Skip to Main Content
Learn for less: Save 25% on high-quality instructor-led and self-paced foundation training. Find out more

Sorry, the page you're looking for cannot be found

 You may not have been able to visit your page because of:

   1. An out-of-date bookmark/favourite
   2. A search engine that has an out-of-date listing
   3. A mistyped address
   4. You don't have access to this page
   5. The requested resource was not found
   6. An error has occurred whilst processing your request

Are you looking for:

An Introduction to Hacking and Crimeware - A Pocket Guide
Overview

Defend your business, protect your livelihood, safeguard your future.

  • How safe are you online?
  • Is your information protected?
  • What risks are you taking with your data?
  • How do you protect yourself from cybercrime?

Cybercrime is on the rise, and it is becoming easier and easier for criminals to steal your personal information. Toolkits to create viruses, spyware, and other forms of malware are now readily available to anyone wishing to defraud and do damage, and you could be leaving yourself open to attack.

It is estimated that standard computer-based defence systems catch only 25% of malware attacks. Do you know the risks you’re running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime.


Know your enemy

An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack.


Fight back

In this pocket guide, the author:

  • Identifies terms and defines exactly what crimeware is, both intentional and unintentional
  • Gives specific, up-to-date examples to help you identify the risks so that you can protect your business
  • Explores the increasing use of commercial off-the-shelf (COTS) hacking tools, exposing the enemy’s tactics
  • Gives practical suggestions of active defence, so you can fight back
  • Provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business. 
About the author

Victoria Loewengart

Victoria Loewengart is a partner and co-founder of two organisations: AKOTA Technologies (www.akotatech.com) and Technology and Business Insider (www.insidertalk.net). She has more than 25 years' experience in cyberspace development, management and exploration. For much of her career, Victoria has worked in support of military and intelligence agencies, which is where she became fascinated with all aspects of cyber security and intelligence technologies, and she has conducted extensive research in this area.

The Psychology of Information Security - Resolving conflicts between security compliance and human behaviour
Overview

Security programmes cannot succeed without considering people

When implementing security polices, information security professionals are constantly faced with a conflict between the security team and the rest of the business. They must ensure that their organisation is adequately addressing information security risks, whilst also communicating the value of security appropriately.

David Ferbrache, Technical Director at KPMG UK, says “No approach can ever succeed without considering people – and as a profession we need to look beyond our computers to understand the business, the culture of the organisations, and, most of all, how we can create a security environment which helps people feel free to actually do their job.”

By gaining an understanding of the psychology of information security, you can ensure your security programme is a success.


Augusta University’s Cyber Institute adopted the book “The Psychology of Information Security” as part of our Master’s in Information Security Management program because we feel that the human factor plays an important role in securing and defending an organization…We want our students to not only understand technical and managerial aspects of security, but psychological aspects as well.”

 -Director of Graduate Studies in Information Security Management, Augusta University


Understand human behaviour and users’ motivations

Based on insights gained from academic research and interviews with security professionals from various sectors, this essential guide explains the importance of careful risk management and reveals how to align a security programme with wider business objectives, providing methods and techniques to engage stakeholders and encourage buy-in.

The Psychology of Information Security redresses the balance by considering information security from both end users’ and security professionals’ perspectives, and helps you to understand how a security culture, that puts risk into context, promotes compliance.

Look inside this book


Contents 

  • Introduction to information security
  • Risk management
  • The complexity of risk management
  • Stakeholders and communication
  • Information security governance
  • Problems with policies
  • How security managers make decisions
  • How users make decisions
  • Security and usability
  • Security culture
  • The psychology of compliance
  • Conclusion – Changing the approach to security
  • Appendix: Analogies 
About the author

Leron Zinatullin

Leron Zinatullin (zinatullin.com) is an experienced risk consultant specialising in cyber security strategy, management and delivery. He has led large-scale, global, high-value security transformation projects with a view to improve cost performance and support business strategy.

He has extensive knowledge and practical experience in solving information security, privacy and architectural issues across multiple industry sectors.

He has an MSc in information security from University College London, where he focused on the human aspects of information security. His research was related to modelling conflicts between security compliance and human behaviour.

ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS)
Overview

Safeguard your organisation’s future with business continuity management

Business continuity – planning for, protecting against and ensuring recovery from disruptive events – is more important than ever.

In an increasingly volatile world – exemplified by the COVID-19 pandemic – organisations are looking at business continuity from a fresh perspective. The illusion of business as a rampart against which the waves of the world break harmlessly is shattered; it is no longer possible to pretend that an organisation can weather all storms equally, or that the limited contingencies organisations develop are sufficient to protect them.

As a result, more and more organisations are looking to ISO 22301 – the international standard that defines the requirements for a BCMS – to safeguard their future.


ISO 22301 requirements and business continuity best practice

ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS) walks you through the requirements of ISO 22301:2019, explaining what they mean and how your organisation can achieve compliance. Whether you are seeking certification against the Standard or are simply looking to benefit from business continuity concepts and practices without developing a formal system, this book contains all you need to know.

It is an essential companion guide for those working in business continuity who are looking to introduce or optimise a BCMS aligned with ISO 22301. The book provides a comprehensive introduction to business continuity best practice, including:

  • Using ISO 22301
  • Context, interested parties and scope
  • Leadership, policy and responsibilities
  • Planning
  • Support
  • Operation
  • Business continuity strategies and solutions
  • Business continuity plans and procedures
  • Performance evaluation
  • Improvement
  • Certification

Suitable for business continuity managers, risk managers, compliance officers, senior managers, operations managers, project managers and consultants, this practical guide to ISO 22301 will show you how to develop and implement a BCMS so you can minimise the impact of a disaster on your business and continue to provide essential services to your customers, while reassuring all stakeholders that you take business continuity best practice seriously.

Minimise the impact of a disaster on your business with ISO 22301 – buy this book today!

About the author

Alan Calder

Alan Calder is the Group CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru, and a leading author on information security and IT governance issues. He has been involved in the development of a wide range of information security management training courses that have been accredited by IBITGQ (International Board for IT Governance Qualifications). Alan has consulted for clients across the globe and is a regular media commentator and speaker.

Certified GDPR Foundation and Practitioner and Data Protection Officer (C-DPO) Accelerated Combination Training Course
Description

Training course outline

This course is ideal if you are looking to advance your knowledge and take the next step in your GDPR career by becoming a DPO. Under the GDPR, DPOs are required to have a level of expertise in national and European data protection law, as well as in-depth knowledge of the Regulation. They must also have a good understanding of how to build, implement and manage data protection programmes.

This combination course will equip you with in-depth knowledge of the GDPR and the skills you need to meet the Regulation’s DPO requirements.

The Certified GDPR Foundation Training Course provides a comprehensive introduction to the GDPR, its implications and what it means for your organisation. It covers the six data protection principles, data subjects’ rights, securing personal data, reporting data breaches, and transferring personal data outside of the UK.

Learn from an experienced privacy consultant and get a practical understanding of the GDPR. The Certified GDPR Practitioner Training Course discusses how each aspect of the Regulation can be translated into implementation actions for your organisation. Understand how the GDPR applies in a real-world context with real-life examples.

Gain the knowledge and operational skills to fulfil the DPO role and understand how it fits in with other departments in an organisation. The Certified Data Protection Officer (C-DPO) Accelerated Training Course uses practical examples and exercises and will teach you how to monitor and maintain compliance with the GDPR.


Certified GDPR Foundation and Practitioner and Data Protection Officer (C-DPO) Accelerated Combination Training Course benefits

 Developed by experts

Designed and developed using our extensive experience gained advising on compliance with data privacy laws and related information security standards.

 Fast-track to certification

Successful completion of the course and included exam leads to the ISO 17024-certificated UK GDPR F, UK GDPR P and C-DPO Provisional Level qualifications.

 A complete masterclass on GDPR requirements

Develop the operational skills and knowledge to perform the DPO role, and all the activities required to ensure GDPR compliance.

 Delivered by professionals

Delivered by privacy consultants and trainers with over 10 years of experience.

 Hands-on-study

Advanced learning methodology using a combination of practical exercises and real-life examples.

 Achieve GDPR compliance

Develop the skills and understanding required to achieve and maintain GDPR compliance. 


Who should attend this course?

Staff who are responsible for or involved in ensuring their organisation becomes GDPR compliant, and staff who have been appointed as a DPO and require training to fulfil the role. Anyone looking to develop their career in GDPR or data protection with a professional qualification. These individuals include:

  • Data protection officers
  • Privacy managers
  • Data protection managers
  • Information security managers
  • IT managers
  • Project managers
  • Corporate governance managers
  • Risk and compliance managers
  • General or privacy counsels

Your Learning Path

Find out how the Certified GDPR Foundation and Practitioner and Data Protection Officer (C-DPO) Accelerated Combination Training Course will help you enhance your knowledge and start or boost your career.

The Certified GDPR Foundation, Certified GDPR Practitioner and Certified Data Protection Officer (C-DPO) Accelerated courses are essential components of the following learning path:


Why choose IT Governance for your training needs?

  • We’re internationally recognised as the authority on GDPR – our team introduced the world’s first certified GDPR Foundation and Practitioner training course and the only one that’s ISO 17024- certificated and since then we have trained more than 8,000 professionals on the GDPR.
  • We offer more GDPR training dates and locations that anyone else.
  • Trained by industry experts – our trainers are working consultants with years of practical, hands-on experience.
  • Pass first time or train again for free – we have trained more than 17,000 people and we’re confident you’ll pass with us first time. If you don’t, we’ll train you again for free.*
  • Choose the method that suits you – we offer classroom, instructor-led online, self-paced online, e-learning and in-house training options.
  • Access your training anywhere – all our course materials are provided as a digital copy, allowing you to access them anywhere and at any time. Documents will be made available 20 days before your course.
  • Business solutions to suit you – whether you’re a multinational wanting us to manage all your training needs or a small business wishing to boost your workforce skills, we offer a range of training solutions.

* Terms and conditions apply.

Course details

What does this training course cover?

Certified GDPR Foundation covers:

  • Key definitions and scope of the GDPR.
  • The six data protection principles.
  • Special categories of personal data.
  • The rights of data subjects, including DSARs (data access requests).
  • Controllers and processors.
  • Securing personal data.
  • Requirements for reporting data breaches and exceptions.
  • How to perform a DPIA (data protection impact assessment).
  • The DPO role.
  • The role of certifications in proving compliance.
  • Transferring personal data outside the UK.
  • The powers of the ICO (Information Commissioner’s Office).
  • The financial penalties that can be imposed for breaches.

Certified Data Protection Officer (C-DPO) Accelerated covers:

  • The GDPR’s intersection with the PECR (Privacy and Electronic Communications Regulations), freedom of information legislation, the Law Enforcement Directive and member state implementation.
  • The requirements in respect of appointing a DPO, the requirements placed on the DPO and those placed on the controller or processor.
  • How to achieve, monitor, maintain and demonstrate privacy compliance.
  • The roles of controllers and processors, and the relationship and required contracts between them.
  • The Article 12 general conditions in respect of data subjects’ rights and how to facilitate them.
  • The data processing requirements when transferring personal data to locations outside of the UK, particularly in relation to Cloud service providers.
  • How to conduct a GDPR gap analysis.

Certified GDPR Practitioner covers:

  • What constitutes personal data.
  • The six data protection principles – how to apply them and demonstrate compliance.
  • Determining how consent is given and withdrawn.
  • The rights of data subjects.
  • Handling data subject access requests (DSARs).
  • The roles of controllers and processors, and the relationships between them.
  • The DPO role.
  • The security of personal data.
  • Lessons to be learned from common data security failures.
  • Incident response and data breach reporting.
  • An organisational risk management framework.
  • Why and how to conduct a data flow mapping exercise.
  • Legal requirements for a DPIA.
  • How to conduct a DPIA with a DPIA tool.
  • Transferring personal data outside the UK and the mechanisms for compliance.
  • Remedies, liabilities and penalties.
  • Accountability, the privacy compliance framework and a PIMS (personal information management system).
  • Plan how to transition to, and demonstrate compliance with, the GDPR.
  • How to become GDPR compliant using a compliance gap assessment tool.

What’s included in this course?

Course materials and the exams are all included in this course, as well as a DPIA tool and a GDPR compliance gap assessment tool.


What equipment do I need?

You will need a laptop for the duration of your course and exam. Our course materials include an interactive PDF and an online quiz tool for knowledge testing. Full details on how to access each of the exams are provided by email 1–2 days before the exam dates.


Course duration and times

Day 1: 9:30 am – 5:00 pm
Day 2: 9:30 am – 5:00 pm
Day 3: 9:15 am – 5:00 pm
Day 4: 9:15 am – 5:00 pm
Day 5: 9:15 am – 4:30 pm
Day 6: 9:30 am – 5:00 pm
Day 7: 9:15 am – 5.00 pm


Course locations

  • Learn from anywhere with our instructor-led Live Online courses, or Classroom / Live Online delivery options. Learn more.
  • Alternatively, you can study in a classroom at one of our venues in London or Ely (Cambridgeshire).

Are there any prerequisites for this course?

There are no prerequisites for taking this course.


Is there any recommended reading?

We strongly recommend you purchase and read the following before attending the course:

Exams and qualifications

GDPR Foundation (UK GDPR F), GDPR Practitioner (UK GDPR P) and DPO Accelerated (C-DPO) exams

Candidates will take the following ISO 17024-certificated IBITGQ exams:

  • UK GDPR F (60 minutes, 40 questions, pass mark: 65%)
  • UK GDPR P (90 minutes, 40 questions, pass mark: 65%)
  • C-DPO (4 hours, 150 questions, pass mark: 75%)

This course is equivalent to:

49

CPD points


What qualifications will I receive?

  • Certified GDPR Foundation (UK GDPR F)
  • Certified GDPR Practitioner (UK GDPR P)
  • C-DPO Provisional (C-DPO)

To get the C-DPO Professional level qualification awarded by IBITGQ, you must provide evidence of 24 months of DPO work experience and 100 CPD learning hours.


Accreditation

All courses hold accreditations from IBITGQ (International Board for IT Governance Qualifications).

The Certified GDPR Foundation and Practitioner courses are also accredited by and CIISec (The Chartered Institute of Information Security) and satisfies the CIISec Knowledge Areas requirements at Level 1: A1, A2, A3, A4, A5, A6, A7, B2 and C3.

As a premier personnel certification body, IBITGQ specialises in certifying individuals who demonstrate exceptional proficiency in IT governance practices.

IBITGQ maintains accreditation to the ISO/IEC 17024:2012 standard, a globally recognised benchmark for conformity assessment. Accreditation by the International Accreditation Service (IAS) further underscores the course's commitment to meeting stringent certification requirements.

ISO 17024 certification is esteemed within the industry and universally acknowledged by employers worldwide. By aligning with this standard, our course ensures that your qualifications are not only recognised but also highly valued by employers across diverse sectors.

Upon successful completion of the course, you have the opportunity to validate your professional expertise by registering your qualification on the esteemed IBITGQ/GASQ successful candidate register. This platform serves as a testament to your commitment to excellence in IT governance, setting you apart as a distinguished professional in the field.


How will I receive my exam results and certificates?

Provisional exam results will be given immediately after completing the exams. Confirmed results will be issued within ten working days with your certificate sent to your email address.


Do I need to bring proof of identity?

Candidates must have a form of photographic ID with them as the invigilator may request to check it before the exam.


Can exams be retaken?

Yes. If you are unsuccessful on the first attempt, you can retake the exam for an additional fee. You can email us to schedule the retest.

Ways to learn

Learn your way with our flexible delivery methods

We want you to learn, qualify and progress, and we are committed to providing learning options for all scenarios: deadline-driven, career-orientated, company-wide or interest-led.

Instructor-led public courses

Structured learning, with clear direction and guidance from expert practitioners:

  • Focused learning
  • Delivered by expert practitioners
  • Peer support
  • In-the-moment insights

Learn more

Self-paced online learning

Learn and absorb material in a way that works for you:

  • Study at your own pace
  • Cost-effective
  • Bite-sized learning
  • Fits around you

Learn more

Unique blended learning courses

The most effective learning method for professionals:

  • Work around lifestyle challenges
  • A more manageable programme
  • Tailored, mastery-based learning
  • Better learning outcomes

Learn more

In-house and corporate training

Learning as a team and building a culture of awareness:

  • Unique to you
  • Peace of mind
  • Improve teamwork
  • Maximise your budget

Learn more

ITIL® 4 Create, Deliver and Support (CDS) – Your companion to the ITIL 4 Managing Professional CDS certification
Overview

ITIL 4 Create, Deliver and Support

If you’ve achieved the ITIL 4 Foundation certificate, you’re probably planning the next stage in your ITIL journey and which qualification to work towards. ITIL 4 Create, Deliver and Support (CDS) provides essential knowledge and capabilities for service management professionals, focusing on a value-stream-based approach to IT-enabled products and services – a must-have skillset practitioners should seek beyond Foundation level.

CDS is one of the ITIL 4 advanced modules that leads to the MP (Managing Professional) certification. The module is aimed at managers and aspiring managers at all levels, providing them with the practical skills to support end-to-end delivery of IT-enabled products and services, and to assure that services deliver the agreed value.


An excellent supplement to any ITIL 4 CDS training course

ITIL 4 Create, Deliver and Support (CDS) – Your companion to the ITIL 4 Managing Professional CDS certification is a study guide designed to help students pass the ITIL 4 CDS module.

The majority of this book is based on the official AXELOS® ITIL 4: Create, Deliver and Support publication and the associated CDS MP syllabus. It provides students with the information they need to pass the CDS exam, and help them become a successful practitioner.

Suitable for ITIL v3 experts, ITIL 4 MP students, ITSM (IT service management) practitioners who are adopting ITIL 4, approved training organisations, IT service managers, IT managers and those in IT support roles.

The guide focuses on:

  • SVS (service value system) key concepts and challenges;
  • Using a shift-left approach;
  • Planning and managing resources in the SVS;
  • The use and value of technology across the SVS;
  • ITIL practices and value streams for new services and user support;
  • How to create, deliver and support services; and
  • Exam preparation.

A useful tool throughout your career

In addition to being an essential study aid, the author – a seasoned ITSM professional – provides additional guidance that you can lean on after your training and exam. She draws on her practical experience to offer advice and points to think about so that you can refer back to this book for years to come.

The essential link between your ITIL qualification and the real world – buy this book today!

This book is part of Claire Agutter’s ITIL 4 series. For more information about the other books in the series, visit: www.itgovernancepublishing.co.uk/author/claire-agutter


ITIL® is a registered trade mark of the PeopleCert group. Used under licence from PeopleCert. All rights reserved.

Itil licensed by axelos
About the author

Claire Agutter

Claire Agutter is interested in anything that helps IT work better. She has more than two decades’ experience as a service management consultant, trainer, speaker and author. She is the founder of Scopism, an organisation that focuses on publications, events and consultancy linked to SIAM (service integration and management). She recruited and led the team of volunteers who contributed to the SIAM Foundation and Professional Body of Knowledge publications and created the online SIAM community. From 2018 onwards, she has been nominated every year by Computer Weekly as one of the most influential women in UK tech.

A long-time IT Governance Publishing collaborator, Claire has written ITIL® study guides covering both ITIL v3 and ITIL 4, with her ITIL Foundation Essentials ITIL 4 Edition – The ultimate revision guide rating 4.4 on Amazon.

To view all her publications, visit: itgovernancepublishing - Claire Agutter.

This website uses cookies. View our cookie policy
SAVE 25% ON
FOUNDATION TRAINING
Loading...