Privacy by design turns generic concepts in legislation into practical case-based knowledge to implement in projects or applications aimed at a better protection of client, employee or user data, and…
The second module of the Certified CISO training programme is a bit more technical, diving into the world of security architectures. We do not only touch on theoretical architecture models…
This training will show you the basics to set up, manage and measure threat and vulnerability processes. It will demonstrate how security events are identified and logged, show different types…
During this training you will work as a GDPR auditor. On the basis of a developed GDPR management system, you will assess a company's GDPR requirements.
With this Secure System Acquisition and Development module we will teach you to set up and improve a Secure Software Program (SSP) to manage the identification, analysis, and specification of…
The CISO Leadership training will help you in showing what your position as a CISO could be within your organisation. It will tell you who your stakeholders are, how to…
With this hybrid online training we will teach you to become a threat modeling practitioner; how to threat model, and “build in” security as part of your secure development practice.
This introduction course learns you how to govern your company data – which is essential to understand your data and how you can use it to obtain value from it…
This 5-day course trains you for the position of Data Protection Officer (DPO) in your company. Are you looking for a training course that will introduce you to the function…
With this training, we will guide you through the process of creating, maintaining, governing your asset inventory; managing devices, networks and application security, as well as establishing best practices in…
With this training, we will guide you through the process of defining, implementing, and managing an Information Security Governance Programme. That includes how to organise security, the various personnel involved,…
Accelerating Business with Data aims to give business teams and business leaders the understanding and mindset they need to tap into data’s true potential, along with how to use tools…
Stay informed via our newsletter
Stay connected with our latest news, offers and available training.
0
We use cookies to optimise our website and our services.
Functional
Always active
De technische opslag of toegang is strikt noodzakelijk voor het legitieme doel het gebruik mogelijk te maken van een specifieke dienst waarom de abonnee of gebruiker uitdrukkelijk heeft gevraagd, of met als enig doel de uitvoering van de transmissie van een communicatie over een elektronisch communicatienetwerk.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.De technische opslag of toegang die uitsluitend wordt gebruikt voor anonieme statistische doeleinden. Zonder dagvaarding, vrijwillige naleving door uw Internet Service Provider, of aanvullende gegevens van een derde partij, kan informatie die alleen voor dit doel wordt opgeslagen of opgehaald gewoonlijk niet worden gebruikt om je te identificeren.
Marketing
De technische opslag of toegang is nodig om gebruikersprofielen op te stellen voor het verzenden van reclame, of om de gebruiker op een website of over verschillende websites te volgen voor soortgelijke marketingdoeleinden.