Skip to Main Content
Learn for less: Save 10% on high-quality foundation and auditor training. Find out more

Your search results for: e-learning suite

Showing 61 - 80 of 819 results
/publicsector
/GDPR-Compliance-quick-wins
Kick-start your GDPR compliance journey by following these simple steps. ...
/cyber-security-for-universities
Cyber security has long been a challenge for universities. IT Governance offers a complete range of consultancy, training, security testing and accreditation services to help you to protect your systems. Find out more today. ...
/customisation-options
/data-breach-reporting/situational-analysis-data-breach
/spend-and-save
/cgeit
Everything you need to know about ISACA’s CGEIT programme: details of the five domains, latest exam dates and study materials. ...
/green-it
Awareness of environmental issues and their human influences is increasing. Organisations face numerous statutory and regulatory environmental requirements, and their customers and stakeholders frequently require them to demonstrate that they adhere to environmental best practice. ...
/ISO50001-2011-Energy-Management-Systems
SO 50001:2011 is the international standard for ‘Energy Management Systems – requirements with guidance for use’. ISO50001 supersedes the European EN16001:2009 ‘Energy Management Systems’ Standard. ...
/Data-Privacy/Data-Protection/The-PECR-(Privacy-and-Electronic-Communications-Regulations)-and-EU-ePrivacy-Directive
The PECR (Privacy and Electronic Communications (EC Directive) Regulations 2003) implement the EU’s ePrivacy Directive (Directive 2002/58/EC) and set out privacy rights relating to electronic communications. ...
/erm
IT Governance seeks to promote good Enterprise risk management and IT governance, providing services and tools to help develop effective governance systems. IT Governance has materials that serve as a guide for enterprise risk management. ...
/enterprise-architecture
Books, tools and information on Enterprise Architecture ...
/Cyber-Essentials-Scheme
Get started with the Cyber Essentials scheme. Click here to download our free guide, or get in touch to find out how we can help you get certified. ...
/encryption-dpa
Find out how to follow ICO advice that all endpoint devices - laptops, USB sticks and mobile media - must be encrypted to FIPS 140-2 ...
This website uses cookies. View our cookie policy
SAVE 10%
ON SELECTED
TRAINING
Loading...