Looking for CPE Credits

Check out our trainings below through Illumeo

Auditing Active Directory

Auditing Active Directory   Click for 10% off through Illumeo   Active Directory Security Controls are integral to ensuring the completeness, accuracy, integrity and privacy of data. First, this course takes you through the architecture of Active Directory. We discuss methodologies for identifying Forests and auditing Domains, Organizational Units and Groups. Next, you learn how to develop a practical methodology for auditing and securing Active Directory. We discuss attacks against Active

Click for 10% Off »

Auditing Change Management

Auditing Change Management   Click for 10% off through Illumeo   IT Change Management Controls are integral to ensuring the completeness, accuracy, integrity and privacy of data. A robust change management process provides management with assurance only authorized and tested changes to systems and infrastructures are implemented. As such, the audit or compliance professional must have a solid understanding of the corresponding controls and IT operations best practices. In this course, attendees learn how to ensure proper controls have been

Click for 10% Off »

Auditing Logical Security and Logical Access Controls

Auditing Logical Security and Logical Access Controls   Click for 10% off through Illumeo   Logical Security Controls are integral to ensuring the completeness, accuracy, integrity and privacy of data.  Logical Security Controls are comprised of tactics such as utilizing restricting user access, limiting administrative privileges, enforcing strong passwords and encrypting data.  In this course you will learn how to ensure proper controls have been implemented to protect corporate assets, company

Click for 10% Off »

Auditing Information Technology (IT) General Controls

Auditing Information Technology (IT) General Controls   Click for 10% off through Illumeo   IT Controls are integral to ensuring the completeness, accuracy, integrity and privacy of data.  IT Controls are comprised of tactics such as utilizing strong passwords, encrypting laptops and backing up files.  In this course you will learn how to ensure proper controls have been implemented to protect corporate assets, company trade secrets, customer and employee identity and

Click for 10% Off »

Security Information Event Management (SIEM) – A Cybersecurity Solution to Preventing Phishing, Ransomware and Data Breaches

Security Information Event Management (SIEM) – A Cybersecurity Solution to Preventing Phishing, Ransomware and Data Breaches   Click for 10% off through Illumeo   Security information and event management (SIEM) is an approach to security management that seeks to provide a complete view of an organization’s information technology security. This course provides participants with an understanding of SIEM, methodologies and software options. We delve into understanding the levels of security, ease

Click for 10% Off »

Performing a Security Assessment

Performing a Security Assessment   Click for 10% off through Illumeo   To stay safe, organizations need to maintain a deep understanding of developing threats and their own security posture. Rarely are the necessary resources actually fully dedicated.  In this course we show you what a security assessment and its various components are. This course takes you through a variety of controls you can implement to protect your organization’s assets, brand and

Click for 10% Off »

Moving Core Company Processes Securely to the Cloud

Moving Core Company Processes Securely to the Cloud   Click for 10% off through Illumeo   Participation in cloud storage and cloud computing is becoming less and less of an option and more of an industry standard. As organizations begin moving critical processes to the cloud, it is important they assess cloud providers’ internal controls to ensure data integrity, availability and privacy.  In this course we discuss techniques and methodologies for evaluating

Click for 10% Off »

Acquisitions and Mergers – IT Considerations and Impact

Acquisitions and Mergers – IT Considerations and Impact   Click for 10% off through Illumeo   During an acquisition or merger companies are very interested in revenue, losses, potential for growth and the like. Technology is all too often an after-thought.   In this course we discuss techniques and methodologies for evaluating the new infrastructure, as well as the impact to existing infrastructure. This course provides you with a checklist of technology items

Click for 10% Off »

SSAE18 – Maximizing The Value and Benefit

SSAE18 – Maximizing The Value and Benefit   Click for 10% off through Illumeo   Statement on Standards for Attestation Engagements (SSAE) reports are required to be reviewed as part of Attestation Engagements, however, organizations can gleam great value from these reports if the appropriate level of review is performed and the proper questions are asked. During this course we discuss the evolution of the report from SSAE No. 16 to

Click for 10% Off »

Protect Your Data from Hackers, Virus and Phishing Schemes

Protect Your Data from Hackers, Virus and Phishing Schemes   Click for 10% off through Illumeo   “Your data may have been breached.”  It seems like that is a headline on an all too frequent basis.  These attacks can be avoided.  In this course we will discuss technologies that can be implemented to effectively prevent hacking attempts, viruses and phishing attempts from becoming a disastrous event. This course helps you learn the meaning of

Click for 10% Off »