Audit, IT Risk and Information Security
HomeTraining Services / Audit, IT Risk and Information Security 
Internal audit plays a critical role in helping organizations in the ongoing battle of managing cyber threats, both by providing an independent assessment of existing and necessary controls and by helping the audit committee and board understand and face the various risks of the digital world.
Business units and the information technology (IT) function integrate cyber risk management into decision-making and day-to-day operations and serve as an organization's first line of defense. The second line includes IT and technology risk managers who establish governance and oversight, monitor security operations, and take action.
FO_ARS1 : IS Audit and IT Risk

The growing importance of IS in the creation of business value and in its performance requires special attention to the way in which IS and those who implement them consume and transform the company's resources. This is how QUALISYS Consulting has set up a range of training courses in Information Systems Auditing in order to train IS players to better use the IS to increase the company's income.
Our trainings: 

Code
Module
Objectif
Kind
FO_ARS1_QL1
IT audit: concepts, approach and implementation
This training offers a pragmatic process and value-oriented approach and goes beyond the normative visions that links the audit approach to the issues of operational excellence and the protection of both public and private company assets.
Qualifying
FO_ARS1_ QL2
Performance and availability of information systems
This seminar reviews the state of the art in this area, addressing the thorny issue of performance from several angles: methodology, design, technical choices, optimization, best practices, contractualization and dialogue with suppliers.
Qualifying
FO_ARS1_CU1
Preparation for CISA certification (Information Systems Auditor)
This training allows participants to prepare for the passage of the CISA certification through the mastery of governance, management and monitoring of IT risks.
Certifying
FO_ARS_CU2
Preparation for ISACA's Certified Risk and Information System Control (CRISC) Certification
 This training will prepare you for the CRISC certification exam through the study of the five main areas of information security risk management, in accordance with ISACA requirements..
Certifying


The evolution of information and communication technologies, in particular with the development of the Internet, has meant that networks and information systems now play a crucial role in our society, where security of our citizens is not marginalized. Attacks are more and more frequent, so it is necessary to know how we can protect our confidential information. This is why it is important to develop capacities on cybersecurity and information security.
Our trainings:

Code
Module
Objectif
Kind
FO_ARS2_QL1
Awareness of new data protection rules
This seminar makes it possible to take stock of the impacts of the European regulation for the company and to propose a compliance plan to be implemented.
Qualifying
FO_ARS2 _QL2
State of the art of information systems security
This course draws up a complete state of the art of organizational, methodological and technical tools for controlling IT risk. It will provide participants with the information needed to develop a roadmap leading to the implementation of an effective security policy.
Qualifying
FO_ARS2 _CU1
Become an Information System Security Manager
This course curriculum covers all the facets of the job of IS Security Manager, his role and responsibilities and knowing how to build and implement effective security policies..
Curriculum 
FO_ARS2_QL3
Security Awareness for Decision Makers
The objective is to raise awareness that safety is based on common sense and consistency, but above all it requires everyone's commitment to responsibility in compliance with an organization, procedures, rules, directives and laws.
Qualifying
FO_ARS2 _QL4
Mastering IS risk analysis
This training deepens the tools of risk management related to information, and gives the CISO or risk -manager the keys to know these risks, develop an action plan oriented towards the business lines of the company and manage its implementation.
Qualifying
FO_ARS2 _CE1
CISSP - Security Certification Preparation
This course is a preparation for CISSP certification, covering the themes, areas and topics of the Common Body of Knowledge.
  Certifying 
FO_ARS2_CE2
Preparation for CISM (Information Security Manager)
This training is a preparation for the CISM certification through the 4 main areas covered by the certification. Thus, the participants will have a good knowledge of the main master plans of information security.
  Certifying 
FO_ARS2_QL5Information Security Governance in Practice
This workshop will present all the actions and solutions to ensure the security of your IS: from risk analysis to the optimal implementation of security solutions..
Qualifying
FO_ARS2 _QL6ISACA Cybersecurity Fundamentals Certificate (Optional Exam)
This training is intended to provide security professionals with a better understanding of the audit process and IT risk professionals with an understanding of cyber risks and mitigating controls..
Qualifying
FO_ARS2 _QL7PCI DSS: The Basics
This training will allow you to understand the new version of the PCI-DSS standard relating to the protection of bank account data, including payment by card and the key security elements necessary to bring your company into compliance, while taking into account the specificities of its context.
Qualifying


Business continuity is more than ever at the heart of the concerns of companies and regulators. Well beyond the IT dimension to which it is too often confined, a Business Continuity Plan (BCP) is above all centered on the businesses, and aims to ensure the robustness of the company in the face of any type of operational risk. . Through our training, we take stock of the best practices allowing the implementation of a realistic and sustainable IT Continuity solution.
Our trainings:

Code
Module
Objectif
Kind
FO_ARS3_QL1
Develop a continuity and disaster recovery plan
This seminar gives the keys to taking into account all the dimensions of business continuity, then designing and implementing your BCP..
Qualifying
FO_ ARS3_QL2
IT recovery and continuity plan
This training provides a complete post-crisis view of the issue of IS Continuity, the technologies of the moment and the implementation of realistic and tested solutions in order to be operational the day the disaster occurs..
Qualifying
FO_ ARS3_QL3
Develop a computer backup plan
This training allows to review all aspects of an IT backup plan, provides participants with keys and methods that will allow them, back in their company, to develop or improve their PSI.
Qualifying