IPv6 grunnkurs (NLT-IPV6-Intro) er et kurs som passer for tekniske ressurser i design og driftsavdelinger hos operatører og Enterprise-kunder. Kurset vil gi deltagerne kunnskap og ferdigheter som er nødvendige for å designe og konfigurere nettverk. IPv6 introkurs kan kombineres med andre IPv6 kurs,
IPv6 Networking (NLT-IPV6-Datasenter) er et kurs som passer for tekniske ressurser i design og driftsavdelinger hos operatører og enterprise-kunder. Deltagerne bør ha grunnleggende IPv6-kjennskap, tilsvarende NLT-IPv6-Intro. IPv6 datasenterkurs kan kombineres med andre IPv6 kurs.
Dette kurset (NLT-IPV6-Nettverk) dekker design og implementasjon av IPv6 i et bedriftsnettverk. Vi går gjennom nettverksdesign og tjenester som autokonfigurasjon av IPv6 (SLAAC og DHCP). Videre ser vi på VPN-løsninger og brannmurer. I tillegg går vi gjennom metoder for feilsøking og problemløsning.
«IPv6 The good, the bad and the ugly» (NLT-IPV6-Sikkerhet) er et kurs for deg som vil ha en større forståelse av hvilke sikkerhetsutfordringer IPv6 er ment å løse, men også hvilke nye problemstillinger som dukker opp ved overgang til IPv6.
Junos grunnkurs er et av nLogics mest populære kurs, som vi har tilbudt i snart 10 år. Kurset er en del av nLogics education services. I tillegg til kurs tilbyr vi workshops, seminarer, sertifiseringsløp og POC-lab for å kunne bistå med opplæring og testning i alle faser av en leveranse.
Junos grunnkurs gir en innføring i bruk av Junos, Junipers operativsystem for rutere, switcher og brannmurer. Kurset gir grunnleggende kunnskap for å ta i bruk Junipers utstyr på en effektiv måte.
To innholdsrike dager med seminar og workshops, der vi presenterer siste nytt fra oss, våre kunder og utvalgte partnere.
Vi gjentar suksessen og inviterer til nLogic Summit, 13. juni 2024. Vårt utgangspunkt er å gi innblikk i reelle caser, problemstillinger og løsninger, der vår målsetningen for dagen er å styrke din kompetanse på nettverk, IT-sikkerhet og datasenter.
I samarbeid med Icotera inviterer vi til webinar 12. april kl 09:00-10:30. Vi presenterer FTTx CPE/ONT, WiFi 6 & 7 MESH Aksesspunkt samt ICONS for overvåking og provisjonering.
Vi inviterer til webinar i samarbeid med Kentik den 5. april der vi ser nærmere på hvordan Kentik tilbyr avanserte løsninger for nettverksanalyse.
nLogic webinar: XaaS cloud platform – tjenestesalg for Service Providers Vi inviterer til webinar tirsdag 9. april kl 09:00 – 10:00 der vi presenterer vår tjenesteportal for service providers. Med en tjenesteportal kan service providers videreselge sine tjenester til bedriftskunder.
Network X kombinerer 5G World, Broadband World Forum og den nylig lanserte Telco Cloud for å samle alt ett sted.
Vi har gleden av å invitere deg til å delta på Nutanix .Next 2024. Dette er den største og mest innovative konferansen til Nutanix!Dette året vil Barcelona være vertskap for et uforglemmelig arrangement fylt med foredrag, hands-on workshops,og en unik mulighet til å bli kjent med de nyeste trender
Vi tilbyr kurs om cybersikkerhet - fordypning i aktuelle temaer. Oppdaterte strategier for å håndtere cybersikkerhetstrusler i den digitale verden. Cybersikkerhet gjelder styring av sikkerhet i nettverk og andre former for internettilknyttede datamaskiner.
Vi tilbyr kurs om cybersikkerhet - i teori og praksis. Hackere, dårlige systemer og uforsiktige ansatte kan lekke sensitiv informasjon, og påføre virksomheter milliontap. Samtidig står Datatilsynet klart for å gi gebyrer etterpå.
Vi tilbyr kurs om DORA – cybersikkerhet for finansbransjen. Hva går DORA ut på og hvordan skal kravene i forordningen følges opp i praksis?
We provide virtual course about Administering Splunk Enterprise Security. This course prepares architects and systems administrators to install and configure Splunk Enterprise Security (ES).
We provide virtual course about CBRCOR: Performing CyberOps Using Cisco Security Technologies. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) course guides you through cybersecurity operations fundamentals, methods, and automation.
We provide virtual course about CBROPS: Understanding Cisco Cybersecurity Operations Fundamentals. The course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite.
We provide course about CC: Certified in Cybersecurity. Course goals: After completing this course, the learners will have obtained awareness of the topics covered in the entry-level cybersecurity certification exam outline Domains, Modules & Chapters.
We provide virtual course about CC: Certified in Cybersecurity. Course goals: After completing this course, the learners will have obtained awareness of the topics covered in the entry-level cybersecurity certification exam outline Domains, Modules & Chapters.
We provide course about CCISO: Chief Information Security Officer. The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
We provide virtual course about CCISO: Chief Information Security Officer. The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
(ISC)² developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks.
We provide course about CEH: Certified Ethical Hacker v12. The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.
We provide virtual course about CEH: Certified Ethical Hacker v12. The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.
We provide course about Certified DORA Lead Manager. Attending the PECB Certified DORA Lead Manager training course offers a unique opportunity to engage with industry experts and peers, fostering valuable discussions and insights into best practices for digital operational resilience.
We provide virtual course about Certified DORA Lead Manager. Attending the PECB Certified DORA Lead Manager training course offers a unique opportunity to engage with industry experts and peers, fostering valuable discussions and insights into best practices for digital operational resilience.
We provide course about Certified ISO/IEC 42001 Lead Implementer. Artificial intelligence (AI) is becoming a driving force in today’s technology landscape. Its application has spanned across numerous sectors.
We provide virtual course about Certified ISO/IEC 42001 Lead Implementer. Artificial intelligence (AI) is becoming a driving force in today’s technology landscape. Its application has spanned across numerous sectors.
We provide course about CGRC: Certified in Governance, Risk and Compliance. Earn Your GRC Certification - Be a Governance, Risk and Compliance Leader! Capitalize on the rising demand for Governance, Risk and Compliance (GRC) expertise by earning the CGRC certification.
We provide virtual course about CGRC: Certified in Governance, Risk and Compliance. Earn Your GRC Certification - Be a Governance, Risk and Compliance Leader! Capitalize on the rising demand for Governance, Risk and Compliance (GRC) expertise by earning the CGRC certification.
We provide course about Check Point Certified Security Administrator (CCSA) R81.20. This 3-day course covers everything you need to start-up, configure and manage daily operations of R81.20 Check Point Security Gateway and Management Software Blades systems on the GAiA operating system.
We provide course about CISA: Certified Information Systems Auditor. CISA is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security.
We provide virtual course about CISM: Certified Information Security Manager. This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations.
Virtual course - The Official ISC2® Certified Information Systems Security Professional (CISSP®) training provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture of an organisation.
The Official ISC2® Certified Information Systems Security Professional (CISSP®) training provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture of an organisation.
We provide course about CND: Certified Network Defender. The Certified Network Defender v2 is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program.
We provide virtual course about CND: Certified Network Defender. The Certified Network Defender v2 is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program.
We offer virtual course about CNSE: Check Point Cloud Network Security Expert for Azure R81. The course provides an understanding of the concepts and skills necessary to deploy and manage CloudGuard Network and Cloud Security Posture Management security solution within an Azure security environment.
We provide course about CNX-CFR: CyberSec First Responder. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation.
We provide virtual course about CNX-CFR: CyberSec First Responder. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation.
We provide course about CompTIA Advanced Security Practitioner (CASP+). CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing.
We provide virtual course about CompTIA Advanced Security Practitioner (CASP+). CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing.
We provide course about CompTIA Cybersecurity Analyst (CySA+). The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to leverage intelligence and threat detection techniques.
We provide virtual course about CompTIA Cybersecurity Analyst (CySA+). The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to leverage intelligence and threat detection techniques.
We provide course about CompTIA Security+. CompTIA Security+ Certification SY0-701 provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format.
We provide virtual course about CompTIA Security+. CompTIA Security+ Certification SY0-701 provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format.
We provide course about CSSLP: Certified Secure Software Lifecycle Professional. The training provides a comprehensive review of the knowledge required to incorporate security practices, including authentication.
We provide virtual course about CSSLP: Certified Secure Software Lifecycle Professional. The training provides a comprehensive review of the knowledge required to incorporate security practices, including authentication.
We provide virtual course about EDU-210: Palo Alto Firewall Essentials: Configuration and Management. Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls.
We provide virtual course about EDU-220: Palo Alto Networks: Panorama managing firewalls at scale. This 2-day course from Palo Alto will help students to gain in-depth knowledge about how to configure and manage a Palo Alto Networks Panorama management server.
We provide virtual course about EDU-330: Palo Alto Networks: Firewall troubleshooting. Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks next-generation firewalls.
We provide course about ISO 22301 Lead Implementer. ISO 22301 Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301.
We provide virtual course about ISO 22301 Lead Implementer. ISO 22301 Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301.
We provide course about ISO/IEC 27001 Foundation. ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
We provide virtual course about ISO/IEC 27001 Foundation. ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
We provide course about ISO/IEC 27001 Lead Auditor. ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
We provide virtual course about ISO/IEC 27001 Lead Auditor. ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
We provide course about ISO/IEC 27001 Lead Implementer. ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
We provide virtual course about ISO/IEC 27001 Lead Implementer. The training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
We provide course about ISO/IEC 27001 Transition. The new version of ISO/IEC 27001 has been recently published and is now aligned with the new version of ISO/IEC 27002, which was published in February, 2022.
We provide course about ISO/IEC 27701 Lead Auditor. The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.
We provide virtual course about ISO/IEC 27701 Lead Auditor. The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.
We provide virtual course about MasterClass: This training is not related to any specific certification. System Forensics and Incident Handling. Forensics and Incident Handling are constantly evolving and crucial topics in the area of cybersecurity.
We provide course about NIS 2 Directive Foundation. The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures.
We provide virtual course about NIS 2 Directive Foundation. The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures.
The Certified NIS 2 Directive Lead Implementer training course enables participants to gain the necessary competencies to support organizations in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program that meets the requirements of the NIS2 Directive.
We provide course about PECB Certified Lead Cybersecurity Manager. The Lead Cybersecurity Manager training course enables participants to obtain the necessary competencies to effectively implement, manage, and continually improve a cybersecurity program.
We provide virtual course about PECB Certified Lead Cybersecurity Manager. The Lead Cybersecurity Manager training course enables participants to obtain the necessary competencies to effectively implement, manage, and continually improve a cybersecurity program.
We provide virtual course about SAUI: Implementing Automation for Cisco Security Solution. The Implementing Automation for Cisco Security Solutions (SAUI) course teaches you how to design advanced automated security solutions for your network.
We provide course about SC-100: Microsoft Cybersecurity Architect. The SC-100 course will lead towards the first expert level certification in the Microsoft Security, Compliance, and Identity portfolio.
We provide virtual course about SC-100: Microsoft Cybersecurity Architect. The SC-100 course will lead towards the first expert level certification in the Microsoft Security, Compliance, and Identity portfolio.
We provide course about SC-200: Microsoft Security Operations Analyst. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
We provide virtual course about SC-200: Microsoft Security Operations Analyst. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
Virtual course - This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
We provide virtual course about SC-400: Administering Information Protection and Compliance in Microsoft 365. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
We provide course about SC-400: Administering Information Protection and Compliance in Microsoft 365. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
We provide course about SC-900: Security, Compliance, and Identity Fundamentals. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
We provide virtual course about SC-900: Security, Compliance, and Identity Fundamentals. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
We provide virtual course about secure coding in C and C++ in english. Your application written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2*32?
We provide course about secure coding in C and C++ in english. Your application written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2*32?
We provide course about secure coding in C and C++ for medical devices in english. Your medical device written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
We provide virtual course about Security Engineering on AWS. This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises. This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud.
We provide course about Security Engineering on AWS in english. This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises. This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud.
We provide virtual course about security testing C and C++ applications in english. Your application written in C and C++ is tested functionally, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2^32?
We provide course about security testing C and C++ applications in english. Your application written in C and C++ is tested functionally, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2^32?
We provide virtual course about SESA: Securing Email with Cisco Email Security Appliance. Learn how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise and ransomware.
Become an SSCP - Systems Security Certified Practitioner! Earning a globally recognized IT security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.
Virtual course - Become an SSCP - Systems Security Certified Practitioner! Earning a globally recognized IT security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.
We provide course about Web Security for Developers. The web is a great software delivery platform, making your software available to users around the world with zero installation and easily deployed updates.
We provide virtual course about Web Security for Developers. The web is a great software delivery platform, making your software available to users around the world with zero installation and easily deployed updates.
Vi tilbyr Bachelor i Applied Data Science som nettstudie. IT-utdanning som gjør deg svært ettertraktet innen maskinlæring, kunstig intelligens og big data-analyse. Gå rett i jobb som data scientist, det mest sexy yrket i det 21. århundret, ifølge Harvard Business Review.
Vi tilbyr Bachelor i Cyber Security. IT-utdanning som lærer deg å sikre digitale systemer mot cyberangrep, datakriminalitet og digital krigføring. Studiet gjør deg klar til å jobbe praktisk med IKT-sikkerhet og redusere digital sårbarhet.
Vi tilbyr Bachelor i Cyber Security som nettstudie. IT-utdanning som lærer deg å sikre digitale systemer mot cyberangrep, datakriminalitet og digital krigføring. Studiet gjør deg klar til å jobbe praktisk med IKT-sikkerhet og redusere digital sårbarhet.
Vi tilbyr Bachelor i digital etterforskning. IT-utdanning som lærer deg datasikkerhet og etterforskning av digital kriminalitet. Studiet gjør deg klar til å jobbe praktisk med digital sikkerhet og etterretning for politi og andre organisasjoner med behov for økt digital sikkerhet.
Vi tilbyr Bachelor i digital etterforskning som nettstudie. IT-utdanning som lærer deg datasikkerhet og etterforskning av digital kriminalitet. Studiet gjør deg klar til å jobbe praktisk med digital sikkerhet og etterretning for politi og andre organisasjoner med behov for økt digital sikkerhet.
I løpet av første året på studiet vil du tilegne deg grunnleggende kunnskap om kjernefaglige tekniske grunnprinsipper og få en bred forståelse av forretningsstyring og -prosesser.
Vi tilbyr utdannelse i nettverk og IT-sikkerhet. Praktisk IT-utdanning som lærer deg å bekjempe hacking og datakriminalitet. Det akutte kompetansebehovet for IT-sikkerhet gir solide jobbmuligheter etter studiet.
Vi tilbyr utdannelse i nettverk og IT-sikkerhet som nettstudie. Praktisk IT-utdanning som lærer deg å bekjempe hacking og datakriminalitet. Det akutte kompetansebehovet for IT-sikkerhet gir solide jobbmuligheter etter studiet.
Vi tilbyr kurs om CCSP - Certified Cloud Security Professional. Øk din kompetanse på å utforme, implementere og administrere cybersikkerhet i skytjenester. Målet med kurset er at man skal forstå og kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr onlinekurs om CCSP - Certified Cloud Security Professional. Øk din kompetanse på å utforme, implementere og administrere cybersikkerhet i skytjenester. Målet med kurset er at man skal forstå og kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr kurs om CISSP Certified Information Systems Security Professional. Grundig intensivkurs som dekker hele kunnskapsbasen for informasjonssikkerhet fra et ledelsesperspektiv. Målet er at man skal forstå og kunne anvende kunnskapene i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr onlinekurs om CISSP Certified Information Systems Security Professional. Grundig intensivkurs som dekker hele kunnskapsbasen for informasjonssikkerhet fra et ledelsesperspektiv. Målet er at man skal forstå og kunne anvende kunnskapene i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr kurs om CSSLP - Certified Secure Software Lifecycle Professional. Øk din kompetanse på sikker utvikling. CSSLP kurset dekker hele livssyklusen for sikker programutvikling.
Vi tilbyr onlinekurs om CSSLP - Certified Secure Software Lifecycle Professional. Øk din kompetanse på sikker utvikling. CSSLP kurset dekker hele livssyklusen for sikker programutvikling.
Vi tilbyr kurs om Experis Ciber Security Foundation - Cybersikkerhet grunnleggende. Etter gjennomført ECSF har man et godt grunnlag for å gå videre på SSCP, CISSP eller CCSP kursene. Man har en grunnleggende forståelse av nøkkelteknologier innen sikkerhet.
Vi tilbyr kurs om Experis Ciber Security Introduction - Cybersikkerhet introduksjon. Kurset tar for seg grunnleggende risikostyring, virkemidler og fremgangsmåter for innføring av sikkerhet i en organisasjon basert på ivaretakelse av konfidensialitet, integritet og tilgjengelighet.
Vi tilbyr kurs om SSCP - System Security Certified Practitioner. Øk din kompetanse på sikkerhet i datasenter og skytjenester. Målet med kurset er at man skal kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr onlinekurs om SSCP - System Security Certified Practitioner. Øk din kompetanse på sikkerhet i datasenter og skytjenester. Målet med kurset er at man skal kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr nettkurs om Introduksjonskurs ISO27001 – Informasjonssikkerhet. Kurset vil gi et solid fundament for videre praktisk arbeid med forberedelsene til sertifisering, eller innføring av et styringssystem for informasjonssikkerhet.
ISO 27001 er standarden for Informasjonssikkerhet. Det har nå kommet en ny versjon av standarden, og for å sikre at du har den kompetansen du trenger for overgangen har vi utviklet et kurs som tar for seg endringene fra tidligere versjon til ny versjon. Kurset har varighet på 1/2 dag.
ISO/IEC 27701 is designed to specify requirements and provide guidance for establishing, implementing, maintaining, and continually improving a PIMS in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of your organization.
This course aims to provide you with the opportunity to learn about the subject of internal auditing of information security management systems, specifically those based on the ISO 27001:2022 international standard.
Additional course benefits: Gain free access to our online self-assessment tool where you can quickly implement and practice learnings as well as to measure your company performance against specific management system standards