Thursday, 20 April 2017 at 8:45 am – Friday, 21 April 2017 at 5:30 pm (AEST)
This course is designed to provide participants, with no prior exposure to Big Data (BD), with the knowledge and practical skills to start using Big Data in their organisations. Initially the course covers four (4) of the most popular tools for processing Big Data – Apache Hadoop, Apache Spark, Apache Hive and MongoDB. It then progresses to the topic of Machine Learning (ML) and provides practical exercises demonstrating how ML is used.
A distinguishing feature of the course is its practical aspect. At the end of each module there is a practical exercise designed to reinforce the concepts of the module and to give participants a chance to “get their hands dirty”.
At the start of the course, each participant will receive a USB with a fully configured Virtual Machine (VM) that will be used for the practical work throughout the course. Students will be allowed to keep the VMs after the course, so that they refer to the exercises in their day-to-day work and, when they feel more confident, to modify and enhance them to be used in their audit engagements.
- Date: 20-21 April 2017
- Information and registration link – https://goo.gl/SXb3EL
- Early Bird close – 15 March 2017 ($100 discount off the reduced member price)
- Price (incl. of GST and after $500 discount for ISACA members):
- Standard – $1,150
- Early Bird – $1,050
- Duration: 2 days/15 hours
- Catering: Lunch, morning and afternoon tea included
What you will learn
Click on the image below to access a larger vesion of the full course program. (Opens in new window).
Join industry thought leaders, Mikko Hypponen, Chief Research Officer, F-Secure, Phil Zimmerman, Co-Founder and Chief Scientist, Silent Circle and Francoise Gilbert, General Counsel, Cloud Security Alliance, among others, at the inaugural Data Privacy Asia (DPA) 2015 conference in Singapore from 25 to 28 August 2015.
Data is a source of business advantage, but also a source of business risk. As the amount of data transmission doubles in size every two years, so does the number of security breaches. The past year has seen data breaches make headlines in Asian news channels, prompting governments to take tougher data privacy regulations. This has also raised public awareness data privacy issues, making data privacy imperative to businesses in Asia.
DPA 2015 offers a platform for you to get the latest trends and pressing issues of data privacy, protection and cyber security in Asia. The event also gives like-minded professionals the opportunity to network and learn about the best practices of the companies represented at the conference. DPA spans more than 35 sessions and two training workshops over four days.
Workshops will be conducted by Terry McQuay, President and Founder, Nymity and Rebecca Herold, Chief Executive Officer, The Privacy Professor. These workshops are especially designed for data privacy professionals. The first 100 signups will enjoy complimentary passes to Nymity’s newest global workshop organized at Data Privacy Asia 2015.
ISACA Melbourne Chapter members are entitled to a 30 per cent discount for individual tickets. Interested ISACA Melbourne members looking to book as a group are entitled to 40 per cent discount. Enter the Reference Number, ISACA001, to be eligible for the discount.
Date: Tuesday, 25 August 2015 to Thursday, 28 August 2015
Venue: Grand Hyatt Singapore
Visit this website to register or for more information: https://www.dataprivacyasia.com
This course provides introductory and practical coverage of all aspects of COBIT 5 for Information Security, including its components, enablers and implementation guidance. Using relevant scenarios or case studies, this course will highlight how COBIT 5 for Information Security can be used in parts or holistically in a simple and pragmatic way.
This course will also cover a high-level overview of how COBIT 5 for Information Security can be leveraged to implement or improve an Information Security Management System (ISMS), compliant with ISO/IEC 27001 requirements.
Who Should Attend
Chief information security officers (CISOs), information security managers (ISMs) and other information security professionals who are interested in realigning their Information Security function and/or initiatives will benefit from this course.
- Learn how companies are dealing with security effectively
- Discover what strategies and techniques major organisations are using to address security
- Identify what you can do right away and get answers to all your questions
- Network with peers who wrestle with similar issues and concerns
- Gather up-to-the-minute advice from leading practitioners and recognised experts.