Select Page

Master Class:
Information Security Management

This master class program is designed for people responsible for setting up and managing information security in organizations.  It contains deep learning in all major areas of information security management. It is indented for people who would like to go beyond the theory and be able to carry out the job in the various areas of information security management. As a bonus after the training candidate can prepare to take major information security certification exams.

What is included in the Master Class?

  • 1 x Master Class per subject area
  • 20 Webinars per year on selected information Security topics
  • 4 x One-day live security events per year
  • 1 x Yearly information security event
  • Several Continue Education Events
  • Certificate of completion is awarded at the end of every session for your CPE

What is in a Master Class Program

This Master class program is designed for security professionals who would like to gain the knowledge required to obtain multiple information security management certifications. The class is optimized to present the required knowledge to the student in a compact and straight form without redundancies.

One of the challenges of Information security management training offers today is the lack of dept and repetition of various subjects. In this program we have examined four certification programs that are geared toward the information security management professionals and compress them into the master class. By doing this we have reduced the time spent on these certifications totally with about 40%. Despite this we can go very deep in each subject and provide the students practical help on real life implementation.

How did we do this? Each of these certification programs has some unique subjects that are useful to the security professionals. However, there are also lots of recurring and redundant subjects such as Risk management, Business Continuity Planning, Incident management, cloud security, Assets management, Data classification, Networking, etc. Therefore, instead of doing these programs four times from different vendors, we have grouped them into similar topics and handle them at once going deep.

The Information Security Management Master class covers the following certification program:

  • ISC2 Certified Information Systems Security Professional (CISSP)
  • ISACA Certified Information Security Management (CISM)
  • EC Council Certified Chief Information Security Officer (CCISO)
  • ISACA Certified in Risk and Information Security Control (CRISC)

Despite the concentration of this program you will get additional support and resources to pass the associated certification exam.

After Class Instructor Support

Each Master class in supported through our online portal where instructors are available to answer students’ questions and help them with difficult challenges. The support is available throughout the duration of the master class program.

Exam Preparation

We organized Exam preparation days for those who are interested to help them prepare for the examination. There are four optional exam preparation days. One for the certification exam.

  • ISC2 Certified Information Systems Security Professional (CISSP) I day
  • ISACA Certified Information Security Management (CISM) 1 day
  • EC Council Certified Chief Information Security Officer (CCISO) 1 day
  • ISACA Certified in Risk and Information Security Control (CRISC) 1 day

Master Class Support Content

All our Master class participants can attend any of our security events during the year free. We have several security events each month specific to the Information Security Management field to provide the students with insights and in-depth discussions and workshops on related information security topics. Below are some examples of our security events:

  • How to protect against Social Engineering
  • Understand and protect the organisation from Ransomware
  • Helping the organisation with the GDPR Compliance
  • Introduction to cybersecurity
  • Implementing Mobile Device Security
  • Introduction to Cloud Security
  • The First 90 days of CISO
  • Cyber Security Risk Management
  • Building Security into Software Development
  • Threat Modelling in Software Development Life Cycle (SDLC).
  • Integrating security into Agile Software development.
  • Integrating security into DevOps
  • Understanding Zero Trust Security
  • Implementing Data Loss Prevention (DLP) Program
  • Severless Security