Approach has developed and regularly maintains a catalogue of cybersecurity courses in very specific areas. Our trainings are designed to be flexible and customisable to meet your needs – going from “Do it Yourself“ modules with PECB to trainings tailor-made to your business context and technical environment.
All courses below marked with an * are available in the Do It Yourself formats
All other courses can be performed either on- or off-site. As an option, Approach proposes off-site professional training facilities for which Approach has selected the best partners at affordable cost. According to the client’s need, the duration of our courses may vary from one to a maximum of three-day sessions, consecutive or not. As our trainings are tailor-made, less time is indeed spent than for generic training (or “one size fits all” trainings) which sometimes describes numerous items that are not relevant in your particular context.
All courses materials are available in English, and can be performed in English, Dutch, or French anywhere in Belgium or abroad.
Please contact us for more information and pricing
Training | Description |
ISO27001 / Lead Implementer* | This five-day intensive course enables participants to develop the necessary expertise to support an organisation in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC 27001:2013. Participants will also gain a thorough understanding of best practices used to implement information security controls from all areas of ISO 27002. This training is consistent with the project management practices established in ISO 10006 (Quality Management Systems - Guidelines for Quality Management in Projects). This training is also fully compatible with ISO 27003 (Guidelines for the Implementation of an ISMS), ISO 27004 (Measurement of Information Security) and ISO 27005 (Risk Management in Information Security). To find out more about our other certification paths, click here. |
Introduction to cryptography, PKI and SSL/TLS for developers and architects | This course covers the practical steps to implement encryption and digital signatures in an application, including the SSL/TLS management client- and server-side. This includes the deployment issues such as key storage, performance, etc. It provides students with the underlying mechanisms of symmetric and asymmetric cryptography and the basis of PKI and certificates handling (how to generate, validate, etc.). |
Web Application Firewalls | This course explains how a WAF works, which attacks it can prevent, how to choose one, how to configure it, which impact it has on the development, the organisation, the operations, etc. |
Application Servers security | This course explains how to harden servers, from general concepts like patching, up to advanced features like TLS/SSL algorithms choices or encryption of credentials in configuration files. |
Web Application Security | This 3-day course provides students with a broad and deep understanding of (Web) Application security related issues and risks. The course focuses on teaching individuals how to secure applications and how to integrate security into development practices, including testing security. |
ISO27001 / Lead Auditor | This five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques. During this training, the participant will acquire the necessary knowledge and skills to proficiently plan and perform internal and external audits in compliance with ISO 19011 the certification process according to ISO 1702.Based on practical exercises, the participant will develop the skills (mastering audit techniques) and competencies (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to efficiently conduct an audit. |
ISO27001 / Foundation | This two-day course enables participants to learn about the best practices for implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2005, as well as the best practices for implementing the information security controls of the eleven domains of the ISO 27002. This training also helps to understand how ISO 27001 and ISO 27002 relate with ISO 27003 (Guidelines for the implementation of an ISMS), ISO 27004 (Measurement of information security) and ISO 27005 (Risk Management in Information Security). |