Certified training courses

Certified training courses

Gain recognition as a cybersecurity professional and build security awareness in your organization

Gain recognition as a cybersecurity professional and build security awareness in your organization

Red Overlay
Cybersecurity training & GDPR training
Cybersecurity training & GDPR training
Red Overlay


Upskill in the area of privacy and data protection with BSI training

Information Security Training Courses

  • Certified Information Systems Security Professional (CISSP) >
    If you're building a career in information security then the globally recognised CISSP qualification is the must-have to help you progress. The CISSP demonstrates your competence as an IT professional.


  • Certified Information Privacy Manager (CIPM®) >
    This course is based around 2 domains which are covered in the CIPM exam - privacy program governance and privacy program operational lifecycle.


  • Certified Information Security Manager (CISM®) >
    This intensive 4 day training is based on the ISACA framework, which has five domain areas. The course covers each of these domains in detail, giving you the knowledge and skills to develop and manage a resilient information security program.


  • Certificate in Information Security Management Principles (CISMP) >
    The CISMP course, developed by the British Computer Society (BCS), is designed to provide the foundation of knowledge necessary for individuals who have information security responsibilities as part of their day-to-day role.


  • Certificate of Cloud Security Knowledge >
    Get the skills to manage information security in the cloud with our Certificate of Cloud Security Knowledge (CCSK Plus) training course.


  • Certified Cloud Security Professional (CCSP) >
    This five-day course will cover topics including cloud computing, mobile security, application development security, risk management, cyber, and more.


  • Certified Information Systems Auditor (CISA®) . >
    This course provides the knowledge, skills and best practices to successfully audit, control and secure your information system


  • Certified Ethical Hacker (CEH)  >
    This is a practical course that will give you hands-on lab experience and allow you to learn about the tools used by real attackers. You will have the opportunity to scan, test, hack and secure your own system so you can


  • Certified Lead SCADA Security Professional training course >
    By attending this course you'll gain the knowledge and skills to advise on, or manage, risks related to SCADA environments and systems as a qualified professional.


  • Network and Information Security (NIS) Directive fundamentals >
    This one-day theory-based course has been designed by BSI’s industry leading cybersecurity consultants with the ultimate goal of providing candidates with an understanding of the NIS Directive.


  • Comptia Security+ >
    CompTIA Security+ training and certification validates experienced technology knowledge of security as it relates to the overarching subject matter areas


  • Incident Response for Managers >
    This one day theory based course is designed for managers and decision makers who may be involved in the management of a cyber or other form of security incident involving data and/or IT equipment.


  • Certified in Risk and Information Systems Controls (CRISC) >
    Our CRISC training course, in association with ISACA, prepares IT professionals for real-world threats with relevant tools to assess, govern and mitigate risk.


  • Certified Incident Handler (ECIH) >
    The EC-Council Certified Incident Handler program is designed to provide the CIH fundamental skills to handle and respond to the computer security incidents in an information system.


  • Practitioners Certificate in Information Assurance Architecture >
    The Practitioners Certificate in Information Assurance Architecture (PCIAA) course prepares the student for a career in security architecture


  • Certified Chief Information Security Officer (CCISO) >
    The EC-Council's Certified Chief Information Security Officer (CCISO) program has certified leading information security professionals around the world


  • Operational Technology (OT) Security Foundations >
    Developed by our leading Operational Technology (OT) experts, this one-day OT security foundations course is designed to provide delegates with an understanding of the practical risks of an OT environment and the process and procedures to implement a strategy and architecture to mitigate the risks and ensure the ongoing safe and secure operation of the business.


  • Security Awareness for Operational Technology (OT) >
    This OT Awareness briefing is aimed at providing an understanding of the security issues associated with these environments and to enable organizations to create / enhance their security culture


  • Operational Technology (OT) Security for the C-Suite >
    This one-hour course is designed to provide senior management and board members with an understanding of the technologies, languages, and security risks posed to organizations and enable them to make policy and organizational decisions around safety, security risk, and overall effectiveness in line with business strategies.