The course will address the security of the main types of relational database management systems, using a risk-based approach. Each risk will be considered in relation to each type of database, allowing RSM auditors to learn how the risk is addressed by the databases under consideration.
(Duration: 3 days)
» View courses, modules, locations and enrolment information
Based on COBIT and IEEE Standards
(4 day course)
This course is for auditors, IT managers, project managers, consultants, information security staff, risk managers,
procurement/purchasing professionals, and executive managers. Delegates should have worked on at least one major IT system in a development, operational, procurement or audit capacity.
The aim of the course is to enable delegates to conduct both high level and detailed audits of the non-coding activities of an IT operation including high level general practice, business continuity management, information security, software risk and software acquisition audits.
It applies equally to in-house IT operations, software houses, outsourcing institutions etc.
» View courses, modules, locations and enrolment information
Based on COBIT and IEEE
(4 days)
This course is for audit/assurance, IT managers, project managers, consultants, information security, configuration management, software maintenance, business analysis, software designers and executive managers.
Delegates should have worked on at least one major IT system in a development, operational, or audit capacity.
This course will enable delegates to conduct both high level and detailed audits on the entire Software Development Life
Cycle (SDLC) from requirements specification through to implementation and the supporting disciplines of project management, quality assurance, configuration management and documentation
» View courses, modules, locations and enrolment information
(3 days)
This course introduces attendees to the security problems associated with Web sites and how to test the security measures that have been put into place.
» View courses, modules, locations and enrolment information
This course is for audit and security specialists who need to understand how networks operate, what the sources of risk are and how to manage the risk.
(2 days)
» View courses, modules, locations and enrolment information
This course is for security administrators, auditors and others who need to understand all aspects of security in a UNIX environment.
(3 days)
» View courses, modules, locations and enrolment information
This course is designed for anyone requiring a basic understanding of IBM Mainframe environment and z/OS as an operating system.
(2 days)
» View courses, modules, locations and enrolment information
This course will benefit RACF administrators, RACF auditors, help desk personnel, and anyone requiring a knowledge of RACF administration principles and practices.
(4 days)
» View courses, modules, locations and enrolment information
This course is for computer auditors and security specialists wishing to see how to close weaknesses on a 390 or LUW environment.
(2 days)
» View courses, modules, locations and enrolment information
This course is for security specialists, audit managers and planners, auditors, specialist legal professionals, IT project managers from sensitive application areas, system owners and securityconscious system builders.
(2 days)
» View courses, modules, locations and enrolment information
This course is for computer auditors and security specialists wishing to see how to close weaknesses on a SQL Server, and how to check this has been done.
(2 days)
» View courses, modules, locations and enrolment information
This course is for architects and administrators from both customer and business partner organisations.
(2 days)
» View courses, modules, locations and enrolment information
Hi. I'm Mark Barnes one of the directors at BHBi.
Is there anything I can help you with? Perhaps you are keen to find out more about a course?
Thanks for your message or question.
I'll get back to your shortly. I look forward to chatting more with you.
[x]