Your Pathway to
Global IT Certification
Lead in IT Audit, Governance, and Cybersecurity with ISACA
SACA is a global leader in IT governance, cybersecurity, risk management, and audit certifications. Recognized worldwide, ISACA’s programs empower professionals with the frameworks, best practices, and technical skills needed to manage technology and risk in today’s complex digital landscape. Their certifications open doors to leadership roles across industries that demand trusted IT governance and security expertise.
At Mature Resources Global Technologies (MRGT), we deliver ISACA’s globally respected training paths to help professionals advance their careers in cybersecurity, audit, risk, and enterprise governance. Whether you are entering the field or expanding your leadership profile, MRGT’s ISACA programs build the technical depth and strategic skills you need to thrive.
Certified Information Systems Auditor
Build expertise in auditing, controlling, and assuring information systems and business processes.
Certified Information Systems Auditor
Course Outline
- Module 1: Information System Auditing Process
Module 2: Governance and Management of IT
Module 3: Information Systems Acquisition, Development and Implementation
Module 4: Network Security IS Operations and Business Resilience
Module 5: Information Asset Security and Control
Certified in Risk and Information Systems Control
Develop skills to identify, assess, and manage IT and enterprise-wide risk effectively.
Certified in Risk and Information Systems Control
Course Outline
- Module 1: IT Risk Identification
Key Topics: Lesson 1: Risk Management
Lesson 2: Concepts and Principles of Information Security Risks
Lesson 3: IT Risk Scenarios
Lesson 4: Risk Management Concepts
Module 2: Risk Assessment
Key Topics: Lesson 1: Risk Assessment and Control
Lesson 2: Business and Risk Incidents
Lesson 3: New threats and vulnerabilities Reports
Module 3: Responses and Mitigation
Key Topics: Lesson 1: Risk Response Options and Analytical Techniques
Lesson 2: Planning for Risk Management and Response
Lesson 3: System Control Design and Implementation
Module 4: Monitoring and Reporting
Key Topics: Lesson 1: Key Risk Indicators
Lesson 2: Data Collection and Monitoring
Lesson 3: Types of Control Assessment
Certified Information Security Manager
Gain leadership skills to design, manage, and oversee enterprise information security programs.
Certified Information Security Manager
Course Outline
- Module 1: Information Security Governance
Module 2: Information Risk Management and Compliance
Module 3: Information Security Program Development and Management
Module 4: Information Security Incident Management
Certified in the Governance of Enterprise IT
Master IT governance principles to align technology management with business strategy.
Certified in the Governance of Enterprise IT
Course Outline
- Module 1: Framework for the Governance of Enterprise IT
Module 2: Strategic Management
Module 3: Benefits of Realization
Module 4: Risk Optimization
Module 5: Resource Optimization
Cybersecurity Practitioner
Build practical skills for detecting, preventing, and responding to cybersecurity threats.
Cybersecurity Practitioner
Course Outline
Module 1: Identify
Key Topics: Network Infrastructure and Digital Assets, Asset Identification, Network Topology and Data Flow Analysis, Data Flow Identification, Security Review and Gap Identification, Enterprise Asset Identification, Security Policy and Procedure Development, Data Flow Analysis, Enterprise Data Flow Analysis, Regulation and Legal Impact, Threat Modeling, Identify Challenge
Module 2: Protect
Key Topics: Vulnerability Testing, Security Tools and Systems, Firewall Setup, Incident Response Plans, Security and Business Functions, Backup and Restore Points, Security Configuration Evaluation, File System Protections OS Baseline, Protect Challenge
Module 3: Detect
Key Topics: Event and Incident Identification, Sec Onion Setup and Testing, Snort Rules, Event Detection, Malicious Activity Analysis, Data and Network Analysis, Vulnerability Analysis, Detect Challenge
Module 4: Respond & Recover
Key Topics: Incident Notification and Containment, Incident Correlation, Evidence Collection and Technical Analysis, Network Forensics, Malware Investigation and Evaluation, System Validation Re-Imaging, Post Incident Security Plan and Procedure, Restore Points, Response Challenge
Certified Data Privacy Solutions Engineer
Learn to design and implement data privacy frameworks that meet regulatory standards.
Certified Data Privacy Solutions Engineer
Course Outline
- Module 1: Governance
Key Topics: Personal Data and Information , Privacy Laws and Standards across Jurisdictions , Privacy Documentation , Legal Purpose, Consent and Legitimate Interest ,Data Subject Rights
Module 2: Management
Key Topics: Roles and Responsibilities Related to Data ,Privacy Training and Awareness , Vendor and Third-party Management , Audit Process , Privacy Incident Management , Risk Management , Risk Management Process
Module 3: Infrastructure
Key Topics: Cloud Computing ,Remote Access , Endpoints , System Hardening , Secure Development Life Cycle
Module 4: Applications and Software
Key Topics: Application and Software Hardening , APIs and Services , Tracking Technologies Technical Privacy Controls , Communication and Transport Protocols , Encryption, Hashing and De-dentification , Key Management , Encryption, Hashing and De-identification , Monitoring and Logging , Identity and Access Management
Module 5: Data Purpose
Key Topics: Data Inventory and Classification , Data Quality , Data Flow and Usage Diagrams , Data Use Limitation , Data Analytics
Module 6: Data Persistence
Key Topics: Data Minimization , Data Migration , Data Storage , Data Warehousing , Data Retention and Archiving , Data Destruction
Information Technology Cetified Associate
Develop core IT knowledge in networking, security, software development, and data fundamentals.
Spelling Certified
Certified in Emerging Technology
Explore emerging technologies like AI, blockchain, and cloud to manage future-ready IT environments.
Certified in Emerging Technology
Start your Training Today!
Jumpstart your future with in-demand tech skills. Submit your details and our team will get in touch to guide you through the next steps.