info@gisat.org 1 - 833 - 654 - 4727

Training Program

Image Description

Compliance authority for GISAT offers three different levels of training, this is to ensure that the individual participating in the certification exams has enough competence about the implementation and strategy of a cyber security framework that involves policies and controls. These trainings are designed in a way so that attendees will gain further knowledge overall about Cyber Security Compliance which in the end can reduce risk mitigation for their organization.

 

BENEFITS OF GISAT TRAINING

  1. Awareness of GISAT Framework. 
  2. General practice required in using IT systems 
  3. How to get your organization compliant with GISAT.
  4. What threats should be reported.
  5. Understanding the security portfolio of the organization.
  6. Competence for auditing.
 

GISAT Cyber Certificate Level 1

Our GISAT training course enables participants to learn about the best overall technical practices for implementing and managing GISAT level one controls.  Our online training programs help students understand the requirements that are needed to build a successful security posture, such as asset management, password management, securing DNS, implementing anti malware and lastly planning a Information Security System for their organization all while using GISAT level one control requirements as a guideline.

Duration of Course : 1 Day

Mode of Training: Virtual Classroom

Training Content

  1. Pre-assessment of participants for Cybersecurity.
  2. Basic understanding of the GISAT Framework.
  3. Introduction of GISAT process map and Domains.  
  4. Introduction of GISAT Level one controls.  
  5. Implementation strategy for GISAT Framework.
  6. GISAT framework implementation and certification process.
  7. Components of Asset registry and their significance.
  8. Training on required Policies and Procedures.
  9. Technical requirements of GISAT and recommendations for compliance.
  10.  Internal GISAT Level one Readiness checklist.

Who Should Attend:

  1. Information Security Team members whether it be a consultant or employee
  2. IT Professionals wanting to gain a comprehensive knowledge of the main processes of an Information Security Management System
  3. Technical Resources involved in Certification Audits
  4. Security Managers
  5. Senior Managers responsible for the IT governance of an enterprise and the management of its risks 
  6. Quality Control Employees
  7. Auditors
Image Description

GISAT Cyber Certificate Level 2

Image Description

Internal Auditing is a very critical function of any information system and compliance program and a  valuable tool to evaluate the efficiency and effectiveness of an organization's controls. It is these controls that can mitigate any risks that can threaten an organization directly or indirectly. This course will be based on practical exercises where the participant will develop the necessary skills and competencies that are necessary to conduct internal audit efficiently and competently.

Duration of Course: 3 Days

Mode of Training - Virtual Classroom

Training Content

  1. Pre-assessment of participants for Cybersecurity.
  2. Basic understanding of the GISAT Framework.
  3. Introduction of GISAT process map and Domains.
  4. Introduction of GISAT controls.
  5. Implementation strategy for GISAT Framework.
  6. GISAT framework implementation and certification process.
  7. Risk assessment and risk mitigation plan preparation.
  8. Components of Asset registry and their significance.
  9. Training on required Policies and Procedures.
  10. Technical requirements of GISAT and recommendations for compliance.
  11. Internal GISAT Readiness checklist.
  12. Auditing techniques and methods.
  13. Type of Audits and Sampling methodology.
  14. Notes taking techniques and Audit reporting.
  15. Internal Audit reporting for GISAT
  16. Internal Audit workflow involving Compliance Authority

Who Should Attend:

  1. Internal Auditors
  2. Auditors wanting to perform and lead Information Security Management System certification audits
  3. Project managers or consultants wanting to master the Information Security Management System audit process
  4. Senior Managers responsible for the IT governance of an enterprise and the management of its risks
  5. Members of an information security team
  6. Expert advisors in information technology
  7. Technical experts wanting to prepare for an Information security audit function

GISAT Cyber Certificate Level 3

The course will educate you and provide the necessary skill sets needed so you can perform an effective external audit on behalf of GISAT. This course will provide you with learning on auditing techniques, audit notes, audit planning, communication during audit, coordination with Compliance Authorities, Certification Authority internal processes and Audit report writing. 

Duration of Course: 4 Days

Mode of Traning: Virtual Classroom

  1. Pre-assessment of participants for Cybersecurity.
  2. Basic understanding of the GISAT Framework.
  3. Introduction of GISAT process map and Domains.
  4. Introduction of GISAT controls.
  5. Implementation strategy for GISAT Framework.
  6. GISAT framework implementation and certification process.
  7. Risk assessment and risk mitigation plan preparation.
  8. Components of Asset registry and their significance.
  9. Training on required Policies and Procedures.
  10. Technical requirements of GISAT and recommendations for compliance.
  11. Internal GISAT Readiness checklist.
  12. Audit scheduling and plan preparation.
  13. Process walk-through about enrollment with Compliance Authority.
  14. Communication control during the audit. 
  15. Auditing techniques and methods.
  16. Type of Audits and Sampling methodology.
  17. Notes taking techniques and Audit reporting.
  18. External Audit reporting for GISAT
  19. External Audit workflow involving Compliance Authority.
  20. Engagement completion process.

 

Who Should Attend:

  1. Project managers or consultants wanting to prepare and to support an organization in the implementation of an Information Security Management System
  2. Auditors who wish to fully understand the Information Security Management System implementation process
  3. Senior Managers responsible for the IT governance of an enterprise and the management of its risks
  4. Members of an information security team
  5. Technical expert advisors in information technology
Image Description

Training Program

Our GISAT training course enables participants to learn about the best overall technical practices for implementing and managing GISAT level one controls.  Our online training programs help students understand the requirements that are needed to build a successful security posture, such as asset management, password management, securing DNS, implementing anti malware and lastly planning a Information Security System for their organization all while using GISAT level one control requirements as a guideline.

Duration of Course : 1 Day

Mode of Training: Virtual Classroom

Training Content

  1. Pre-assessment of participants for Cybersecurity.
  2. Basic understanding of the GISAT Framework.
  3. Introduction of GISAT process map and Domains.  
  4. Introduction of GISAT Level one controls.  
  5. Implementation strategy for GISAT Framework.
  6. GISAT framework implementation and certification process.
  7. Components of Asset registry and their significance.
  8. Training on required Policies and Procedures.
  9. Technical requirements of GISAT and recommendations for compliance.
  10.  Internal GISAT Level one Readiness checklist.

Who Should Attend:

  1. Information Security Team members whether it be a consultant or employee
  2. IT Professionals wanting to gain a comprehensive knowledge of the main processes of an Information Security Management System
  3. Technical Resources involved in Certification Audits
  4. Security Managers
  5. Senior Managers responsible for the IT governance of an enterprise and the management of its risks 
  6. Quality Control Employees
  7. Auditors

Internal Auditing is a very critical function of any information system and compliance program and a  valuable tool to evaluate the efficiency and effectiveness of an organization's controls. It is these controls that can mitigate any risks that can threaten an organization directly or indirectly. This course will be based on practical exercises where the participant will develop the necessary skills and competencies that are necessary to conduct internal audit efficiently and competently.

Duration of Course: 3 Days

Mode of Training - Virtual Classroom

Training Content

  1. Pre-assessment of participants for Cybersecurity.
  2. Basic understanding of the GISAT Framework.
  3. Introduction of GISAT process map and Domains.
  4. Introduction of GISAT controls.
  5. Implementation strategy for GISAT Framework.
  6. GISAT framework implementation and certification process.
  7. Risk assessment and risk mitigation plan preparation.
  8. Components of Asset registry and their significance.
  9. Training on required Policies and Procedures.
  10. Technical requirements of GISAT and recommendations for compliance.
  11. Internal GISAT Readiness checklist.
  12. Auditing techniques and methods.
  13. Type of Audits and Sampling methodology.
  14. Notes taking techniques and Audit reporting.
  15. Internal Audit reporting for GISAT
  16. Internal Audit workflow involving Compliance Authority

Who Should Attend:

  1. Internal Auditors
  2. Auditors wanting to perform and lead Information Security Management System certification audits
  3. Project managers or consultants wanting to master the Information Security Management System audit process
  4. Senior Managers responsible for the IT governance of an enterprise and the management of its risks
  5. Members of an information security team
  6. Expert advisors in information technology
  7. Technical experts wanting to prepare for an Information security audit function

The course will educate you and provide the necessary skill sets needed so you can perform an effective external audit on behalf of GISAT. This course will provide you with learning on auditing techniques, audit notes, audit planning, communication during audit, coordination with Compliance Authorities, Certification Authority internal processes and Audit report writing. 

Duration of Course: 4 Days

Mode of Traning: Virtual Classroom

  1. Pre-assessment of participants for Cybersecurity.
  2. Basic understanding of the GISAT Framework.
  3. Introduction of GISAT process map and Domains.
  4. Introduction of GISAT controls.
  5. Implementation strategy for GISAT Framework.
  6. GISAT framework implementation and certification process.
  7. Risk assessment and risk mitigation plan preparation.
  8. Components of Asset registry and their significance.
  9. Training on required Policies and Procedures.
  10. Technical requirements of GISAT and recommendations for compliance.
  11. Internal GISAT Readiness checklist.
  12. Audit scheduling and plan preparation.
  13. Process walk-through about enrollment with Compliance Authority.
  14. Communication control during the audit. 
  15. Auditing techniques and methods.
  16. Type of Audits and Sampling methodology.
  17. Notes taking techniques and Audit reporting.
  18. External Audit reporting for GISAT
  19. External Audit workflow involving Compliance Authority.
  20. Engagement completion process.

 

Who Should Attend:

  1. Project managers or consultants wanting to prepare and to support an organization in the implementation of an Information Security Management System
  2. Auditors who wish to fully understand the Information Security Management System implementation process
  3. Senior Managers responsible for the IT governance of an enterprise and the management of its risks
  4. Members of an information security team
  5. Technical expert advisors in information technology

Training Calendar

Certification Level Start Date End Date Start/End Time Batch Type Training Mode Appoinment
GISAT Cyber Certificate Level 3 06 Nov 2021 18 Dec 2021 09:00 - 13:00 (IST) Weekend Online Enroll


Useful Links

Contact Us

53 St Regis Crescent South
Suite 207
Toronto, Ontario
M3J 1Y6


2851 Clyde Park Ave SW
Wyoming, MI 49509
United States

 

1 - 833 - 654 - 4727