Certified Information Security Manager (CISM) | ISACA
Deep Dive Security Sessions | Real-time Case Studies | Comprehensive CBK Coverage | Certification Exam Readiness Support | Interactive Discussions | Latest Security Branches and Technology Risk Issues
CISSP curriculum covers subject matter in a variety of Information Security topics.[8] The CISSP examination is based on what (ISC)² terms the Common Body of Knowledge (or CBK). According to (ISC)², "the CISSP CBK is a taxonomy – a collection of topics relevant to information security professionals around the world. The CISSP CBK establishes a common framework of information security terms and principles that allow information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession with a common understanding.
Understand Cloud Computing Concepts
Describe Cloud Reference Architecture
Understand Security Concepts Relevant to Cloud Computing
Understand Design Principles of Secure Cloud Computing
Evaluate Cloud Service Providers
Describe Cloud Data Concepts
Design and Implement Cloud Data Storage Architectures
Design and Apply Data Security Technologies and Strategies
Implement Data Discovery
Implement Data Classification
Design and Implement Information Rights Management (IRM)
Plan and Implement Data Retention, Deletion and Archiving Policies
Design and Implement Auditability, Traceability and Accountability of Data Events
Comprehend Cloud Infrastructure Components
Design a Secure Data Center
Analyze Risks Associated with Cloud Infrastructure
Design and Plan Security Controls
Plan Disaster Recovery (DR) and Business Continuity (BC)
Advocate Training and Awareness for Application Security
Describe the Secure Software Development Life Cycle (SDLC) Process
Apply the Secure Software Development Life Cycle (SDLC)
Apply Cloud Software Assurance and Validation
Use Verified Secure Software
Comprehend the Specifics of Cloud Application Architecture
Design Appropriate Identity and Access Management (IAM) Solutions
Implement and Build Physical and Logical Infrastructure for Cloud Environment
Operate Physical and Logical Infrastructure for Cloud Environment
Manage Physical and Logical Infrastructure for Cloud Environment
Implement Operational Controls and Standards
Support Digital Forensics
Manage Communication with Relevant Parties
Manage Security Operations
Articulate Legal Requirements and Unique Risks within the Cloud Environment
Understand Privacy Issues
Understand Audit Process, Methodologies, and Required Adaptations for a Cloud Environment
Understand Implications of Cloud to Enterprise Risk Management
Understand Outsourcing and Cloud Contract Design
Contact Us For More Details
Please fill out the form below to enroll now
Training Calendar
S.No | Course | Hours | Total no of hours | Days | Batch Dates | Start time (IST) | End time (IST) | Batch Status | |
---|---|---|---|---|---|---|---|---|---|
1 | CISA | 4 | 36 | Weekend | Sep 7,8,14,15,21,22,28,29, Oct 5 | 7:00 PM | 11:00 PM | [ Open ] | |
2 | CISM | 4 | 32 | Weekend | Sep 21,22,28,29, Oct 5,6,12,13 | 7:00 PM | 11:00 PM | [ Open ] | |
3 | CEH WORLD | 4 | 32 | Weekend | Sep 7,8,14,21,22,28,29, Oct 5,6,12 | 8:00 PM | 12:00 PM | [ Open ] |
S.No | Course | Hours | Total no of hours | Days | Batch Dates | Start time (IST) | End time (IST) | Batch Status | |
---|---|---|---|---|---|---|---|---|---|
1 | CISA | 4 | 36 | Weekend | Sep 7,8,14,15,21,22,28,29, Oct 5 | 7:00 PM | 11:00 PM | [ Open ] | |
2 | CISM | 4 | 32 | Weekend | Sep 21,22,28,29, Oct 5,6,12,13 | 7:00 PM | 11:00 PM | [ Open ] | |
3 | CEH WORLD | 4 | 32 | Weekend | Sep 7,8,14,21,22,28,29, Oct 5,6,12 | 8:00 PM | 12:00 PM | [ Open ] |