You may not have been able to visit your page because of:
1. An out-of-date bookmark/favourite
2. A search engine that has an out-of-date listing
3. A mistyped address
4. You don't have access to this page
5. The requested resource was not found
6. An error has occurred whilst processing your request
Cybercrime is on the rise, and it is becoming easier and easier for criminals to steal your personal information. Toolkits to create viruses, spyware, and other forms of malware are now readily available to anyone wishing to defraud and do damage, and you could be leaving yourself open to attack.
It is estimated that standard computer-based defence systems catch only 25% of malware attacks. Do you know the risks you’re running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime.
An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack.
In this pocket guide, the author:
Victoria Loewengart is a partner and co-founder of two organisations: AKOTA Technologies (www.akotatech.com) and Technology and Business Insider (www.insidertalk.net). She has more than 25 years' experience in cyberspace development, management and exploration. For much of her career, Victoria has worked in support of military and intelligence agencies, which is where she became fascinated with all aspects of cyber security and intelligence technologies, and she has conducted extensive research in this area.
When implementing security polices, information security professionals are constantly faced with a conflict between the security team and the rest of the business. They must ensure that their organisation is adequately addressing information security risks, whilst also communicating the value of security appropriately.
David Ferbrache, Technical Director at KPMG UK, says “No approach can ever succeed without considering people – and as a profession we need to look beyond our computers to understand the business, the culture of the organisations, and, most of all, how we can create a security environment which helps people feel free to actually do their job.”
By gaining an understanding of the psychology of information security, you can ensure your security programme is a success.
Augusta University’s Cyber Institute adopted the book “The Psychology of Information Security” as part of our Master’s in Information Security Management program because we feel that the human factor plays an important role in securing and defending an organization…We want our students to not only understand technical and managerial aspects of security, but psychological aspects as well.”
-Director of Graduate Studies in Information Security Management, Augusta University
Based on insights gained from academic research and interviews with security professionals from various sectors, this essential guide explains the importance of careful risk management and reveals how to align a security programme with wider business objectives, providing methods and techniques to engage stakeholders and encourage buy-in.
The Psychology of Information Security redresses the balance by considering information security from both end users’ and security professionals’ perspectives, and helps you to understand how a security culture, that puts risk into context, promotes compliance.
Leron Zinatullin (zinatullin.com) is an experienced risk consultant specialising in cyber security strategy, management and delivery. He has led large-scale, global, high-value security transformation projects with a view to improve cost performance and support business strategy.
He has extensive knowledge and practical experience in solving information security, privacy and architectural issues across multiple industry sectors.
He has an MSc in information security from University College London, where he focused on the human aspects of information security. His research was related to modelling conflicts between security compliance and human behaviour.
Business continuity – planning for, protecting against and ensuring recovery from disruptive events – is more important than ever.
In an increasingly volatile world – exemplified by the COVID-19 pandemic – organisations are looking at business continuity from a fresh perspective. The illusion of business as a rampart against which the waves of the world break harmlessly is shattered; it is no longer possible to pretend that an organisation can weather all storms equally, or that the limited contingencies organisations develop are sufficient to protect them.
As a result, more and more organisations are looking to ISO 22301 – the international standard that defines the requirements for a BCMS – to safeguard their future.
ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS) walks you through the requirements of ISO 22301:2019, explaining what they mean and how your organisation can achieve compliance. Whether you are seeking certification against the Standard or are simply looking to benefit from business continuity concepts and practices without developing a formal system, this book contains all you need to know.
It is an essential companion guide for those working in business continuity who are looking to introduce or optimise a BCMS aligned with ISO 22301. The book provides a comprehensive introduction to business continuity best practice, including:
Suitable for business continuity managers, risk managers, compliance officers, senior managers, operations managers, project managers and consultants, this practical guide to ISO 22301 will show you how to develop and implement a BCMS so you can minimise the impact of a disaster on your business and continue to provide essential services to your customers, while reassuring all stakeholders that you take business continuity best practice seriously.
Alan Calder is the Group CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru, and a leading author on information security and IT governance issues. He has been involved in the development of a wide range of information security management training courses that have been accredited by IBITGQ (International Board for IT Governance Qualifications). Alan has consulted for clients across the globe and is a regular media commentator and speaker.
This course is ideal if you are looking to advance your knowledge and take the next step in your GDPR career by becoming a DPO. Under the GDPR, DPOs are required to have a level of expertise in national and European data protection law, as well as in-depth knowledge of the Regulation. They must also have a good understanding of how to build, implement and manage data protection programmes.
This combination course will equip you with in-depth knowledge of the GDPR and the skills you need to meet the Regulation’s DPO requirements.
The Certified GDPR Foundation Training Course provides a comprehensive introduction to the GDPR, its implications and what it means for your organisation. It covers the six data protection principles, data subjects’ rights, securing personal data, reporting data breaches, and transferring personal data outside of the UK.
Learn from an experienced privacy consultant and get a practical understanding of the GDPR. The Certified GDPR Practitioner Training Course discusses how each aspect of the Regulation can be translated into implementation actions for your organisation. Understand how the GDPR applies in a real-world context with real-life examples.
Gain the knowledge and operational skills to fulfil the DPO role and understand how it fits in with other departments in an organisation. The Certified Data Protection Officer (C-DPO) Accelerated Training Course uses practical examples and exercises and will teach you how to monitor and maintain compliance with the GDPR.
Designed and developed using our extensive experience gained advising on compliance with data privacy laws and related information security standards.
Successful completion of the course and included exam leads to the ISO 17024-certificated UK GDPR F, UK GDPR P and C-DPO Provisional Level qualifications.
Develop the operational skills and knowledge to perform the DPO role, and all the activities required to ensure GDPR compliance.
Delivered by privacy consultants and trainers with over 10 years of experience.
Advanced learning methodology using a combination of practical exercises and real-life examples.
Develop the skills and understanding required to achieve and maintain GDPR compliance.
Staff who are responsible for or involved in ensuring their organisation becomes GDPR compliant, and staff who have been appointed as a DPO and require training to fulfil the role. Anyone looking to develop their career in GDPR or data protection with a professional qualification. These individuals include:
Find out how the Certified GDPR Foundation and Practitioner and Data Protection Officer (C-DPO) Accelerated Combination Training Course will help you enhance your knowledge and start or boost your career.
The Certified GDPR Foundation, Certified GDPR Practitioner and Certified Data Protection Officer (C-DPO) Accelerated courses are essential components of the following learning path:
Course materials and the exams are all included in this course, as well as a DPIA tool and a GDPR compliance gap assessment tool.
You will need a laptop for the duration of your course and exam. Our course materials include an interactive PDF and an online quiz tool for knowledge testing. Full details on how to access each of the exams are provided by email 1–2 days before the exam dates.
Day 1: 9:30 am – 5:00 pm
Day 2: 9:30 am – 5:00 pm
Day 3: 9:15 am – 5:00 pm
Day 4: 9:15 am – 5:00 pm
Day 5: 9:15 am – 4:30 pm
Day 6: 9:30 am – 5:00 pm
Day 7: 9:15 am – 5.00 pm
There are no prerequisites for taking this course.
We strongly recommend you purchase and read the following before attending the course:
Candidates will take the following ISO 17024-certificated IBITGQ exams:
This course is equivalent to:
49
CPD points
To get the C-DPO Professional level qualification awarded by IBITGQ, you must provide evidence of 24 months of DPO work experience and 100 CPD learning hours.
All courses hold accreditations from IBITGQ (International Board for IT Governance Qualifications).
The Certified GDPR Foundation and Practitioner courses are also accredited by and CIISec (The Chartered Institute of Information Security) and satisfies the CIISec Knowledge Areas requirements at Level 1: A1, A2, A3, A4, A5, A6, A7, B2 and C3.
As a premier personnel certification body, IBITGQ specialises in certifying individuals who demonstrate exceptional proficiency in IT governance practices.
IBITGQ maintains accreditation to the ISO/IEC 17024:2012 standard, a globally recognised benchmark for conformity assessment. Accreditation by the International Accreditation Service (IAS) further underscores the course's commitment to meeting stringent certification requirements.
ISO 17024 certification is esteemed within the industry and universally acknowledged by employers worldwide. By aligning with this standard, our course ensures that your qualifications are not only recognised but also highly valued by employers across diverse sectors.
Upon successful completion of the course, you have the opportunity to validate your professional expertise by registering your qualification on the esteemed IBITGQ/GASQ successful candidate register. This platform serves as a testament to your commitment to excellence in IT governance, setting you apart as a distinguished professional in the field.
Provisional exam results will be given immediately after completing the exams. Confirmed results will be issued within ten working days with your certificate sent to your email address.
Candidates must have a form of photographic ID with them as the invigilator may request to check it before the exam.
Yes. If you are unsuccessful on the first attempt, you can retake the exam for an additional fee. You can email us to schedule the retest.
We want you to learn, qualify and progress, and we are committed to providing learning options for all scenarios: deadline-driven, career-orientated, company-wide or interest-led.
Structured learning, with clear direction and guidance from expert practitioners:
Learn and absorb material in a way that works for you:
The most effective learning method for professionals:
Learning as a team and building a culture of awareness:
If you’ve achieved the ITIL 4 Foundation certificate, you’re probably planning the next stage in your ITIL journey and which qualification to work towards. ITIL 4 Create, Deliver and Support (CDS) provides essential knowledge and capabilities for service management professionals, focusing on a value-stream-based approach to IT-enabled products and services – a must-have skillset practitioners should seek beyond Foundation level.
CDS is one of the ITIL 4 advanced modules that leads to the MP (Managing Professional) certification. The module is aimed at managers and aspiring managers at all levels, providing them with the practical skills to support end-to-end delivery of IT-enabled products and services, and to assure that services deliver the agreed value.
ITIL 4 Create, Deliver and Support (CDS) – Your companion to the ITIL 4 Managing Professional CDS certification is a study guide designed to help students pass the ITIL 4 CDS module.
The majority of this book is based on the official AXELOS® ITIL 4: Create, Deliver and Support publication and the associated CDS MP syllabus. It provides students with the information they need to pass the CDS exam, and help them become a successful practitioner.
Suitable for ITIL v3 experts, ITIL 4 MP students, ITSM (IT service management) practitioners who are adopting ITIL 4, approved training organisations, IT service managers, IT managers and those in IT support roles.
The guide focuses on:
In addition to being an essential study aid, the author – a seasoned ITSM professional – provides additional guidance that you can lean on after your training and exam. She draws on her practical experience to offer advice and points to think about so that you can refer back to this book for years to come.
This book is part of Claire Agutter’s ITIL 4 series. For more information about the other books in the series, visit: www.itgovernancepublishing.co.uk/author/claire-agutter
ITIL® is a registered trade mark of the PeopleCert group. Used under licence from PeopleCert. All rights reserved.
Claire Agutter is interested in anything that helps IT work better. She has more than two decades’ experience as a service management consultant, trainer, speaker and author. She is the founder of Scopism, an organisation that focuses on publications, events and consultancy linked to SIAM (service integration and management). She recruited and led the team of volunteers who contributed to the SIAM Foundation and Professional Body of Knowledge publications and created the online SIAM community. From 2018 onwards, she has been nominated every year by Computer Weekly as one of the most influential women in UK tech.
A long-time IT Governance Publishing collaborator, Claire has written ITIL® study guides covering both ITIL v3 and ITIL 4, with her ITIL Foundation Essentials ITIL 4 Edition – The ultimate revision guide rating 4.4 on Amazon.
To view all her publications, visit: itgovernancepublishing - Claire Agutter.