Whether delivered online or on-site, instructor-led Security Management training courses illustrate through interactive dialogue and practical exercises how to effectively perform Security Management functions.
Security Management training is offered in two formats: "online live training" or "onsite live training". Online live training (also known as "remote live training") is conducted using an interactive remote desktop. Onsite live training can be held locally at the client's premises in Lyon or at NobleProg corporate training centers in Lyon.
NobleProg -- Your Local Training Provider
Lyon, Swisslife Tower
NobleProg Lyon, 10 Place Charles Béraudier, Lyon, france, 69000
Located 200 meters far from the train station TGV, Swisslife Tower is today the most representative building of this quarter of Lyon. The Business Center offers you a perfect location for your training.
Gares TGV
100meters from Gare TGV Part-Dieu , porte du Rhône Exit
Aéroport
30 minutes from Lyon Saint Exupéry (Satolas)
Rhône Express from Saint Exupéry airport (Terminus Gare part-Dieu)
This instructor-led, live training in Lyon (online or onsite) is designed for intermediate-level IT auditors seeking to effectively incorporate AI tools into their audit practices.
Upon completion of this training, participants will be able to:
Understand the fundamental concepts of artificial intelligence and their application within IT auditing contexts.
Leverage AI technologies—including machine learning, natural language processing (NLP), and robotic process automation (RPA)—to enhance the efficiency, accuracy, and scope of audits.
Conduct risk assessments using AI tools, facilitating continuous monitoring and proactive risk management.
Incorporate AI into audit planning, execution, and reporting stages, thereby improving the overall effectiveness of IT audits.
Encryption Key Management involves the secure creation, storage, distribution, rotation, and retirement of cryptographic keys to safeguard sensitive data and ensure adherence to regulatory standards.
This instructor-led live training, available online or on-site, is designed for IT and security professionals at an intermediate level who aim to implement robust encryption key management practices and systems within enterprise environments.
Upon completion of this training, participants will be able to:
Comprehend the lifecycle of encryption keys and adopt best practices for their protection.
Configure and manage key management systems (KMS) in both on-premises and cloud environments.
Enforce access control and auditing for key usage.
Ensure compliance with regulations and standards governing encryption key security.
Course Format
Interactive lectures and discussions.
Practical exercises using key management tools in lab environments.
Guided activities focused on implementing a secure key lifecycle.
Customization Options for the Course
To arrange customized training tailored to your infrastructure or compliance requirements, please contact us.
This instructor-led, live training in Lyon (online or on-site) targets advanced-level security analysts who wish to elevate their skills in utilizing advanced Micro Focus ArcSight ESM content to improve an organization's ability to detect, respond, and mitigate cyber threats with greater precision and speed.
By the end of this training, participants will be able to:
Optimize the use of Micro Focus ArcSight ESM to enhance monitoring and threat detection capabilities.
Construct and manage advanced ArcSight variables to refine event streams for more precise analysis.
Develop and implement ArcSight lists and rules for effective event correlation and alerting.
Apply advanced correlation techniques to identify complex threat patterns and reduce false positives.
This instructor-led, live training in Lyon (online or onsite) is aimed at beginner-level law enforcement officers who wish to gain a deeper understanding of human behavior, enhancing their skills in communication, empathy, conflict resolution, and overall effectiveness in their roles.
By the end of this training, participants will be able to:
Have a deeper understanding of human psychology.
Develop advanced communication and conflict resolution skills for more effective interaction with the public, colleagues, and in negotiation scenarios.
Promote awareness and understanding of diverse cultural backgrounds, improving community policing and relations with various demographic groups.
This instructor-led, live training in Lyon (online or onsite) is aimed at beginner-level security professionals who wish to gain the knowledge and skills necessary to adapt to the rapidly evolving digital landscape in the security industry.
By the end of this training, participants will be able to:
Understanding Digital Transformation in security.
Learn how digital solutions can improve security operations, efficiency, and effectiveness.
Manage security-related data for informed decision-making.
This instructor-led, live training in Lyon (online or onsite) is designed for beginner-level security managers who wish to effectively adopt and utilize technology in their field.
By the end of this training, participants will be able to:
Understand the evolution of technology in security.
Learn how to effectively blend traditional security methods with modern technological solutions.
Understand the basics of cybersecurity, risks associated with digital systems, and how to protect against cyber threats in the security industry.
This instructor-led, live training in Lyon (online or onsite) is aimed at beginner-level security managers and designers who wish to effectively plan, design, and implement security strategies that are integrated, technologically advanced, and compliant with legal and ethical standards.
By the end of this training, participants will be able to:
Learn how to integrate security considerations into architectural and facility design.
Assess threats and vulnerabilities to inform security planning.
Develop comprehensive security plans that address a range of threats.
Create effective emergency response and crisis management plans.
This instructor-led, live training in Lyon (online or onsite) is designed for beginner-level security administrators seeking to deepen their understanding of organizational security practices.
Upon completion of this training, participants will be able to:
Grasp the fundamentals of security operations and administration.
Identify and mitigate various security threats and vulnerabilities.
Implement and manage security solutions effectively.
Comprehend the legal and ethical considerations inherent in security operations.
Prepare for incident response and disaster recovery scenarios.
This instructor-led, live training in Lyon (online or on-site) is aimed at advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
By the end of this training, participants will be able to:
Gain comprehensive knowledge of fraud examination principles and the fraud examination process.
Learn to identify, investigate, and prevent various types of financial fraud schemes.
Understand the legal environment related to fraud, including the legal elements of fraud, relevant laws, and regulations.
Acquire practical skills in conducting fraud investigations, including evidence collection, interviewing techniques, and data analysis.
Learn to design and implement effective fraud prevention and deterrence programs within organizations.
Gain confidence and knowledge to successfully pass the Certified Fraud Examiner (CFE) exam.
This instructor-led live training in Lyon (online or on-site) is intended for advanced-level security managers who seek to be well-prepared with the knowledge and skills necessary to excel in the exam and their professional roles as security management specialists.
By the end of this training, participants will be able to:
Understand the five domains of ISSMP.
Develop skills to manage an information security program.
Learn to establish and maintain security governance.
Gain insights into risk management, incident response, and continuity planning.
Prepare effectively for the ISSMP certification exam.
This instructor-led, live training in Lyon (online or onsite) is tailored for beginner-level security professionals aiming to gain a comprehensive understanding of how to protect physical assets, personnel, and facilities.
Upon completion of this training, participants will be able to:
Grasp the core principles of physical security.
Gain insights into risk assessment and management within physical security contexts.
Investigate a range of physical security measures and technologies.
Understand how physical security integrates with other security disciplines.
Acquire skills in designing and executing effective physical security plans.
This instructor-led live training in Lyon (available online or onsite) is intended for IT professionals who want to gain a thorough understanding of how to utilize the CipherTrust solution suite.
By the end of this training, participants will be able to:
Comprehend the CipherTrust solution and its core functionalities.
Evaluate device architecture and deployment models.
This instructor-led, live training in Lyon (online or onsite) is designed for security managers wishing to learn basic to intermediate-level CCTV security surveillance and management skills.
By the end of this training, participants will be able to:
Familiarize themselves with the types of CCTV systems and understand their benefits and features.
Understand the requirements for cabling and setting up CCTV systems.
Please note that the updated CISM exam content outline applies to all examinations commencing on June 1, 2022.
CISM® stands as the most prestigious and rigorous qualification for Information Security Managers worldwide. Earning this credential grants you access to an elite peer network, enabling you to continuously learn and adapt to the expanding opportunities and challenges within Information Security Management.
Our CISM training methodology offers comprehensive coverage of all four CISM domains, with a strong emphasis on conceptual understanding and solving practice questions released by ISACA. This course provides intensive training and thorough exam preparation for the ISACA’s Certified Information Security Manager (CISM®) Examination.
Our instructors recommend that all participants review the ISACA released CISM QA&E (Questions, Answers, and Explanations) as part of their exam preparation. This resource is invaluable for helping participants understand the style of ISACA questions, the approach required to solve them, and for facilitating rapid assimilation of CISM concepts during live classroom sessions.
All our trainers possess extensive experience in delivering CISM training. We are committed to thoroughly preparing you for the CISM examination.
Goal:
The primary objective is to help you pass your CISM examination on the first attempt.
Objectives:
Apply acquired knowledge in a practical manner to benefit your organization
Establish and maintain an information security governance framework to achieve your organization's goals and objectives
Manage information risk to an acceptable level to meet business and compliance requirements
Establish and maintain information security architectures encompassing people, processes, and technology
Integrate information security requirements into third-party and supplier contracts and activities
Plan, establish, and manage the capability to detect, investigate, respond to, and recover from information security incidents to minimize business impact
Target Audience:
Security professionals with 3-5 years of frontline experience
Information security managers or individuals with management responsibilities
Information security staff and assurance providers requiring an in-depth understanding of information security management, including: CISOs, CIOs, CSOs, privacy officers, risk managers, security auditors, compliance personnel, BCP/DR personnel, and executive and operational managers responsible for assurance functions
This instructor-led, live training in Lyon (online or onsite) is designed for security professionals who wish to learn how to handle security threats and perform security risk assessments, improving their existing capabilities.
By the end of this training, participants will be able to:
Manage security systems and handle any hostile environment.
Managing Open Source Software (OSS) involves overseeing the entire lifecycle of open-source components within an organization to ensure their secure, compliant, and efficient utilization.
This instructor-led live training, available online or on-site, is designed for intermediate IT professionals seeking to implement best practices for managing open-source software in enterprise and government settings.
Upon completing this training, participants will be capable of:
Developing effective OSS policies and governance frameworks.
Utilizing Software Bill of Materials (SBOM) and Software Composition Analysis (SCA) tools to identify, track, and manage open-source dependencies.
Reducing risks related to licensing and security vulnerabilities.
Accelerating OSS adoption to maximize innovation and cost efficiencies.
Course Format
Interactive lectures and discussions.
Case studies and scenario-based exercises.
Practical demonstrations using OSS management tools.
Customization Options
This course can be customized to align with specific organizational OSS policies and toolchains. Please contact us to arrange.
This instructor-led live training in Lyon (online or onsite) targets intermediate-level cybersecurity professionals seeking to expand their understanding of GRC frameworks and apply them to ensure secure and compliant business operations.
By the end of this training, participants will be able to:
Understand the key components of cybersecurity governance, risk, and compliance.
Conduct risk assessments and develop risk mitigation strategies.
Implement compliance measures and manage regulatory requirements.
Develop and enforce security policies and procedures.
This instructor-led, live training in Lyon (online or onsite) is designed for developers and anyone interested in learning and implementing OAuth to provide applications with secure, delegated access.
Upon completing this training, participants will be able to:
Grasp the fundamental principles of OAuth.
Understand native applications and their distinct security challenges when utilizing OAuth.
Learn about and comprehend common extensions to OAuth protocols.
This instructor-led, live training in Lyon (online or onsite) is designed for intermediate-level system administrators who want to learn how to use Siteminder to implement various authentication methods.
Upon completion of this training, participants will be able to:
Grasp the core concepts of Siteminder and its role in authentication and access management.
Configure and manage user authentication using Siteminder.
Implement various authentication methods supported by Siteminder.
Troubleshoot common issues related to Siteminder authentication.
Integrate Siteminder with other identity providers for federated authentication.
Basel III represents a global regulatory framework addressing bank capital adequacy, stress testing, and market liquidity risk. Originally established by the Basel Committee on Banking Supervision in 2010–11, the Accord’s implementation timeline has been extended to March 31, 2019. Basel III enhances bank capital requirements by boosting liquidity and reducing leverage.
Unlike Basel I & II, Basel III mandates different reserve levels for various deposit types and borrowings, working in tandem with rather than replacing its predecessors.
Navigating this complex, evolving landscape can be challenging. Our course and training support helps you manage anticipated changes and their impact on your institution. As an accredited training partner of the Basel Certification Institute, we guarantee that our materials and training quality remain current and effective.
Objectives:
Prepare for the Certified Basel Professional Examination.
Define hands-on strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within a banking organization.
Target Audience:
Board members with risk responsibilities
CROs and Heads of Risk Management
Members of the Risk Management team
Compliance, legal, and IT support staff
Equity and Credit Analysts
Portfolio Managers
Rating Agency Analysts
Overview:
Introduction to Basel norms and amendments to the Basel Accord (III)
Regulations for market, credit, counterparty, and liquidity risk
Stress testing for various risk measures, including how to formulate and deliver stress tests
The likely effects of Basel III on the international banking industry, including demonstrations of its practical application
This four-day event (CGEIT training) serves as the ultimate preparation for the exam period. It is specifically designed to ensure that you pass the challenging CGEIT exam on your first attempt. The CGEIT qualification is an internationally recognized symbol of excellence in IT governance, awarded by ISACA. It is intended for professionals who are responsible for managing IT governance or who hold significant advisory or assurance responsibilities regarding IT governance. Earning CGEIT status will provide you with broader recognition in the marketplace, as well as increased influence at the executive level.
Objectives:
This seminar has been designed to prepare delegates for the CGEIT examination by enabling them to supplement their existing knowledge and understanding, thereby better preparing them to pass the exam as defined by ISACA.
Target Audience:
Our training course is intended for IT and business professionals who possess significant IT governance experience and are undertaking the CGEIT exam.
This comprehensive, hands-on 3-day program equips participants with the knowledge and skills needed to manage information security, assurance, and risk-based processes. The CISMP course aligns with the latest national information assurance frameworks (IAMM), as well as ISO/IEC 27002 & 27001, which serve as the code of practice and standard for information security. It is also a CESG Certified Training (CCT) course.
Structured according to the most recent BCS syllabus, the course prepares delegates for the 2-hour multiple-choice BCS examination.
Earners will gain detailed understanding of core information security concepts—including confidentiality, integrity, availability, vulnerabilities, threats, risks, and countermeasures—along with an appreciation of current legislation and regulations affecting information security management. Certificate holders will be able to apply the practical principles taught throughout the course, ensuring that routine business processes are both robust and secure.
This instructor-led, live training in Lyon (online or onsite) is aimed at payment services compliance professionals who wish to create, implement, and enforce a compliance program within an organization.
By the end of this training, participants will be able to:
Understand the rules set forth by government regulators for payment service providers.
Create the internal policies and procedures needed to satisfy government regulations.
Implement a compliance program that adheres to relevant laws.
Ensures that all corporate processes and procedures comply with the compliance program.
Uphold the business's reputation while protecting it from lawsuits.
Physical infrastructure forms the bedrock of network security. In this instructor-led, live training in Lyon, attendees will explore the security vulnerabilities associated with computer server rooms and discover how to fortify them through intelligent practices, strategic planning, and effective technology implementation.
Upon completing this training, participants will be able to:
Evaluate their organization's security risks specific to computer server rooms.
Implement control and monitoring systems to limit physical access to critical infrastructure.
Craft tailored access policies for various stakeholder groups.
Effectively communicate security protocols to team members.
Cybersecurity expertise is in high demand as threats continue to plague enterprises worldwide. An overwhelming majority of professionals surveyed by ISACA recognize this reality and plan to work in roles requiring cybersecurity knowledge. To address this need, ISACA has developed the Cybersecurity Fundamentals Certificate, offering education and verification of skills in this critical domain.
Objectives:
As cybersecurity threats escalate and the shortage of well-equipped security professionals grows globally, ISACA's Cybersecurity Fundamentals Certificate program provides an effective way to rapidly train entry-level employees and ensure they possess the necessary skills and knowledge to succeed in the cybersecurity arena.
Target Audience:
This certificate program is one of the best ways to gain foundational cybersecurity knowledge and begin building your skills in this crucial area.
This instructor-led, live training, offered online or onsite, is targeted at enterprise leaders aiming to understand data sovereignty principles and develop compliant data management strategies.
By the end of this training, participants will be able to define data sovereignty, identify relevant laws, assess compliance risks, and implement governance frameworks for cross-border data management.
In this instructor-led, live course in Lyon, participants will learn how to develop an effective security strategy to address the challenges of DevOps security.
This course offers an expert introduction to the newly enacted Accessibility Law, empowering developers with the practical skills needed to design, develop, and maintain fully accessible applications. Beginning with a contextual discussion on the law's significance and implications, the curriculum quickly transitions to hands-on coding practices, tools, and testing techniques to ensure compliance and inclusivity for users with disabilities.
To ensure that an individual has the core understanding of GRC processes and capabilities, and the skills to integrate governance, performance management, risk management, internal control, and compliance activities.
Overview:
Essential terminology and definitions
Fundamental principles of GRC
Core components, practices, and activities
The relationship between GRC and other disciplines
This instructor-led, live training in Lyon (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
Understand the key concepts of the HiTrust CSF (Common Security Framework).
Identify the HITRUST CSF administrative and security control domains.
Learn about the different types of HiTrust assessments and scoring.
Understand the certification process and requirements for HiTrust compliance.
Know the best practices and tips for adopting the HiTrust approach.
This course equips you with the skills to establish information security practices according to ISO 27005, which focuses on information security risk management based on ISO 27001.
This instructor-led, live training in Lyon (online or onsite) is aimed at public sector professionals who wish to use information security management and IT service management practices to strengthen digital security strategies and protect institutional digital assets.
By the end of this training, participants will be able to: explain core information security concepts, identify risks in information systems and services, apply practical security controls, and support secure IT service delivery.
This course is designed for all employees seeking a practical grasp of Compliance and effective Risk Management.
Course Format
Training is delivered via a blended learning approach, incorporating:
Facilitated group discussions
Slide-based presentations
Case study analysis
Real-world examples
Course Objectives
Upon completion, participants will be able to:
Gain a robust understanding of the core principles of Compliance, alongside national and international initiatives designed to manage associated risks.
Articulate how organizations and their teams can establish a robust Compliance Risk Management Framework.
Define the responsibilities of the Compliance Officer and the Money Laundering Reporting Officer, and understand how these roles function within a broader business structure.
Identify critical risk areas within Financial Crime, particularly concerning international operations, offshore centers, and high-net-worth individuals.
This instructor-led, live training (online or onsite) targets cloud professionals aiming to design and deploy multi-cloud architectures that prevent vendor lock-in and uphold data sovereignty.
By the end of this training, participants will be capable of identifying vendor lock-in risks, designing portable architectures, implementing data sovereignty controls, and leveraging cloud-agnostic tools.
This instructor-led, live training session (available online or on-site) is designed for security engineers and firmware developers seeking to strengthen OpenBMC deployments against unauthorized access and firmware tampering.
This instructor-led live training in Lyon (online or on-site) focuses on analyzing Open Data risks while reducing vulnerability to disasters or data loss.
By the end of this training, participants will be able to:
Understand the concepts and benefits of Open Data.
Identify the different types of data.
Understand the risks of Open Data and how to mitigate them.
Learn how to manage Open Data risks and create a contingency plan.
Implement Open Data risk mitigation strategies to reduce disaster risk.
This instructor-led, live Payment Card Industry Professional training in Lyon (online or onsite) offers a professional qualification for industry practitioners seeking to demonstrate their expertise and understanding of the PCI Data Security Standard (PCI DSS).
Upon completing this training, participants will be able to:
Grasp the payment process and the PCI standards established to safeguard it.
Comprehend the roles and responsibilities of entities within the payment industry.
Gain deep insight into the 12 requirements of PCI DSS.
Apply knowledge of PCI DSS to organizations involved in the transaction process.
This instructor-led, live training in Lyon (online or on-site) is aimed at IT administrators, security coordinators, and compliance managers who wish to identify, evaluate, and implement security policy management methods for their organization.
By the end of this training, participants will be able to develop, manage, and monitor security policies to protect their organization's information, network, and physical and software assets.
This capstone program equips participants with the skills to design, deploy, and manage a fully sovereign digital infrastructure stack from the ground up. Upon completion, learners will have constructed a functional mini-organization utilizing exclusively self-hosted, open-source solutions. This includes identity management, communication, productivity suites, development tools, security protocols, AI capabilities, and monitoring systems, entirely independent of Google, Microsoft, AWS, or proprietary SaaS offerings.
Wazuh is an open-source security platform providing unified XDR and SIEM capabilities for threat detection, integrity monitoring, incident response, and compliance. It aggregates endpoint telemetry into a self-managed analysis engine, offering a credible alternative to Splunk Enterprise Security, Microsoft Sentinel, and other cloud-native SIEMs.
Read more...
Last Updated:
Testimonials (6)
Details on the operation
Eric Nowakowski - Aperam
Course - CCTV Security
Machine Translated
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
The way to receive the information from the trainer
Mohamed Romdhani - Shams Power
Course - CISM - Certified Information Security Manager
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
Online Security Management training in Lyon, Security Management training courses in Lyon, Weekend Security Management courses in Lyon, Evening Security Management training in Lyon, Security Management instructor-led in Lyon, Security Management instructor in Lyon, Security Management classes in Lyon, Security Management boot camp in Lyon, Evening Security Management courses in Lyon, Security Management one on one training in Lyon, Security Management coaching in Lyon, Security Management trainer in Lyon, Security Management private courses in Lyon, Weekend Security Management training in Lyon, Security Management on-site in Lyon, Security Management instructor-led in Lyon, Online Security Management training in Lyon