Business units and the information technology (IT) function integrate cyber risk management into decision-making and day-to-day operations and serve as an organization's first line of defense. The second line includes IT and technology risk managers who establish governance and oversight, monitor security operations, and take action.
The growing importance of IS in the creation of business value and in its performance requires special attention to the way in which IS and those who implement them consume and transform the company's resources. This is how QUALISYS Consulting has set up a range of training courses in Information Systems Auditing in order to train IS players to better use the IS to increase the company's income.
Our trainings:
Code | Module | Objectif | Kind |
FO_ARS1_QL1 | IT audit: concepts, approach and implementation | This training offers a pragmatic process and value-oriented approach and goes beyond the normative visions that links the audit approach to the issues of operational excellence and the protection of both public and private company assets. | Qualifying |
FO_ARS1_
QL2 | Performance and availability of information systems | This seminar reviews the state of the art in this area, addressing the thorny issue of performance from several angles: methodology, design, technical choices, optimization, best practices, contractualization and dialogue with suppliers. |
Qualifying
|
FO_ARS1_CU1 | Preparation for CISA certification (Information Systems Auditor) | This training allows participants to prepare for the passage of the CISA certification through the mastery of governance, management and monitoring of IT risks. |
Certifying
|
FO_ARS_CU2 | Preparation for ISACA's Certified Risk and Information System Control (CRISC) Certification | This training will prepare you for the CRISC certification exam through the study of the five main areas of information security risk management, in accordance with ISACA requirements.. |
Certifying
|
The evolution of information and communication technologies, in particular with the development of the Internet, has meant that networks and information systems now play a crucial role in our society, where security of our citizens is not marginalized. Attacks are more and more frequent, so it is necessary to know how we can protect our confidential information. This is why it is important to develop capacities on cybersecurity and information security.
Our trainings:
Code | Module | Objectif | Kind |
FO_ARS2_QL1 | Awareness of new data protection rules | This seminar makes it possible to take stock of the impacts of the European regulation for the company and to propose a compliance plan to be implemented. | Qualifying |
FO_ARS2 _QL2 | State of the art of information systems security | This course draws up a complete state of the art of organizational, methodological and technical tools for controlling IT risk. It will provide participants with the information needed to develop a roadmap leading to the implementation of an effective security policy. |
Qualifying
|
FO_ARS2 _CU1 | Become an Information System Security Manager | This course curriculum covers all the facets of the job of IS Security Manager, his role and responsibilities and knowing how to build and implement effective security policies.. |
Curriculum |
FO_ARS2_QL3 | Security Awareness for Decision Makers | The objective is to raise awareness that safety is based on common sense and consistency, but above all it requires everyone's commitment to responsibility in compliance with an organization, procedures, rules, directives and laws. |
Qualifying
|
FO_ARS2 _QL4 | Mastering IS risk analysis | This training deepens the tools of risk management related to information, and gives the CISO or risk -manager the keys to know these risks, develop an action plan oriented towards the business lines of the company and manage its implementation. |
Qualifying
|
FO_ARS2 _CE1 | CISSP - Security Certification Preparation | This course is a preparation for CISSP certification, covering the themes, areas and topics of the Common Body of Knowledge. |
Certifying
|
FO_ARS2_CE2 | Preparation for CISM (Information Security Manager) | This training is a preparation for the CISM certification through the 4 main areas covered by the certification. Thus, the participants will have a good knowledge of the main master plans of information security. |
Certifying |
FO_ARS2_QL5 | Information Security Governance in Practice | This workshop will present all the actions and solutions to ensure the security of your IS: from risk analysis to the optimal implementation of security solutions.. | Qualifying |
FO_ARS2 _QL6 | ISACA Cybersecurity Fundamentals Certificate (Optional Exam) | This training is intended to provide security professionals with a better understanding of the audit process and IT risk professionals with an understanding of cyber risks and mitigating controls.. |
Qualifying
|
FO_ARS2 _QL7 | PCI DSS: The Basics | This training will allow you to understand the new version of the PCI-DSS standard relating to the protection of bank account data, including payment by card and the key security elements necessary to bring your company into compliance, while taking into account the specificities of its context. | Qualifying |
Business continuity is more than ever at the heart of the concerns of companies and regulators. Well beyond the IT dimension to which it is too often confined, a Business Continuity Plan (BCP) is above all centered on the businesses, and aims to ensure the robustness of the company in the face of any type of operational risk. . Through our training, we take stock of the best practices allowing the implementation of a realistic and sustainable IT Continuity solution.
Our trainings:
Code | Module | Objectif | Kind |
FO_ARS3_QL1 | Develop a continuity and disaster recovery plan | This seminar gives the keys to taking into account all the dimensions of business continuity, then designing and implementing your BCP.. | Qualifying |
FO_
ARS3_QL2 | IT recovery and continuity plan | This training provides a complete post-crisis view of the issue of IS Continuity, the technologies of the moment and the implementation of realistic and tested solutions in order to be operational the day the disaster occurs.. | Qualifying |
FO_
ARS3_QL3 | Develop a computer backup plan | This training allows to review all aspects of an IT backup plan, provides participants with keys and methods that will allow them, back in their company, to develop or improve their PSI. | Qualifying |