Information System Security Training Courses in Indonesia

Information System Security Training Courses

Online or onsite, instructor-led live Information System Security (ISS) training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Information System Security.

Information System Security training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Information System Security trainings in Indonesia can be carried out locally on customer premises or in NobleProg corporate training centers.

NobleProg -- Your Local Training Provider

Testimonials

★★★★★
★★★★★

Information System Security Subcategories in Indonesia

Information System Security Course Outlines in Indonesia

Course Name
Duration
Overview
Course Name
Duration
Overview
35 hours
A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more. This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security. Objectives:
  • To review of the main topics of CISSP CBK (Common Body of Knowledge).
  • To prepare for a CISSP examination
35 hours
Overview: Certified Information Systems Security Professional certification is recognised as a key qualification for developing a senior career in information security, audit and IT governance management. Held by over 30,000 qualified professionals worldwide, the Certified Information Systems Security Professional qualification shows proven knowledge and is the key to a higher earning potential in roles that include CISO, CSO and senior security manager. You will learn to:
  • Use the knowledge gained in a practical manner beneficial to your organisation
  • Protect your organisational assets using access control techniques and strengthen confidentiality and integrity controls from the world of cryptography
  • Secure your network architecture and design (implement Cyber security)
  • Achieve your organisational objectives such as legal & compliance, Information assurance, security and data governance
  • Enhance IT services secure delivery via Security operations, architecture and design principles
  • Implement business resiliency via Business Continuity Plan
  • You will gain a thorough understanding of the 8 domains as prescribed by (ISC)2®.
The Main Goal:
  • To pass your CISSP examination first time.
Target Audience: This training is intended for individuals preparing for the CISSP certification exam.
21 hours
A thorough, practical, 3 day course designed to provide the knowledge and skills required to manage information security, information assurance or information risk based processes. The CISMP course is aligned with the latest national information assurance frameworks (IAMM), as well as ISO/IEC 27002 & 27001; the code of practice and standard for information security. This course is a CESG Certified Training (CCT) course. The course follows the latest BCS syllabus and prepares delegates for the 2 hour multiple choice BCS examination. This qualification provides delegates with detailed knowledge of the concepts relating to information security; (confidentiality, integrity, availability, vulnerability, threats, risks and countermeasures), along with an understanding of current legislation and regulations which impact information security management. Award holders will be able to apply the practical principles covered throughout the course ensuring normal business processes become robust and more secure.
28 hours
Description: CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting. Our CISA course is an intense, very competitive and exam focused training course. With experience of delivering more than 150+ CISA trainings in Europe and around the world and training more than 1200+ CISA delegates, the Net Security CISA training material has been developed in house with the top priority of ensuring CISA delegates pass the ISACA CISA® Exam. The training methodology focuses on understanding the CISA IS auditing concepts and practicing large number of ISACA released question banks from the last three years. Over a period, CISA holders have been in huge demand with renowned accountings firms, global banks, advisory, assurance, and internal audit departments. Delegates may have years of experience in IT auditing but perspective towards solving CISA questionnaires will solely depend on their understanding to globally accepted IT assurance practices. CISA exam is very challenging because the chance of a very tight clash between two possible answers exists and that is where ISACA tests you on your understanding in global IT auditing practices. To address these exam challenges, we always provide the best trainers who have extensive experience in delivering CISA training around the world. The Net Security CISA manual covers all exam-relevant concepts, case studies, Q&A's across CISA five domains. Further, the Trainer shares the key CISA supporting material like relevant CISA notes, question banks, CISA glossary, videos, revision documents, exam tips, and CISA mind maps during the course. Goal: The ultimate goal is to pass your CISA examination first time. Objectives:
  • Use the knowledge gained in a practical manner beneficial to your organisation
  • Provide audit services in accordance with IT audit standards
  • Provide assurance on leadership and organizational structure and processes
  • Provide assurance on acquisition/ development, testing and implementation of IT assets
  • Provide assurance on IT operations including service operations and third party
  • Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
Target Audience: Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
21 hours
The training is addressed to all operating system administrators who plan to implement a public key infrastructure based on MS Windows Server 2012 R2 and plan to use qualified electronic signature certificates. The training participants will learn about the basic issues related to the implementation of the public key infrastructure, as well as the idea of using the latest cryptographic solutions to secure information systems. Based on the operating system of MS Windows Server 2012 R2, the possibilities of using certification services for the needs of the enterprise are discussed. During the training in a virtual environment, a complete certification center is installed and the most important issues related to the management and administration of the public key infrastructure in the Active Directory domain are discussed. The training also includes theoretical and practical knowledge regarding the use of electronic signatures issued by certification centers in Poland in accordance with the "Electronic Signature Act". Legal issues, statutory requirements as well as examples of the use of electronic signature certificates in Poland are discussed. The training participants will gain the knowledge needed to create electronic correspondence related to communication with public administration offices and the use of other services that enable or require the use of this type of identity identification.
35 hours
Description: This course is the non-certifcation version of the "CISA - Certified Information Systems Auditor" course. CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting. Objectives:
  • Use the knowledge gained to benefit your organisation
  • Provide audit services in accordance with IT audit standards
  • Provide assurance on leadership and organizational structure and processes
  • Provide assurance on acquisition/ development, testing and implementation of IT assets
  • Provide assurance on IT operations including service operations and third party
  • Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
Target Audience: Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
21 hours
This course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.
35 hours
This class will help the attendees to scan, test, hack and secure their own systems To gain an indepth knowledge and practical experience with the current essential security systems The attendees will get to know how perimeter defences work and then be led into scanning and attacking their own networks, no real network is harmed The attendees then will learn how intruders escalate privileges and what steps can be taken to secure a system, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation .
7 hours
This is a one day Introduction to ISO27001
21 hours
This instructor-led, live training in Indonesia is aimed at engineers in telecommunication companies who wish to set up an end-to-end digital identity management system. By the end of this training, participants will be able to:
  • Understand, evaluate and adopt different approaches to managing usernames and passwords.
  • Setup a single login system that works across all applications used in a telecom environment.
  • Use identity technology to get a clear understanding of their customers and their needs. 
  • Implement an authentication system that works across different platforms (laptop, mobile, etc.).
7 hours
Why should you attend? ISO/IEC 27005 training course enables you to comprehend the basic concepts of Information Security Risk Management by using the standard ISO/IEC 27005 as a reference framework. By attending the ISO/IEC 27005 Introduction training course, you will understand the importance of Information Security Risk Management and the benefits that businesses, society and governments can obtain.  Who should attend?
  • Individuals interested in Information Security Risk Management
  • Individuals seeking to gain knowledge about the main processes of Information Security Risk Management
14 hours
ISO/IEC 27005 Foundation training enables you to learn the basic elements to manage Information Security Risks as specified in ISO/IEC 27005. During this training course, you will be able to understand the concepts and models of Information Security Risk Management. After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27005 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, processes and management approach. Who should attend?
  • Individuals interested in Information Security Risk Management
  • Individuals seeking to gain knowledge about the main processes of Information Security Risk Management
  • Individuals interested to pursue a career in Information Security Risk Management
The “PECB Certified ISO/IEC 27005 Foundation” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains: Domain 1: Fundamental principles and concepts of Risk Management in Information Security Domain 2: Information Security Risk Management approaches and processes After successfully completing the exam, you can apply for the “PECB Certified ISO/IEC 27005 Foundation” credential. General Information Certification fees are included in the exam price
  • Training material containing over 200 pages of information and practical examples will be distributed
  • A participation certificate of 14 CPD (Continuing Professional Development) credits will be issued
  • In case of exam failure, you can retake the exam within 12 months for free
21 hours
ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will also gain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course corresponds with the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard. After understanding all the necessary concepts of Information Security Risk Management based on ISO/IEC 27005, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27005 Risk Manager” credential. By holding a PECB Risk Manager Certificate, you will be able to demonstrate that you have the necessary skills and knowledge to perform an optimal Information Security Risk Assessment and timely manage Information Security risks. Who should attend?
  • Information Security risk managers
  • Information Security team members
  • Individuals responsible for Information Security, compliance, and risk within an organization
  • Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or involved in a risk management program
  • IT consultants
  • IT professionals
  • Information Security officers
  • Privacy officers
Examination - Duration: 2 hours The “PECB Certified ISO/IEC 27005 Risk Manager” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains:
  • Domain 1 Fundamental principles and concepts of Information Security Risk Management
  • Domain 2 Implementation of an Information Security Risk Management program
  • Domain 3 Information Security risk management framework and process based on ISO/IEC 27005
  • Domain 4 Other Information Security risk assessment methods
General information
  • Certification fees are included on the exam price
  • Training material containing over 350 pages of information and practical examples will be distributed
  • A participation certificate of 21 CPD (Continuing Professional Development) credits will be issued
  • In case of exam failure, you can retake the exam within 12 months for free
35 hours
ISO/IEC 27005 Lead Risk Manager training enables you to acquire the necessary expertise to support an organization in the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an Information Security Risk Management program. The training will also contain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course supports the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard. After mastering all the necessary concepts of Information Security Risk Management based on ISO/IEC 27005, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27005 Lead Risk Manager” credential. By holding a PECB Lead Risk Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Information Security Risks. Who should attend?
  • Information Security risk managers
  • Information Security team members
  • Individuals responsible for Information Security, compliance, and risk within an organization
  • Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or individuals who are involved in a risk management program
  • IT consultants
  • IT professionals
  • Information Security officers
  • Privacy officers
Examination - Duration: 3 hours The “PECB Certified ISO/IEC 27005 Lead Risk Manager” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains:
  • Domain 1 Fundamental principles and concepts of Information Security Risk Management
  • Domain 2 Implementation of an Information Security Risk Management program
  • Domain 3 Information security risk assessment
  • Domain 4 Information security risk treatment
  • Domain 5 Information security risk communication, monitoring and improvement
  • Domain 6 Information security risk assessment methodologies
General Information
  • Certification fees are included on the exam price
  • Training material containing over 350 pages of information and practical examples will be distributed
  • A participation certificate of 21 CPD (Continuing Professional Development) credits will be issued
  • In case of exam failure, you can retake the exam within 12 months for free
21 hours
This instructor-led, live training in Indonesia (online or onsite) is aimed at engineers who wish to learn the methods and tools needed to protect their organization's information systems against attack. By the end of this training, participants will be able to:
  • Understand information security at both the computer level, as well as the communications level.
  • Prevent physical and digital access to private information systems.
  • Prevent the modification of information that is stored, being processed, or being transmitted.
  • Protect against denial of service to authorized users.
  • Take the necessary measures to detect, document, and counter security threats.
  • Ensure that organizational information is kept confidential.
28 hours
The training takes the form of a workshop supplemented with substantive knowledge. Classes are based on the official CISA certificate framework. During the workshop, case studies will be discussed in discussing specific issues. Classes will be conducted in English (on request in Polish) based on the ISACA handbook in English.
  CISA Exam Material Scope:
  • Information System Auditing Process (21%)
  • Governance and Management of IT (17%) 
  • Information Systems Acquisition, Development and implementation (12%)
  • Information Systems Operation and Business Resilience (23%)
  • Protection of Information Assets (27%)
Duration of the exam: 4 hours
Type: multiple choice test
Volume: 200 questions   List of the requirements that you must meet in order to be able to claim the CISA qualification: 
  1. Pass the CISA exam. The CISA passing score is a mark of 450 or higher on the exam.
  2. Abide by the ISACA Code of Professional Ethics 
  3. Promise to obey the CISA Continuing Professional Education Policy
  4. Gain at least 5 years of professional information systems auditing, control or security work experience.
  5. Comply with Information Systems Auditing Standards
If you’ve passed the exam and believe that you meet those requirements, then you can begin the application for certification: page certification here
There is a fee of $50 for this application. There’s also a yearly fee that you must pay to maintain this certification after you’ve been granted it. The fee is $40 per annum for ISACA members, and $75 for non-members.
21 hours
This instructor-led, live training in Indonesia (online or onsite) focuses on analyzing the risks of Open Data while reducing vulnerability to disaster or data loss. By the end of this training, participants will be able to:
  • Understand the concepts and benefits of Open Data.
  • Identify the different types of data.
  • Understand the risks of Open Data and how to mitigate them.
  • Learn how to manage Open Data risks and create a contingency plan.
  • Implement Open Data risk mitigation strategies to reduce disaster risk.
14 hours
This instructor-led, live training in Indonesia (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases. By the end of this training, participants will be able to:
  • Gain visibility into enterprise data across on-premise and cloud environments.
  • Automate security intelligence to hunt threats and to contain risks.
  • Detect, identify, and prioritize threats.

Last Updated:

Online Information System Security courses, Weekend Information System Security courses, Evening Information System Security training, Information System Security boot camp, Information System Security instructor-led, Weekend Information System Security training, Evening Information System Security courses, Information System Security coaching, Information System Security instructor, Information System Security trainer, Information System Security training courses, Information System Security classes, Information System Security on-site, Information System Security private courses, Information System Security one on one training

Course Discounts

No course discounts for now.

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking to expand our presence in Indonesia!

As a Business Development Manager you will:

  • expand business in Indonesia
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in joining a growing organisation and running a high-tech, high-quality training and consulting business.

Apply now!

This site in other countries/regions