose and benefits of an Information Security Management System (ISMS) for government operations.
Familiarize themselves with key ISO 27001 concepts, terms, and principles relevant to public sector workflows.
Recognize the role of auditors in ensuring compliance within government agencies.
Gain insight into the audit process and continual improvement as outlined in ISO 27001 for government entities.
This instructor-led, live training in Georgia (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to enhance their understanding of GRC frameworks and apply them to secure and compliant business operations for government.
By the end of this training, participants will be able to:
Understand the key components of cybersecurity governance, risk, and compliance for government.
Conduct risk assessments and develop risk mitigation strategies for government environments.
Implement compliance measures and manage regulatory requirements specific to government operations.
Develop and enforce security policies and procedures tailored for government agencies.
This instructor-led, live training in Georgia (online or onsite) is aimed at developers and other professionals who wish to learn and apply OAuth to provide applications with secure delegated access for government use.
By the end of this training, participants will be able to:
Understand the foundational principles of OAuth.
Identify and address the unique security challenges faced by native applications when using OAuth.
Comprehend and utilize common extensions to the OAuth protocols.
Integrate with any OAuth authorization server for government applications.
This instructor-led, live training in Georgia (online or onsite) is aimed at intermediate to expert-level IT professionals who wish to enhance their skills and qualifications in information security or related fields for government.
By the end of this training, participants will be able to:
Understand the differences between ISO/IEC 27001:2013 and ISO/IEC 27001:2022.
Acquire the knowledge and skills necessary to plan and implement the transition from the 2013 to the 2022 version of the standard efficiently.
Apply this knowledge in real-world scenarios, ensuring a smooth transition within their respective organizations.
This instructor-led, live training in Georgia (online or onsite) is aimed at intermediate-level system administrators who wish to learn how to use Siteminder to implement various authentication methods for government systems.
By the end of this training, participants will be able to:
Understand the core concepts of Siteminder and its role in authentication and access management for government applications.
Configure and manage user authentication with Siteminder to enhance security and compliance.
Implement various authentication methods supported by Siteminder to meet diverse government requirements.
Troubleshoot common issues related to Siteminder authentication to ensure uninterrupted service delivery.
Integrate Siteminder with other identity providers for federated authentication, supporting interoperability and seamless access across government agencies.
The ISO/IEC 27002 Lead Manager training equips participants with the essential expertise and knowledge required to support organizations in implementing and managing Information Security controls as outlined in ISO/IEC 27002.
Upon completing this course, participants are eligible to sit for the exam and apply for the “PECB Certified ISO/IEC 27002 Lead Manager” credential. This certification demonstrates mastery of the principles and techniques necessary for implementing and managing Information Security Controls based on ISO/IEC 27002.
Who Should Attend?
Managers or consultants aiming to implement an Information Security Management System (ISMS) in compliance with ISO/IEC 27001 and ISO/IEC 27002
Project managers or consultants seeking to excel in the ISMS implementation process
Individuals responsible for information security, compliance, risk management, and governance within an organization
Members of information security teams
Expert advisors in information technology
Information Security officers
Privacy officers
IT professionals
Chief Technology Officers (CTOs), Chief Information Officers (CIOs), and Chief Information Security Officers (CISOs)
Learning Objectives
Acquire the skills to implement Information Security controls in alignment with the framework and principles of ISO/IEC 27002
Gain a thorough understanding of the concepts, approaches, standards, methods, and techniques necessary for effective implementation and management of Information Security controls
Understand the interrelations between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
Recognize the significance of information security in organizational strategy
Mastery in implementing information security management processes
Mastery in formulating and implementing security requirements and objectives
Educational Approach
The training combines theoretical knowledge with practical application
Lectures are complemented by real-world case studies
Practical exercises based on detailed case studies
Review exercises to aid in exam preparation
A practice test that mirrors the certification exam
General Information
Certification fees are included in the exam price
Participants will receive comprehensive training materials, including over 500 pages of information and practical examples
A participation certificate with 31 CPD (Continuing Professional Development) credits will be issued to participants
In the event of exam failure, a free retake is available within 12 months
This training is designed to enhance the capabilities of professionals for government and private sector organizations alike, ensuring they are well-prepared to address information security challenges effectively.
This comprehensive course is designed to address AI security, governance, compliance, and risk management for government implementations. It is tailored for security professionals, compliance officers, and technology leaders responsible for the secure deployment and governance frameworks of AI systems within public sector organizations.
There is an international focus on combating money laundering. Compliance officers, AML Officers, MLROs, KYC analysts, auditors, and managers need to understand how to ensure compliance with Subsidiary 373.01, the Prevention of Money Laundering and Funding of Terrorism Regulations (PMLFTR).
Under the PMLFTR, all subject persons, including those within the regulated financial services sector, are required to appoint a Money Laundering Reporting Officer (MLRO).
This practical course provides essential knowledge and guidance for government professionals on how to approach AML compliance within their organization, with a particular emphasis on the regulatory environment in Malta.
Basel III is a global regulatory standard on bank capital adequacy, stress testing, and market liquidity risk. Initially agreed upon by the Basel Committee on Banking Supervision in 2010–11, changes to The Accord have extended implementation to March 31, 2019. Basel III strengthens bank capital requirements by increasing bank liquidity and decreasing bank leverage.
Basel III differs from Basel I & II in that it requires different levels of reserves for various forms of deposits and other types of borrowings, working alongside rather than superseding the earlier accords.
Navigating this complex and evolving landscape can be challenging. Our course and training are designed to help you manage likely changes and their impact on your institution. As an accredited training partner with the Basel Certification Institute, Govtra guarantees that our training and materials are up-to-date and effective for government and industry professionals.
Objectives:
Preparation for the Certified Basel Professional Examination.
Define practical strategies and techniques for the definition, measurement, analysis, improvement, and control of operational risk within a banking organization.
Target Audience:
Board members with risk responsibilities
CROs and Heads of Risk Management
Members of the Risk Management team
Compliance, legal, and IT support staff
Equity and Credit Analysts
Portfolio Managers
Rating Agency Analysts
Overview:
Introduction to Basel norms and amendments to the Basel Accord (III)
Regulations for market, credit, counterparty, and liquidity risk
Stress testing for various risk measures, including how to formulate and deliver stress tests
The likely effects of Basel III on the international banking industry, including demonstrations of its practical application
This certificate is designed for individuals with an interest in information security, whether as a career path or to enhance their general business knowledge for government. It is particularly relevant to those who require a foundational understanding of Information Security Management Principles, including professionals looking to build upon this certification with further qualifications or those seeking a comprehensive overview to ensure that organizational information is appropriately protected.
What will I learn:
Candidates should be able to demonstrate:
An understanding of the concepts related to information security management.
Familiarity with current national legislation and regulations that impact information security management.
Awareness of relevant national and international standards, frameworks, and organizations that support the management of information security.
An understanding of the current business and technical environments in which information security management must operate.
Knowledge of the categorization, operation, and effectiveness of various types of controls and their characteristics.
This certification is designed for anyone with an interest in information security, whether as a career path or for enhancing general business knowledge. It is particularly relevant for government personnel who require a foundational understanding of Information Security Management Principles. The certificate also serves individuals considering a career in information security or those who wish to integrate this knowledge into their current professional roles. This program provides a solid foundation that can be built upon with further qualifications, or it can stand alone as a comprehensive overview to help organizations ensure the appropriate protection of their information.
What will I learn:
Candidates should be able to demonstrate:
An understanding of the concepts related to information security management.
Familiarity with current national legislation and regulations that impact information security management, particularly in a government context.
Awareness of relevant national and international standards, frameworks, and organizations that support the management of information security for government operations.
An understanding of the contemporary business and technical environments where information security management must be effectively implemented.
Knowledge of the categorization, operation, and effectiveness of various types of controls and their characteristics.
Note: This is a four-day course that includes an additional day for exam preparation and practice exercises to ensure thorough readiness for government professionals.
This training is designed for individuals involved in information security and information assurance roles within government agencies and organizations.
What will I learn:
Candidates should be able to demonstrate the following skills and knowledge:
The ways in which effective management of information risk can bring significant benefits to government operations.
The ability to explain and utilize information risk management terminology for government applications.
How to conduct threat and vulnerability assessments, business impact analyses, and risk assessments for government environments.
The principles of controls and risk treatment in the context of public sector workflows.
The skills to present assessment results in a format that can serve as the foundation for a comprehensive risk treatment plan for government use.
The application of information classification schemes appropriate for government agencies.
This four-day event (CGEIT training) is designed to ensure that participants pass the challenging CGEIT exam on their first attempt. The CGEIT qualification, awarded by ISACA, is an internationally recognized symbol of excellence in IT governance. It is tailored for professionals responsible for managing IT governance or those with significant advisory or assurance responsibilities in this area. Achieving CGEIT status will provide wider recognition in the marketplace and increased influence at the executive level, particularly for government.
Objectives:
This seminar has been designed to prepare participants for the CGEIT examination by enabling them to supplement their existing knowledge and understanding, thereby better preparing them to pass the exam as defined by ISACA.
Target Audience:
This training course is intended for IT and business professionals with significant IT governance experience who are undertaking the CGEIT exam.
A comprehensive, practical 3-day course designed to provide the knowledge and skills required to manage information security, information assurance, or information risk-based processes for government. The CISMP course is aligned with the latest national information assurance frameworks (IAMM), as well as ISO/IEC 27002 & 27001; the code of practice and standard for information security. This course is a CESG Certified Training (CCT) course.
The course follows the latest BCS syllabus and prepares delegates for the 2-hour multiple-choice BCS examination.
This qualification provides delegates with detailed knowledge of the concepts relating to information security, including confidentiality, integrity, availability, vulnerability, threats, risks, and countermeasures. It also covers an understanding of current legislation and regulations that impact information security management for government. Award holders will be able to apply the practical principles covered throughout the course, ensuring that normal business processes become more robust and secure.
This COBIT 2019 Foundation course is designed to introduce participants to COBIT 2019 and provide an understanding of how an integrated business framework for the governance and management of enterprise IT can be effectively utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course covers are:
Introduction to the new framework
Key concepts and terminology
Governance and framework principles
Components of the governance system
Governance and management objectives
Performance management
Designing a tailored governance system for government
This instructor-led, live training in Georgia (online or onsite) is aimed at payment services compliance professionals who wish to establish, implement, and enforce a comprehensive compliance program within an organization for government and public sector environments.
By the end of this training, participants will be able to:
Comprehend the regulations established by government regulators for payment service providers.
Develop internal policies and procedures that meet government regulatory requirements.
Implement a compliance program that aligns with applicable laws and regulations.
Ensure all organizational processes and procedures are in compliance with the established compliance program.
Maintain the organization’s reputation while safeguarding it from legal actions.
Network security begins at the physical level. In this instructor-led, live training in Georgia, participants will learn about the security risks associated with computer server rooms and how to enhance security through best practices, strategic planning, and technology implementation for government.
By the end of this training, participants will be able to:
Evaluate their organization's security risk as it pertains to computer server rooms.
Establish control and monitoring systems to limit physical access to critical infrastructure.
Develop access policies tailored to different roles within the organization.
Communicate security policies effectively with team members.
Cybersecurity skills are in high demand, as threats continue to impact enterprises across the nation. According to a survey by ISACA, an overwhelming majority of professionals recognize this trend and plan to work in positions that require cybersecurity knowledge. To address this gap, ISACA has developed the Cybersecurity Fundamentals Certificate, which provides essential education and verification of skills for government and other sectors.
Objectives:
With cybersecurity threats on the rise and a growing shortage of appropriately equipped security professionals, ISACA's Cybersecurity Fundamentals Certificate program is an ideal solution to quickly train entry-level employees. This ensures they have the necessary skills and knowledge to effectively operate in the cyber arena for government and other organizations.
Target Audience:
The certificate program is also one of the best ways to gain foundational knowledge in cybersecurity and begin building your skills and knowledge in this critical area, particularly for those seeking to serve in public sector roles.
In this instructor-led, live training in Georgia, participants will gain the knowledge and skills needed to develop an effective security strategy to address the unique challenges of DevOps for government. The course focuses on aligning security practices with public sector workflows, governance, and accountability requirements.
This course offers an expert introduction to the newly enacted Accessibility Law, equipping developers with the practical skills necessary to design, develop, and maintain fully accessible applications. The curriculum begins with a detailed discussion on the law's significance and implications for government, followed by hands-on coding practices, tools, and testing techniques to ensure compliance and inclusivity for users with disabilities.
To ensure that an individual has a core understanding of GRC processes and capabilities, and the skills necessary to integrate governance, performance management, risk management, internal control, and compliance activities for government.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a U.S. legislation that provides provisions for data privacy and security in the handling and storing of medical information. These guidelines serve as a robust standard for developing health applications, applicable regardless of geographic location. Applications compliant with HIPAA are widely recognized and trusted globally.
In this instructor-led, live training (remote), participants will gain an understanding of the fundamentals of HIPAA through a series of hands-on live-lab exercises.
By the end of this training, participants will be able to:
Understand the basics of HIPAA
Develop health applications that meet HIPAA compliance standards
Utilize developer tools for ensuring HIPAA compliance
Audience
Developers
Product Managers
Data Privacy Officers
Format of the Course
Part lecture, part discussion, with exercises and extensive hands-on practice.
Note
To request a customized training for government, please contact us to arrange.
This instructor-led, live training in Georgia (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant for government use.
By the end of this training, participants will be able to:
Comprehend the core principles of the HiTrust CSF (Common Security Framework).
Recognize the administrative and security control domains within the HITRUST CSF.
Gain knowledge about the various types of HiTrust assessments and scoring methodologies.
Understand the certification process and requirements for achieving HiTrust compliance.
Acquire best practices and strategies for implementing the HiTrust framework effectively.
The ISO/IEC 27001 Foundation training provides a comprehensive understanding of the essential elements required to implement and manage an Information Security Management System (ISMS) as outlined in ISO/IEC 27001. This training course will cover various components of the ISMS, such as policy development, procedures, performance measurement, management commitment, internal audits, management reviews, and continuous improvement.
Upon completion of this course, you will be eligible to take the certification exam and apply for the “PECB Certified ISO/IEC 27001 Foundation” credential. This certification demonstrates your proficiency in the fundamental methodologies, requirements, framework, and management approaches necessary for government and public sector organizations.
Who Should Attend?
Individuals involved in Information Security Management within their organizations
Professionals seeking to gain knowledge about the core processes of Information Security Management Systems (ISMS)
Those interested in advancing their careers in Information Security Management for government and other public sector entities
Educational Approach
Lecture sessions are enriched with practical questions and real-world examples to enhance understanding.
Practical exercises include case studies and group discussions to reinforce learning.
Practice tests simulate the Certification Exam environment, providing a realistic assessment of your knowledge and readiness.
The ISO/IEC 27001 Lead Auditor training program equips participants with the essential expertise to conduct Information Security Management System (ISMS) audits, utilizing widely recognized audit principles, procedures, and techniques.
Why Should You Attend?
Throughout this training course, you will gain the knowledge and skills required to plan and execute both internal and external audits in accordance with ISO 19011 and the ISO/IEC 17021-1 certification process.
Through practical exercises, you will master audit techniques and become proficient in managing an audit program, leading an audit team, communicating with clients, and resolving conflicts.
Upon acquiring the necessary expertise to perform these audits, you can take the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. Holding a PECB Lead Auditor Certificate will demonstrate your capability and competence to conduct audits based on best practices, which is particularly valuable for government agencies.
Who Should Attend?
Auditors aiming to perform and lead ISMS certification audits
Managers or consultants seeking to master the ISMS audit process
Individuals responsible for maintaining compliance with ISMS requirements
Technical experts preparing for an ISMS audit
Expert advisors in Information Security Management
Learning Objectives
Understand the operations of an ISMS based on ISO/IEC 27001
Recognize the relationship between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Comprehend an auditor’s role in planning, leading, and following up on a management system audit according to ISO 19011
Learn how to lead an audit and manage an audit team
Understand how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
Acquire the competencies necessary to plan, lead, draft reports, and follow up on audits in compliance with ISO 19011
Educational Approach
This training combines theoretical knowledge with best practices used in ISMS audits
Lecture sessions are supplemented with examples based on case studies
Practical exercises include role-playing and discussions based on a case study
The ISO/IEC 27002 Introduction training course equips you with a comprehensive understanding of Information Security Management Systems and Information Security Controls as outlined in ISO/IEC 27002.
By participating in the ISO/IEC 27002 Introduction training course, you will gain insight into the significance of ISMS and Information Security Controls, as well as the advantages they offer to businesses, society, and governments for government.
Who Should Attend?
Individuals interested in Information Security Management and Information Security Controls
Those seeking to acquire knowledge about the core processes of Information Security Management Systems and Information Security Controls
Learning Objectives
Understand the Information Security standards and practices used to implement and manage Information Security Controls
Grasp the controls essential for managing Information Security risks
This course will equip participants with the skills necessary to establish information security in accordance with ISO 27005, which focuses on information security risk management based on ISO 27001. The training is designed to align with best practices and standards for government, ensuring that participants can effectively manage and mitigate risks within public sector environments.
The ISO/IEC 27005 Lead Risk Manager training equips participants with the essential expertise to support an organization in managing risks related to all information security assets. This training uses the ISO/IEC 27005 standard as a reference framework, providing a comprehensive understanding of the process model for designing and developing an Information Security Risk Management program. The course also covers best practices in risk assessment methods such as OCTAVE, EBIOS, MEHARI, and harmonized TRA. This training supports the implementation of the ISMS framework outlined in the ISO/IEC 27001 standard, enhancing compliance and security for government.
After acquiring a thorough understanding of Information Security Risk Management based on ISO/IEC 27005, participants can sit for the exam to earn the “PECB Certified ISO/IEC 27005 Lead Risk Manager” credential. Holding this certificate demonstrates practical knowledge and professional capabilities to lead and support teams in managing information security risks.
Who Should Attend?
Information Security risk managers
Information Security team members
Individuals responsible for Information Security, compliance, and risk within an organization
Individuals implementing ISO/IEC 27001 or seeking to comply with ISO/IEC 27001
IT consultants
IT professionals
Information Security officers
Privacy officers
Examination - Duration: 3 hours
The “PECB Certified ISO/IEC 27005 Lead Risk Manager” exam fully aligns with the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains:
Domain 1: Fundamental principles and concepts of Information Security Risk Management
Domain 2: Implementation of an Information Security Risk Management program
Domain 3: Information security risk assessment
Domain 4: Information security risk treatment
Domain 5: Information security risk communication, monitoring, and improvement
Domain 6: Information security risk assessment methodologies
General Information
Certification fees are included in the exam price
Training materials containing over 350 pages of information and practical examples will be provided
A participation certificate with 21 CPD (Continuing Professional Development) credits will be issued
In case of exam failure, you can retake the exam within 12 months at no additional cost
Information security threats and attacks are evolving and increasing in sophistication. The most effective defense against these challenges is the proper implementation and management of information security controls and best practices. Information security is a critical expectation and requirement for customers, legislators, and other stakeholders.
This training course is designed to prepare participants for implementing an information security management system (ISMS) based on ISO/IEC 27001. It aims to provide a comprehensive understanding of ISMS best practices and a framework for its continuous management and improvement, specifically tailored for government contexts.
After completing the training course, you can take the exam. If you successfully pass it, you can apply for the “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001.
Who Can Attend?
Project managers and consultants involved in and concerned with the implementation of an ISMS for government
Expert advisors seeking to master the implementation of an ISMS within public sector organizations
Individuals responsible for ensuring compliance with information security requirements within an organization
Members of an ISMS implementation team
General Information
Certification fees are included in the exam price.
Training material containing over 450 pages of information and practical examples will be distributed.
A participation certificate with 31 CPD (Continuing Professional Development) credits will be issued.
In case of exam failure, you can retake the exam within 12 months free of charge.
Educational Approach
This training course includes essay-type exercises, multiple-choice quizzes, examples, and best practices used in the implementation of an ISMS for government.
Participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises.
The exercises are based on a case study relevant to public sector workflows and governance.
The structure of the quizzes mirrors that of the certification exam, ensuring participants are well-prepared for assessment.
Learning Objectives
This training course will help you:
Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS within public sector organizations.
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks relevant to government operations.
Understand the operation of an information security management system and its processes based on ISO/IEC 27001, with a focus on public sector applications.
Learn how to interpret and implement the requirements of ISO/IEC 27001 in the specific context of government organizations.
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS for government.
Auditors seeking to perform and lead information security management system (ISMS) audits for government
Managers or consultants aiming to master the ISMS audit process for government
Individuals responsible for maintaining conformity with ISMS requirements within an organization
Technical experts preparing for ISMS audits in a governmental context
Expert advisors in information security management for government
Learning Objectives
By the end of this training course, participants will be able to:
Explain the fundamental concepts and principles of an ISMS based on ISO/IEC 27001 standards for government
Interpret ISO/IEC 27001 requirements for an ISMS from the perspective of an auditor in a governmental setting
Evaluate ISMS conformity to ISO/IEC 27001 requirements, adhering to fundamental audit concepts and principles for government
Plan, conduct, and close an ISO/IEC 27001 compliance audit, following ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing for government
Manage an ISO/IEC 27001 audit program for government
Educational Approach
This training combines theoretical knowledge with best practices used in ISMS audits for government
Lecture sessions are enriched with examples based on case studies relevant to the public sector
Practical exercises include role-playing and discussions centered around a case study applicable to governmental operations
Practice tests simulate the Certification Exam, preparing participants for real-world application in a governmental context
All staff who require a working knowledge of Compliance and the Management of Risk for government operations.
Format of the Course
The course is structured as a combination of:
Facilitated Discussions
Slide Presentations
Case Studies
Examples
Course Objectives
By the end of this course, participants will be able to:
Understand the major facets of Compliance and the national and international efforts being made to manage risk related to it for government operations.
Define the methods by which a government agency and its staff can establish a Compliance Risk Management Framework.
Detail the roles of Compliance Officer and Money Laundering Reporting Officer and how these roles should be integrated into governmental business processes.
Understand key areas of Financial Crime, particularly as they pertain to International Business, Offshore Centers, and High-Net-Worth Clients for government oversight.
This instructor-led, live training in Georgia (online or onsite) focuses on analyzing the risks associated with Open Data while enhancing resilience against data loss or disasters for government operations.
By the end of this training, participants will be able to:
Comprehend the principles and advantages of Open Data for government.
Recognize various types of data relevant to public sector workflows.
Understand the potential risks of Open Data and methods to mitigate these risks for government.
Develop strategies to manage Open Data risks and create a robust contingency plan for government agencies.
Implement effective risk mitigation techniques to minimize the likelihood of disasters in the context of Open Data for government.
This instructor-led, live Payment Card Industry Professional training in Georgia (online or onsite) provides an individual qualification for industry practitioners who wish to demonstrate their professional expertise and understanding of the PCI Data Security Standard (PCI DSS) for government and other public sector entities.
By the end of this training, participants will be able to:
Understand the payment process and the PCI standards designed to protect it within governmental workflows.
Comprehend the roles and responsibilities for entities involved in the payment industry, including those specific to government operations.
Gain deep insight into, and a thorough understanding of, the 12 PCI DSS requirements as they apply to public sector organizations.
Demonstrate knowledge of how PCI DSS applies to government agencies and other organizations that are involved in the transaction process.
The governance of any organization is only as strong as its board of directors, and that board's effectiveness hinges on the capabilities of its chairman. However, the role of board leadership is both the most critical for ensuring board efficacy and the one with the least training and support. Board leaders and chief executives frequently struggle over power dynamics. This document highlights the best practices of the world’s leading board leaders, offering insights into the “in the boardroom” strategies that seasoned professionals have honed over time, specifically tailored for government applications.
This instructor-led, live training in Georgia (online or onsite) is aimed at IT administrators, security coordinators, and compliance managers who wish to identify, evaluate, and implement security policy management methods for government.
By the end of this training, participants will be able to develop, manage, and monitor security policies to protect their organization's information, network, and physical and software assets in alignment with public sector workflows, governance, and accountability.
If you are seeking your first board seat or have recently been appointed to a board role and need to prepare for your initial board meeting, this one-day program is designed to equip you with the essential knowledge and skills for effective boardroom participation. Additionally, organizations may wish to enhance the readiness of their emerging managers and diverse talent pools to ensure they are well-prepared for boardroom inclusion and effectiveness. This comprehensive program will provide all the necessary information and insights to ensure you are fully prepared and confident when you enter the boardroom, aligning with the highest standards of governance and accountability for government and public sector environments.
Read more...
Last Updated:
Testimonials (8)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.
Tayyeb Mahmood - Ajman Municipality
Course - COBIT 2019 Foundation
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.
Marco van den Berg - ZiuZ Medical B.V.
Course - HIPAA Compliance for Developers
I genuinely was benefit from the communication skills of the trainer.
Flavio Guerrieri
Course - CISM - Certified Information Security Manager
I genuinely enjoyed the real examples of the trainer.
Joana Gomes
Course - Compliance and the Management of Compliance Risk
Online Security Management training in Georgia, Security Management training courses in Georgia, Weekend Security Management courses in Georgia, Evening Security Management training in Georgia, Security Management instructor-led in Georgia, Weekend Security Management training in Georgia, Security Management trainer in Georgia, Online Security Management training in Georgia, Security Management one on one training in Georgia, Security Management instructor in Georgia, Security Management coaching in Georgia, Security Management boot camp in Georgia, Security Management on-site in Georgia, Security Management instructor-led in Georgia, Security Management private courses in Georgia, Evening Security Management courses in Georgia, Security Management classes in Georgia