Security & Risk Management Academy

Secure your business, and level up your risk management approach

We have advised more than 400 companies and trained over 1500 professionals. Will you be next?

Security

Secure your business in alignment with the stakeholders needs and augment your level of protect in a proactive way by adopting an iterative security and risk management framework such as ISO 27001, 27005, 27032 & 31000

  • Strategy creation
  • Security Management System
  • Security Dashboard
  • Architectures
  • Training & Awareness
  • Packaged security services
  • CSO, CISO services

Risk Management

Adopt a pragmatic approach for an iterative risk management framework, and prioritize your efforts on the most important issues for your business.

  • Risk frameworks implementations
  • Risk Management tool implementations
  • Packaged Risk Management Services
  • CRO Services

ACTAGIS delivers trainings at University of Paris I: Panthéon-Sorbonne

Training the new generation in Cybersecurity, IT Governance, Business Continuity and Quality Management is our passionate commitment. Our Lead Trainer Jeff Primus, with 14 years of experience at University of Paris I: Panthéon-Sorbonne, contributes to the development of future leaders and innovators. At ACTAGIS, we value this contribution and are committed to continuing with excellence and integrity.

Current Month

Course dates can be based on your requirements. Please contact us for the corresponding in-house or public session trainings, so that we can propose sessions taking into account your availability.

Official BCI Certification

Official certification or certificate of attendance

ACTAGIS, as the official partner and trainer of PECB for Switzerland and Europe, as the official partner of SABSA for Switzerland and France, and based on a long term partnership with the ISACA Swiss Chapter, proposes learning and preparation classes for certifications and provides the exams sessions.

We guarantee your exam success

Nearly 100% success rate!
We will support you until you pass the exam of the course in which you enroll (some conditions apply). We offer the official mock exams to help you prepare.

Swiss Quality around the world

Our attention to detail, staying up to date, all reflect our commitment to quality. Our trainers bring real-life project experience in implementing frameworks and programs in large organizations.

Hands-on exercises

Free consulting session included

Most of our training programs include a supplementary free online consulting session to help you implement your project in your organisation.

Small classes

Competitive pricing

To ensure that our courses are available to all sizes of companies, we practice competitive pricing.

English and French

Learn from where you are

Our courses are delivered in a traditional classroom setting, as well as live online with an instructor. Certain courses are also available in a self-study format.

Our courses

ISO 27001

Lead Implementer / Lead Auditor / Introduction
Training Courses and Certification Exam

Information Security

Information Security is definitely one of the most important issues that concern all professionals around the world.

ISO 27701

Lead Implementer / Lead Auditor
Training Courses and Certification Exam

Privacy information management

Privacy information management is definitely a very important issue that concerns all professionals around the world. Check below to find the training that suits you best!

ISO 27005

Risk Manager / Lead Risk Manager
Training Courses and Certification Exam

Risk Management

Organizations are required to assess the security risks associated with their information systems as a prelude to treating them in various ways.

Our information security risk management training courses will help you learn how to deal with the highest risks in your information security management system.

ISO 27032

Lead Cybersecurity Manager
Training Courses and Certification Exam

Cybersecurity

The international standard ISO/IEC 27032 is intended to emphasize the role of different securities in the Cyberspace, regarding information security, network and internet security, and critical information infrastructure protection (CIIP). ISO/IEC 27032 as an international standard provides a policy framework to address the establishment of trustworthiness, collaboration, exchange of information, and technical guidance for system integration between stakeholders in the cyberspace.

Lead Cloud Security Manager

Training Courses and Certification Exam

As the use of cloud computing grows constantly, so does the need to ensure cloud security. Data breaches and other forms of attacks happen mainly as a result of poor security practices, complicated controls, and misconfigurations. This makes cloud security essential to the effective operation of cloud services.

Organizations adopting cloud technology must ensure that the level of security of their cloud systems meets their requirements and complies with the applicable laws and regulations.

General Data Protection Regulation

Data Protection
Training Courses and Certification Exam

Data Protection

Become acquainted to lead all the processes necessary to adopt a General Data Protection Regulation (GDPR) in an organization (Certified Data Protection Officer).

ISO 31000

Lead Risk Manager / Introduction
Training Courses and Certification Exam

Risk Management

Risk Management plays a vital role in an organization’s performance. Companies increasingly focus on identifying risks and managing them before they affect their business.

Our risk management training courses will help you learn how to deal with the highest risks in your information security management system.

PECB Chief Information Security Officer

For aspiring CISOs
Training courses and certification exam

Information Security

Information can be communicated, stored, refined, and used to control processes. It is one of the most valuable and significant assets in an organization. To ensure its proper management and protection, information must be traced throughout its lifecycle, from creation to disposal.

Lead Cybersecurity Manager

Training Courses and Certification Exam

Cybersecurity Management

Participants will learn the fundamental cybersecurity concepts, strategies, methodologies, and techniques utilized to effectively establish and manage a cybersecurity program based on the guidance of international standards and industry best practices for cybersecurity. 

Lead Ethical Hacker

Training Courses and Certification Exam

White Hat Hacking

The Certified Lead Ethical Hacker training course enables participants to develop the competence and knowledge required to conduct ethical hacking, mainly for information systems and network penetration tests. Apart from theoretical information, the training course also includes labs that are completed with a virtual machine.

Lead Pen Test Professional

Training Courses and Certification Exam

Penetration Testing

Lead Pen Test Professional training enables you to develop the necessary expertise to lead a professional penetration test by using a mix of practical techniques and management skills. 

Lead SCADA Security Manager

Training Courses and Certification Exam

Supervisory Control and Data Acquisition

Lead SCADA Security Manager training enables you to develop the necessary expertise to plan, design, and implement an effective program to protect SCADA systems. In addition, you will be able to understand common Industrial Control System (ICS) threats, vulnerabilities, risks related to the Industrial Control Systems (ICS) and techniques used to manage these risks. This training focuses on several aspects of security management and skills related to SCADA/ICS security.  

Computer Forensics Foundation

Training Courses and Certification Exam

Implement the forensics evidence recovery and analytical processes

Computer Forensics Foundation training enables you to learn the basic elements to implement Computer Forensics processes. During this training course, you will be able to understand computer forensics tools that are used to implement the forensics evidence recovery and analytical processes.

ISO/IEC 27033 Lead Network Security

Training Courses and Certification Exam

Concepts, principles, methods, and design techniques used to implement and manage network security

This training course is focused on developing the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining network security. It provides a comprehensive elaboration of the structure of the ISO/IEC 27033 series of standards, including network security overview and concepts, guidelines for the design and implementation of network security, and reference networking scenarios to securing the communication between networks using security gateways, VPNs, and wireless IP network access. 

EBIOS

Training Courses and Certification Exam

Risk Assessment Method

EBIOS Risk Manager training enables you to gain the necessary knowledge and develop the necessary competence to master risk management concepts and components related to all assets of relevance for Information Security based on the EBIOS method.

Risk management

CRISC is the only globally recognized certification in the fields of IS management and governance. It has earned a great reputation internationally for many years, as it sets a high and consistent standard worldwide.

The CRISC Job Practice Area consists of five “domains”, 39 “tasks” and 71 “knowledge statements”. Because the different tasks refer to the relevant COBIT processes, COBIT is an integral part of the CRISC training and certification.

CISM

Training Courses and Exam Preparation

IS security and governance

CISM is the only globally recognized certification in the fields of IS management and governance. It has earned a great reputation internationally for many years, as it sets a high and consistent standard worldwide. 

The CISM Job Practice Area consists of five “domains”, 37 “tasks” and 60 “knowledge statements”. Because the different tasks refer to the relevant COBIT processes, COBIT is an integral part of the CISM training and certification.

CISSP

Training Courses and Certification Exam Preparation

Certified Information Systems Security Professional

This 5-day training is composed of theory modules covering the 8 CISSP domains which were updated in April 2015, interlaced with exam questions, offering the participant an optimal preparation for the certification exam.

Interested? Ask us more!

    Your interest

    Name (required)

    Email (required)

    Direct Business Phone with country code (required)

    Mobile Phone with country code (required)

    City (required)

    Country (required)

    Your message