Everyone today understands the critical importance of cyber security.
For organisations, get your security right and it is a business enabler. Get it wrong and you are somewhere between damage and disaster.
For individuals it is simple - cyber security offers one of the best career paths in IT today.
In both cases, getting the right training makes all the difference.
"The right training can change everything!"
Here is a list of our top 10 Cyber Security courses. Click to view or scroll down for more.
Trusted provider
We have been providing quality training to business and government since 1994. Our courses are held throughout the Asia-Pacific - Singapore, Australia, Malaysia, New Zealand, Hong Kong. More than 52,000 people have trained with ALC.
Choice of Time Zones
In today's COVID world just about all training is conducted as Live Virtual. We offer three convenient time zones - ASEAN (UTC+8), AEST (UTC+10) and Pacific (UTC+12).
All the Major Certifications
We offer a very comprehensive program including CISSP®, CISM®, SABSA®, CRISC®, CCSP®, CISA®, CSF+P™, ISO 27001, NIST, CTIA, Digital Forensics, Security Metrics.
Tier 1 Trainers
Lots of things go into making a great course, but the single most important is always the trainer: their knowledge of the subject, their real world experience, their ability to answer questions, their communication skills. This is what makes the difference. ALC works only with Tier 1 international standard trainers.
Reliable Public Schedule - No Cancellation
We offer a lot of course dates and we don't cancel. You can book your training with confidence.
Group and Private Training Solutions
We have many corporate and government clients with volume training requirements. If you have teams to train - no matter how large or small - or are looking for private training, we will provide you with attractive solutions.
There are actually two costs when you attend a training course – the course fee, and the value of your time or the time of your staff.
There is nothing worse than wasting hours and days on poor-quality training. We make sure that you get top value for your time by providing world-class trainers, proven and accredited course materials, outstanding customer service.
When it comes to the course fee, we work hard to be as competitive as possible. Contact us if you think you can get a better comparable deal anywhere else!
ALC's Cyber Security training portfolio is led by Peter Nikitser. Peter joined ALC in 2016 and is responsible for the ongoing development, review and implementation of essential courses to meet the demands of prospective delegates across Cyber Security, Cloud and Privacy.
Peter is exceptionally well qualified for this role and brings to bear a career spanning over 30 years in Information Technology, focusing on security even before the World Wide Web became mainstream. Prior to joining ALC, Peter held senior roles with Deloitte Australia, CSC (now DXC Technologies), and Queensland Government. His career has involved work in diverse sectors such as defence, government, health, oil and gas, and the mining resource sectors.
Peter is a founding member of the Australian Cyber Emergency Response Team (AusCERT) and also assisted with the establishment of the Sri Lankan national CERT. His specialities are Enterprise Security Architecture, Digital Forensics, Cyber Security in Healthcare, Risk Assessments and Cyber Security.
Peter is the first person to have attained SABSA Masters status in Australia, and his other formal qualifications include a Master’s Degree in Information Technology (MInfTech) from the Queensland University of Technology (QUT), and a Bachelor of Science (BSc) from the Australian National University (ANU).
Certifications: SABSA SCM, CISSP, CCSP, CISM, CISA, CRISC, CDPSE, CIPP/E, CIPM, CIPT
We offer an industry-leading structured portfolio of accredited training addressing cyber security at all levels of the organisation: beginners, career transition, specialists, professionals, management.
Courses are available for both public and private attendance. Click the image next to the course to see the public training dates. Contact us if you are interested in a private presentation just for your team.
ALC’s 5-day "flagship" Cyber Security Foundation+Practitioner™ is the standout course for anyone who wants a sound understanding of Cyber Security and a solid base on which to build their career. It is ideal for anyone wanting to start a career in Cyber, or to transition their career. It is the go-to course if you have a team that you need to rapidly upskill to be cyber-ready. There are no pre-requisites to attend.
[ Register, dates and fees, full details > ]
CISSP® is long regarded as the gold standard of security qualifications. It is based on the CBK (Common Body of Knowledge) which comprises eight subject domains that the (ISC)2 compiles and maintains through ongoing peer review by subject matter experts.This 5-day accelerated course provides information security professionals with a fully-immersed, minimum-distraction CISSP CBK training and certification experience. The course will broaden and deepen your understanding of all CBK domains as required for the (ISC)2 CISSP accreditation examination.
[ Register, dates and fees, full details > ]
Gain a thorough understanding of the information security risks and mitigation strategies critical to data security in the cloud in this (ISC)² Certified Cloud Security Professional (CCSP) Exam Preparation course. This course covers the six domains of the Official (ISC)² CCSP Common Body of Knowledge (CBK®) and prepares you to take the CCSP exam to become a Certified Cloud Security Professional.
[ Register, dates and fees, full details > ]
CISM is one of the most important infosec qualifications in the world today. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and advice. This course provides an intense environment in which participants can acquire the skills and knowledge expected of a world-class information security manager.
[ Register, dates and fees, full details > ]
CRISC is now one of the most highly sought-after qualifications. It is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management and positions them to become strategic partners to the enterprise. Established in 2010, CRISC has already been earned by more than 20,000 professionals worldwide. This three day course comprehensively covers the full CRISC syllabus and prepares you for a first-time pass in the CRISC exam.
[ Register, dates and fees, full details > ]
The CISA® has been the globally accepted standard of achievement amongst IT, Audit, Control and IT Security professionals. This intense, 4 day course provides comprehensive preparation for the CISA® exam - the basis of measurement for the profession.
[ Register, dates and fees, full details > ]
SABSA is the world’s most successful security architecture. It is the leading open-use best practice method for delivering cohesive information security solutions to enterprises. The SABSA framework ensures that the security needs of your organisation are met completely and are designed, delivered and supported as an integral part of your IT management infrastructure. This 5-day Foundation Certificate program has been designed to provide participants with a thorough coverage of the knowledge required for the SABSA Foundation Level Certificate.
[ Register, dates and fees, full details > ]
This SABSA Advanced module is designed for security professionals seeking to develop practical advanced competency to architect Business Risk, Assurance and Governance structures and processes in the SABSA context. Participants will master the skills and competencies to plan, design, implement and manage Risk, Assurance and Governance Architectures to their specific organisation, sector and culture.
[ Register, dates and fees, full details > ]
This SABSA Advanced module is designed for security professionals seeking to develop practical advanced competency to integrate and align Security & Risk with Enterprise Architecture Frameworks and Standards. Participants will master the skills and competencies to plan, design, implement and manage a SABSA Architecture and its through-life processes.
[ Register, dates and fees, full details > ]
The increasing tempo of cyber attacks by cyber criminals, state sponsored actors, and hacktivists is a major concern for all organisations within government and industry. Participants will learn how the SABSA framework can be applied to deliver effective incident management and monitoring.
[ Register, dates and fees, full details > ]
The NIST Cybersecurity Framework provides organisations with a tiered, risk-based approach for safeguarding their most critical assets - before, during and after a potentially disruptive cybersecurity incident. This 5-day course is designed for information security professionals who wish to gain a comprehensive understanding of the NIST Cybersecurity Framework and its application.
[ Register, dates and fees, full details > ]
Under first class instruction the ISMS Lead Implementer candidate will learn how to scope and deploy an Information Security Management System within the organisation. Update your Project Management skillset to lead a team through the deployment of ISMS. You will play a pivotal role in ensuring security management adheres to the internationally recognised ISO standard. Participants that successfully complete the exam will receive a BSI Certificate of Achievement as an ISO/IEC 27001 Lead Implementer.
[ Register, dates and fees, full details > ]
Candidates and organisations with a working knowledge of Information Security Management Principles and their associated concepts are invited to qualify for the ISO/IEC 27001: 2013 Lead Auditor certification. Combining exercises, tutorials and role play our qualified instructors engage candidates with a thorough working knowledge of how an ISMS audit should be run. This certification is suitable for managers in corporate governance, risk and compliance, IT, corporate security and information security.
[ Register, dates and fees, full details > ]
The 2013 Foundation course supplies candidates and organisations with a comprehensive set of learning outcomes in a globally accepted framework. Discover best practice Information Security Management and how to scope and implement ISM Systems within organisations. 27001 Foundation develops the candidate’s appreciation for security within technological frameworks and is suitable for delegates working in any capacity with InfoSec or organisations wishing to gain a better understanding of standards and best practice. ALSO AVAILABLE: ISO 27001 Overview
[ Register, dates and fees, full details > ]
Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high performing privacy team. Those taking this course will learn the skills to manage privacy in an organisation through process and technology – regardless of jurisdiction or industry.
[ Register, dates and fees, full details > ]
The CIPT is the first and only certification of its kind worldwide. It was launched by the International Association of Privacy Professionals (IAPP) in 2014 to meet the growing need that only technology professionals can fulfil—securing data privacy at all stages of IT product and service lifecycles.
[ Register, dates and fees, full details > ]
CIPP/E is the premier certification to understand data protection requirements for Europe. Developed in collaboration with leading law firms, the CIPP/E encompasses pan-European and national data protection laws, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.
[ Register, dates and fees, full details > ]
We all know the mantra that if you can’t measure it, you can’t manage it. Everybody wants security metrics, everybody seems to know that they are necessary, but how does the CISO or the IT department get them? This powerful 2-day course provides a wealth of tools, guidelines and inputs for anybody having to deal with security metrics.
[ Register, dates and fees, full details > ]
This 5-Day instructor-led course Digital Forensics & Data Analysis is the essential starting point for anyone wanting a career in digital forensics. It is designed to provide a solid and practical introductory coverage of the principles of identifying, preserving and analysing digital evidence, such as computers, mobile phones, and online sources. It is focused on providing participants with the knowledge required to perform a proper Collection, Triaging, and Reviewing of Digital Evidence.
[ Register, dates and fees, full details > ]
This 2 day course is based on SABSA, the world leading framework for security architecture and has been designed to provide participants with a thorough understanding of architecting secure cloud technologies in a way which drives business success.
[ Register, dates and fees, full details > ]
Effective organisational information security is much more than policies and procedures. It’s a mindset. With a surge of reported professional hackers, botnets, industrial espionage and breaches of privacy, there is a call for a new approach to security control and awareness. The human factor (what employees do or don’t do) is the single biggest threat to information systems and assets. Addressing the human factor ensures proper awareness and education to everyone who interacts with computer networks and systems in the basics of information security. An investment in security awareness training is the greatest investment in securing the assets of your company.
[ Register, dates and fees, full details > ]
This presentation provides introductory and practical coverage of information security for business executives. Using relevant scenarios and case studies, it is designed to help Executives respond to the security challenges they face and understand their role in the information security framework. The presentation is fully customisable and is available as a half-day or full-day workshop or else as a 2-hour briefing.
[ Register, dates and fees, full details > ]