The course will address the security of the main types of relational database management systems, using a risk-based approach. Each risk will be considered in relation to each type of database, allowing RSM auditors to learn how the risk is addressed by the databases under consideration.
(Duration: 3 days)
Based on COBIT and IEEE Standards
(4 day course)
This course is for auditors, IT managers, project managers, consultants, information security staff, risk managers,
procurement/purchasing professionals, and executive managers. Delegates should have worked on at least one major IT system in a development, operational, procurement or audit capacity.
The aim of the course is to enable delegates to conduct both high level and detailed audits of the non-coding activities of an IT operation including high level general practice, business continuity management, information security, software risk and software acquisition audits.
It applies equally to in-house IT operations, software houses, outsourcing institutions etc.
Based on COBIT and IEEE
This course is for audit/assurance, IT managers, project managers, consultants, information security, configuration management, software maintenance, business analysis, software designers and executive managers.
Delegates should have worked on at least one major IT system in a development, operational, or audit capacity.
This course will enable delegates to conduct both high level and detailed audits on the entire Software Development Life
Cycle (SDLC) from requirements specification through to implementation and the supporting disciplines of project management, quality assurance, configuration management and documentation
This course introduces attendees to the security problems associated with Web sites and how to test the security measures that have been put into place.
This course is for audit and security specialists who need to understand how networks operate, what the sources of risk are and how to manage the risk.
This course is for security administrators, auditors and others who need to understand all aspects of security in a UNIX environment.
This course is designed for anyone requiring a basic understanding of IBM Mainframe environment and z/OS as an operating system.
This course will benefit RACF administrators, RACF auditors, help desk personnel, and anyone requiring a knowledge of RACF administration principles and practices.
This course is for computer auditors and security specialists wishing to see how to close weaknesses on a 390 or LUW environment.
This course is for security specialists, audit managers and planners, auditors, specialist legal professionals, IT project managers from sensitive application areas, system owners and securityconscious system builders.
This course is for computer auditors and security specialists wishing to see how to close weaknesses on a SQL Server, and how to check this has been done.
This course is for architects and administrators from both customer and business partner organisations.
Hi. I'm Mark Barnes one of the directors at BHBi.
Is there anything I can help you with? Perhaps you are keen to find out more about a course?
Thanks for your message or question.
I'll get back to your shortly. I look forward to chatting more with you.