Cyber Secure Canada Auditor : Why should you attend?

Cyber Secure Canada Auditor training will provide you the knowledge and skills to plan and conduct the audits in compliance with the Cyber Secure Canada certification process. This training course will help you learn the audit techniques and skills needed to manage an audit program, audit team, communication with customers and conflict resolution. By the end of this course, you will be able to lead, plan, implement, and report on Cyber Secure Canada audit within an enterprise conforming to Cyber Secure standards, and this will enable you to become auditing experts.

You can achieve the “SourcetekIT Certified CSC Auditor” credential after completion of the course and passing the associated exam during the training. By holding this title, you will demonstrate that you are competent to perform the audits.

Who should Attend?

  • Auditor seeking to lead the Cyber Secure Canada Audit.
  • Technical Experts seeking to prepare for the Cyber Secure Canada Audit.
  • Quality Professionals
  • Security Managers
  • Internal and External Auditors
  • Risk and Compliance manager
  • Information Security Manager
  • Information Security Consultants
  • IT and Corporate Security Managers
attend
cources-outline

Course Outline

  • Pre-assessment of participants for Cybersecurity.
  • Basic understanding of the Cyber Secure Canada Framework and it’s benefits.
  • Introduction of Organizational and Baseline controls.
  • Information security policies and procedures.
  • Planning and Preparation of Audits.
  • Reviewing processes and techniques.
  • Task of auditors.
  • Cyber Secure Canada report card.
  • Certification Exam for CSC.

Educational Approach

Onsite

Training can be provided onsite, making it easier for attendees.

Classroom

SourcetekIT provides training from their training office.

Remotely

We use a web portal to deliver remote training which has the capabilities of;

  • Chat room
  • Whiteboarding
  • Video Conference

"Find out how you and your organization can be in compliance with the appropriate security controls and regulations.”


Contact Us