Ask us a question

You are here

Training catalog

Approach has developed and regularly maintains a catalog of cyber-security courses in very specific areas. Our training are designed to be extremely flexible and customisable.

All our courses are tailor-made to the customer needs so that the form and content of our training are always directly applicable to your business context and technical environment.

 

Training

Description

Web Application Security

This 3 days course provides students with a broad and deep understanding of (Web) Application security related issues and risks. The course focuses on teaching individuals how to secure applications and how to integrate security into development practices, including testing security.

Introduction to cryptography, PKI and SSL/TLS for developers and architects

This course covers the practical steps to implement encryption and digital signature in an application, including the SSL/TLS management client- and server-side. This includes the deployment issues such as key storage, performance, etc.

It provides students with the underlying mechanisms of symmetric and asymmetric cryptography and the basis of PKI and certificates handling (how to generate, validate, etc.).

Web Application Firewalls

This course explains how a WAF works, which attacks it can prevent, how to choose one, how to configure it, which impact it has on the development, the organization, the operations, etc.

Application Servers security

This course explains how to harden servers, from general concepts like patching, up to advanced features like TLS/SSL algorithms choices or encryption of credentials in configuration files.

ISO27001 / Lead Implementer

This five-day intensive course enables participants to develop the necessary expertise to support an organization in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC 27001:2013. Participants will also gain a thorough understanding of best practices used to implement information security controls from all areas of ISO 27002. This training is consistent with the project management practices established in ISO 10006 (Quality Management Systems - Guidelines for Quality Management in Projects). This training is also fully compatible with ISO 27003 (Guidelines for the Implementation of an ISMS), ISO 27004 (Measurement of Information Security) and ISO 27005 (Risk Management in Information Security).

ISO27001 / Lead Auditor

This five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques. During this training, the participant will acquire the necessary knowledge and skills to proficiently plan and perform internal and external audits in compliance with ISO 19011 the certification process according to ISO 1702.Based on practical exercises, the participant will develop the skills (mastering audit techniques) and competencies (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to efficiently conduct an audit.

ISO27001 / Foundation

This two-day course enables participants to learn about the best practices for implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2005, as well as the best practices for implementing the information security controls of the eleven domains of the ISO 27002. This training also helps to understand how ISO 27001 and ISO 27002 relate with ISO 27003 (Guidelines for the implementation of an ISMS), ISO 27004 (Measurement of information security) and ISO 27005 (Risk Management in Information Security).

 

All our courses can be performed either on-site or off-site. As an option, Approach  proposes off-site professional training facilities for which Approach  has selected the best partners at affordable cost.  In function of the client’s need, the duration of our courses may vary from one to a maximum of three days sessions, consecutive or not. As our training are tailor-made, less time is indeed spent than for generic training (or “one size fits all” trainings) which sometime describe numerous items that are not relevant in your particular context.

All courses materials are available in English, and can be performed in English, Dutch or French anywhere in Belgium or abroad.

Please contact us for more information and pricing

Our approach to cyber-security

Our customers benefit from the expertise and talent of our people, combined with pragmatic and proven methods and the efficiency brought by our assets:

1

Expertise and talent

Since 2001 we have applied our experience in cyber-security gained in various industries, from small to large businesses. Our people are seasoned, certified professionals who continuously improve and extend their knowledge.

2

Pragmatic and proven methods

We rely on most recognised, easily auditable and adopted standards and good practices and apply them pragmatically. We always tailor our approach to your particular context, needs and organisation culture.

3

Asset-based approach

We make use of the most advanced and reliable tools and solutions to support our services. This enables us to be more efficient during delivery, enforce the use of standard auditable methods and provide transparency about our achievements and your results.

+
Certified professionals
0+
Success stories
0
Year of establishment
+ 0%
Average annual growth