- Full Price
- 512 QR
- You Save
- 463 QR
Fine Print
- Valid from 7 Sep – 7 Nov 2023
- Redemption period: 2 months from the deal’s start date
- Refunds/cancellations are NOT permitted once the voucher has been redeemed
- ONE voucher per person; may buy multiple vouchers as gifts
- Certificates can be obtained at an additional cost of £9.99 for PDF, £16.99 for Printed Hardcopy format, and £24.99 for both PDF and Hardcopy Certificates
- To be eligible for the certificate, you need to successfully complete the course and pass each course module
- For information/inquiries, visit: IT Cyber Security or contact via [email protected] Internet access and audio required
- Not valid with other offers
- No cash value/No cash back/No refunds
How to Redeem:
To activate your voucher and assign your course:
- Visit the Redeem Voucher page
- Fill out the necessary information and submit
- Also, email us the Purchased Course Name and Voucher Code at [email protected] after the purchase
NOTE: The discount will only be applied after entry of voucher code during checkout
Please see the terms for all deals here
Highlights
IT Cybersecurity Bundle: CISA, CISM & CISSP Exam Preparation Online Course
Pay QR49 instead of QR512
- Create your cybersecurity roadmap through this guided course!
- Understand the basics of cybersecurity & distinguish the main cybersecurity certifications available in the market
- No prerequisites! Even beginners who are starting their career in the cyber security field can join the online class
- Learners who take this course & undergo cybersecurity qualifications enjoy similar passing rates as those who attended traditional classroom courses!
- This course grants learners unlimited access! Go through the contents again & again, anytime you want!
See below for the course outline!
Launch a fulfilling career in Cybersecurity!
CISA – Certified Information Systems Auditor
The Process of Auditing Information Systems
- Management of the Audit Function
- ISACA IT Audit and Assurance Standards and Guidelines
- Risk Analysis
- Internal Controls
- Performing An IS Audit
- Control Self-Assessment
- The Evolving IS Audit Process
Governance and Management of IT
- Corporate Governance
- IT Governance
- IT Monitoring and Assurance Practices for Board and Senior Management
- Information Systems Strategy
- Maturity and Process Improvement Models
- IT Investment and Allocation Practices
- Policies and Procedures
- Risk Management
- IS Management Practices
- IS Organizational Structure and Responsibilities
- Auditing IT Governance Structure and Implementation
- Business Continuity Planning
Information Systems Acquisition, Development and Implementation
- Business Realization
- Project Management Structure
- Project Management Practices
- Business Application Development
- Business Application Systems
- Alternative Forms of Software Project Organization
- Alternative Development Methods
- Infrastructure Development/Acquisition Practices
- Information Systems Maintenance Practices
- System Development Tools And Productivity Aids
- Business Process Reengineering And Process Change Projects
- Application Controls
- Auditing Application Controls
- Auditing Systems Development, Acquisition And Maintenance
Information Systems Operations, Maintenance and Support
- Information Systems Operations
- Information Systems Hardware
- IS Architecture and Software
- Network Infrastructure
- Disaster Recovery Planning
Protection of Information Assets
- Importance Of Information Security
- Logical Access
- Network Infrastructure Security
- Auditing Information Security Management Framework
- Auditing Network Infrastructure Security
- Environmental Exposures and Controls
- Physical Access Exposures and Controls
- Mobile Computing
CISM – Certified Information Security Manager
Information Security Governance
- Information Security Governance Overview
- Effective Information Security Governance
- Information Security Concepts and Technologies
- Information Security Manager
- Scope and Charter of Information Security Governance
- Information Security Governance Metrics
- Information Security Strategy Overview
- Creating Information Security Strategy
- Determining Current State Of Security
- Information Security Strategy Development
- Strategy Resources
- Strategy Constraints
- Action Plan to Implement Strategy
Information Risk Management
- Risk Management Overview
- Good Information Security Risk Management
- Information Security Risk Management Concepts
- Implementing Risk Management
- Risk Assessment
- Controls Countermeasures
- Recovery Time Objectives
- Risk Monitoring and Communication
Information Security Program Development
- Development of Information Security Program
- Information Security Program Objectives
- Information Security Program Development Concepts
- Scope and Charter of Information Security Program Development
- Auditing Information Security Management Framework
- Information Security Framework Components
- Information Security Program Resources
- Implementing an Information Security Program
- Information Infrastructure and Architecture
- Development of Information Security Program
- Security Program Services and Operational Activities
Information Security Incident Management
- Incident Management Overview
- Incident Response Procedures
- Incident Management Organization
- Incident Management Resources
- Incident Management Objectives
- Incident Management Metrics and Indicators
- Current State of Incident Response Capability
- Developing an Incident Response Plan
- BCP DRP
- Testing Response and Recovery Plans
- Executing the Plan
CISSP – Certified information Systems Security Professional
Information Systems Security
- Security and Risk Management
- Asset Security
- Security Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
Mock Exam
Mock Exam – IT Cyber Security (CISA, CISM, CISSP)
Final Exam
Final Exam – IT Cyber Security (CISA, CISM, CISSP)
Company Profile
With a rapidly growing international presence, St. Paul’s College is a UK-based provider of online courses. Their courses are not only aimed at the broad spectrum of individuals looking to acquire a qualification to boost their skills and expertise, but also at businesses. In addition to helping countless individuals, they also offer a range of services to different types of organizations. Their courses help people and businesses become the best they can be, adding value and driving professional development forward.
They have flexibility and convenience at heart. This is why their courses and training packages are simple to use and accessible anytime, anywhere. Ideal for busy individuals and companies, who simply don’t have the time to learn or conduct training at a physical learning institution, the courses can be accessed on a PC, tablet, or mobile.
Good value and support are also key priorities. Their courses and training packages are competitively and transparently priced, with a range of affordable training packages offered to companies of differing sizes, and the potential to create tailored solutions. They also offer 24/7 support from their online live chat and email help desks, on top of the ongoing support offered by instructors.