Training Exam Preparation
ISACA provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide. The COBIT framework and the CISA, CISM, CGEIT and CRISC certifications
Training Based on ISO 27001:2013
Organizations today need to be equipped to manage the security of their information or risk exposing themselves to culpability, criminality and liability. ISO/IEC 27001:2013 is the current international standard that sets out the requirements to establish, implement and continually improve an information security management system. Find out more about ISO 27001:2013 training series
Training Based on ISO 20001:2011
ISO/IEC 20000-1 is ideal for any service provider, large or small, who wants to provide assurance in the quality of the services they deliver. It’s commonly used for IT services, facilities management and business services to help ensure effective and resilient services in today’s changing service delivery environment. This training helps service management professional in developing and implementing their SMS so it adds value to their organization. Find out more about ISO 20000 training series
Training Based On ISO 22301:2012
Standar ISO 22301:2012 yang mengatur pedoman Business Continuity Management System, akan memampukan organisasi untuk memiliki daya hidup (survival), daya tumbuh (growing) dan daya kreasi (vreativity) secara berkelanjutan dengan tetap memperhatikan faktor risiko dan lingkungan persaingan
IT Governance and IT Project Management
We Help your company to assess and improve the skill for professional to have good project management with project governance. Learn about some frameworks that may help you to measure, audit and manage the organization.
IT Risk & IT Security
Todays big issue in this digital transformation era is Cyber Attack .Learn key principles of risk analysis, risk assessment and risk mitigation for information security purpose. Having strategy that prevents unauthorized access to organizational assets including computers, networks, and data.
Cyber Security Training
Cyber Security is a technology, process and practice designed to protect networks, computers, programs and data from unauthorized attacks, damage or access. The term “Cyber Security” refers to business functions and technological tools used to protect information assets
IT Governance Indonesia Is Calling
The IT Professional