Certificate of Cloud Security Knowledge (CCSK) Certification Course

Size: px
Start display at page:

Download "Certificate of Cloud Security Knowledge (CCSK) Certification Course"

Transcription

1 Certificate of Cloud Security Knowledge (CCSK) Certification Course LISTED ON CIO.COM AT #1 ON LIST OF TOP TEN CLOUD COMPUTING CERTIFICATIONS GLOBALLY Vertical Type Sub-Category Website Technology Certification-led Cloud Computing Course Page jointly presented by

2 Welcome Note Hello there You've considered embarking on an exciting journey to strengthen your professional status and career trajectory. The choice to obtain professional certification and/or further credentials in the subject matter area that you choose to specialise in, puts a powerful tool, right in your hands. It will bring you competitive edge, career progression and market opportunity. This brochure will provide further information about the course of your choice. There is a wide selection of other courses on our website, a selection that is constantly added and improved upon. Feel free to or call us if you need help with anything. We welcome the chance to be part of your journey. Sincerely Rowena Morais Programme Director rmorais@verticaldistinct.com 2

3 Course Information COURSE OFFERINGS COURSE OVERVIEW Three day course. This course introduces you to the world of cloud computing security and prepares you to take the CCSK exam. The CCSK is designed to ensure that a broad range of professionals with responsibility related to cloud computing have a demonstrated awareness of the security threats and best practices for securing the cloud. It provides a solid foundation in cloud security issues and best practices to enable organisations get more from their investments in cloud computing. It is not a substitute for other certifications in Information Security, Audit or Governance but augments these other credentialing programmes. CURRICULUM Cloud Architecture (NIST Definition of Cloud Computing; Multi tenancy; Cloud Reference Model; Jericho Cloud Cube Model; Cloud Security Reference Model; Cloud Service Brokers) TECHNOLOGY Certificate of Cloud Security Knowledge Cloud Technology Associate Business Architecture - Techniques & Deliverables Business Process Management - Techniques & Deliverables Scrum : PSM, PSD (Java &.NET), PSPO Certified Kanban Management Professional KMP I and II Certified in the Governance of Enterprise IT COBIT 5 Foundation Certified in Risk & Info Systems Control Certified Professional in Health IT Software Testing : ISTQB Foundation, ATM, ATA, ATTA, isqi Certified Agile Tester ISTQB Foundation Exam Prep Course ITIL Lifecycle- Service Strategy + 3 more Transitioning to Agile How to Implement Practical Data Quality Management Ethical Hacker & Penetration Tester Governance and Enterprise Risk (Contractual Security Requirements; Enterprise and Information Risk Management; Third Party Management Recommendations) Legal and Electronic Discovery (Cloud versus outsourcing; Three dimensions of legal issues; Contract enforceability; ediscovery considerations; Jurisdictions and data locations) Compliance and Audit (Compliance impact on cloud contracts; SAS 70 Type II; ISO 27001/27002; Compliance analysis requirements; Auditor requirements) 3 HUMAN RESOURCE HCI's The Strategic Human Resources Business Partner (shrbp) HCI's Strategic Talent Acquisition (STA) HCI's Performance Management Innovation (PMI) HCI's Human Capital Strategist (HCS) HCI's Analytics for Talent Management (ATM) HCI's Strategic Workforce Planning SWP Certified Mentor Practitioner (Level 1) The Language of Effective Presentations The Engaged Manager Inspiring the Best in Your People A Mach 2 HR Masterclass

4 Course Information Information Lifecycle Management (Six phases of the Data Security Lifecycle and their key elements; Data Remanence; Data Commingling; Data Backup; Data Discovery; Data Aggregation) Portability and Interoperability (Key Portability Objectives of S-P-I; Lock-In risk mitigation techniques by cloud delivery model) Traditional Security, BCM, D/R (Insider Abuse; Business Continuity Management/ Disaster Recovery due diligence; Provider employee considerations) Incident Response (Recommended provider tools and capabilities; Response tradeoffs ;Questionable provider offerings) Application Security (SDLC impact and implications; Differences in S-P-I models) Encryption and Key Management (Key management best practices ;Key management standards; Encryption practices in S-P-I models) Identity and Access Management (Identity Federation; Authorization; Access Control; Provisioning) Security-as-a- Service (Deploying Security-as-aservice) ENISA Document (Security benefits of cloud; Risks R.1 R.35 and underlying vulnerabilities; Information assurance framework ; Division of liabilities; Key legal issues) Data Centre Operations (Provider selection; Resource sharing; Patch management; Technical Support) Virtualisation (Virtual Machine security features ;VM attack surfaces ;Compartmentalization of VMs) 4

5 Faculty Certification courses as well as numerous other cloud courses and workshops across North- America, Europe, the Gulf Region and Asia to international audiences. He has also delivered some of these courses online. COURSES TAUGHT: Certificate of Cloud Security Knowledge (CCSK); Cloud Technology Associate. CREDENTIALS: CompTIA Cloud Essentials TM Professional Peter van Eijk Vendor Neutral Cloud Governance and Lean IT Risk Management Head Coach at ClubCloudComputing.com, Peter is an independent trainer and consultant on the management of cloud computing and other digital infrastructures, as well as a speaker and writer. He works with security managers, IT architects and their teams to see how cloud computing is a drastically new way of delivering IT and to show them how to deliver on the cloud computing promise. Peter has delivered more than 35 Certificate of Cloud Security Knowledge (CCSK) Students have come from organisations such as ING Bank, ABN AMRO Bank, Ernst & Young, KPN, GDIT, CompTIA, Accenture, Rackspace and many other smaller firms and government organisations. Peter is Chairman of the Dutch Computer Measurement Group (NLCMG), a member of the Dutch IPv6 task-force and a Board Member of the Cloud Security Alliance Dutch chapter. Peter is a certified instructor of the CCSK course. A columnist with Computable Magazine for seven years until 2014, Peter holds a M.Sc Mathematics, Computer Science, Psychology from University of Groningen and a PhD in Computer Science from the University of Twente. (CEP); CompTIA Virtualization Essentials TM Professional (VEP); Master Trainer for Cloud Computing and Virtualization Essentials with ITpreneurs - Licence 001; Registered Trainer for the Certificate of Cloud Security Knowledge (CCSK) Certification with the Cloud Security Alliance (CSA); Cloud Solutions Architect - License PCSA with the Cloud Credential Council; Certified Cloud Security Professional (CCSP) Licence with ISC2; CP100A : Google Cloud Platform Fundamentals Licence with ROI Training; and Big Data Foundation Licence with the Cloud Credential Council. 5

6 Supporting Information TARGET AUDIENCE 1. Any IT professional who is planning to use cloud computing or who is already working in the cloud. 2. IT Professionals who want to understand more about the issues pertaining to security which are related to being in the cloud as well as recommendations as to how this can be dealt with. 3. The audience will include the likes of the Chief Information Officer (CIO), Chief Information Security Officer (CISO), IT and security professionals. RECOMMENDED It is advised that you have at least a basic understanding of security fundamentals such as firewalls, secure development, encryption and identity management. ACCREDITATION Certification by : The Cloud Security Alliance The Cloud Security Alliance (CSA) is a not-for-profit organisation with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. IMPORTANT NOTE 1. This course is brought to you in partnership with Digital Infrastructures. 2. Terms and conditions apply. Please visit Vertical Distinct for the full terms. LOCATIONS Geographies covered : Middle East Asia Pacific Africa Complete and updated list of all cities and dates are available on verticaldistinct.com PREREQUISITES Laptops required. While presentation materials are provided including training materials and tests during the course, you are however, required to bring your own laptop. Laptop compatible OS are Windows, Linux or Mac. Preparation. There is some preparation required before the course starts. You will be downloading some software and applying for an Amazon webservices account. Webservices account. An Amazon web services account will need to be created ahead of the course at least two days in advance of the scheduled course date. Cloud usage fees. These fees are also not included as part of the registration fee. However, it is estimated that these would not exceed a few US dollars.

7 Supporting Information EXAMS 1. The exam is web-based and consists of multiple choice questions examining your individual competency in key cloud security issues 2. There are 60 questions and it is a timed examination (must be completed within 90 minutes) without interruption 3. It is not possible to pause the exam, stop the exam or take the exam at a later time once you've started 4. Pass mark is 80% ie you must get 40 out of 50 questions correct to pass the test and obtain the certificate 5. You are allowed to consult the training material during the exam ie it is an open book exam. BODY OF KNOWLEDGE TESTED 1. The body of knowledge tested is The CSA Guidance V3.0, English language version and ENISA s report Cloud Computing: Benefits, Risks and Recommendations for Information Security % of the questions are based on the CSA Guidance whereas 20% of the questions are based on the ENISA report and 10% of the questions are applied knowledge questions related to the best practices in both documents. 6

8 Testimonials Peter presented lots of useful information in a captivating way. This is a 'must-have' for everybody who wants to be a cloud provider." Bert Keegstra, QS Solutions Peter is a very experienced cloud trainer and we have enthusiastic feedback from his CCSK students". Daniele Catteddu, Managing Director EMEA, Cloud Security Alliance 7

9 VERTICAL DISTINCT SDN BHD Suite 1208 Level 12 Amcorp Tower, Amcorp Trade Centre No. 18 Persiaran Barat, Petaling Jaya, Selangor Darul Ehsan, Malaysia

Certificate of Cloud Security Knowledge (CCSK) Certification Course LISTED ON CIO.COM AT #1 ON LIST OF TOP TEN CLOUD COMPUTING CERTIFICATIONS GLOBALLY

Certificate of Cloud Security Knowledge (CCSK) Certification Course LISTED ON CIO.COM AT #1 ON LIST OF TOP TEN CLOUD COMPUTING CERTIFICATIONS GLOBALLY Certificate of Cloud Security Knowledge (CCSK) Certification Course LISTED ON CIO.COM AT #1 ON LIST OF TOP TEN CLOUD COMPUTING CERTIFICATIONS GLOBALLY Vertical Type Sub-Category Website Technology Certification-led

More information

COBIT 5 Foundation. Certification-led Audit, Security, Governance & Risk

COBIT 5 Foundation. Certification-led Audit, Security, Governance & Risk COBIT 5 Foundation Vertical Type Sub-Category Technology Certification-led Audit, Security, Governance & Risk Welcome Note Hello there You've considered embarking on an exciting journey to strengthen your

More information

CERTIFIED KANBAN FOUNDATION. Certification-led

CERTIFIED KANBAN FOUNDATION. Certification-led CERTIFIED KANBAN FOUNDATION Vertical Type Sub-Category Technology Certification-led Kanban Welcome Note Hello there You've considered embarking on an exciting journey to strengthen your professional status

More information

THE ESSENTIALS OF NON-FUNCTIONAL TESTING. Evaluating the readiness of a system by the testing of non functional attributes. Professional Development

THE ESSENTIALS OF NON-FUNCTIONAL TESTING. Evaluating the readiness of a system by the testing of non functional attributes. Professional Development THE ESSENTIALS OF NON-FUNCTIONAL TESTING Evaluating the readiness of a system by the testing of non functional attributes Vertical Type Sub-Category Websiteeebsite Technology Professional Development Software

More information

Certified Kanban Management Professional - KMPII. Certification-led

Certified Kanban Management Professional - KMPII. Certification-led Certified Kanban Management Professional - KMPII Vertical Type Sub-Category Technology Certification-led Kanban Welcome Note Hello there You've considered embarking on an exciting journey to strengthen

More information

Certified Kanban Management Professional - KMPI. Certification-led

Certified Kanban Management Professional - KMPI. Certification-led Certified Kanban Management Professional - KMPI Vertical Type Sub-Category Technology Certification-led Kanban Welcome Note Hello there You've considered embarking on an exciting journey to strengthen

More information

APPLICATION AND SOLUTION ARCHITECTURE TECHNIQUES AND DELIVERABLES

APPLICATION AND SOLUTION ARCHITECTURE TECHNIQUES AND DELIVERABLES APPLICATION AND SOLUTION ARCHITECTURE TECHNIQUES AND DELIVERABLES Vertical Type Sub-Category Technology Professional Development Enterprise Architecture Welcome Note Hello there You've considered embarking

More information

ISTQB FOUNDATION EXAM PREPARATORY COURSE

ISTQB FOUNDATION EXAM PREPARATORY COURSE E X E C U T I V E L E V E L O N L I N E D E L I V E R Y ISTQB FOUNDATION EXAM PREPARATORY COURSE Vertical Technology Type Professional Development Sub-Category Software Testing WebsiteWebebsiteCourse Page

More information

IT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur

IT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur IT Audit Essentials Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur IT Audit Essentials Workshop Overview ISACA Malaysia Chapter is

More information

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard Certification Exam Outline Effective Date: April 2013 About CISSP-ISSMP The Information Systems Security Management Professional (ISSMP) is a CISSP who specializes in establishing, presenting, and governing

More information

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program itsm003 v.3.0 NICE Training Curriculum & Workforce Planning Program Agenda and Objectives NICE Cybersecurity Curriculum Consortium IT & Cybersecurity Frameworks & Methodologies NICE Curriculum Catalog

More information

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum Agenda and Objectives The Digital Transformation (Dx) Problem NISTCSF.COM Cybersecurity Curriculum

More information

Project Management Professional (PMP ) Certification

Project Management Professional (PMP ) Certification Project Management Professional (PMP ) Certification atsc is the leading Training provider in the country with 10 years of experienced in conducting the PMP training. Ensuring your success with the right

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

A guide to CompTIA training and certification DDLS Australia Pty Ltd

A guide to CompTIA training and certification DDLS Australia Pty Ltd A guide to CompTIA training and certification 1 DDLS DDLS is an accredited CompTIA training organisation, offering the courses needed to establish CompTIA A+, Linux+, Network+, and Security+. DDLS can

More information

Sirius Security Overview

Sirius Security Overview Sirius Security Overview Rob Hoisington IT Security Consultant www.siriuscom.com 8/18/2017 1 Rob Hoisington IT Security Consultant - CISSP, GLEG, GCIH Robert.Hoisington@siriuscom.com - 757.675.0101 Rob

More information

Welcome to the HP Institute

Welcome to the HP Institute Welcome to the HP Institute How HP is working with education to develop tomorrow s IT workforce today Capability Business need for speed The rate of business is increasing exponentially 2020 2T devices

More information

Certification Exam Outline Effective Date: April 2015

Certification Exam Outline Effective Date: April 2015 Certification Exam Outline Effective Date: April 2015 About CCSP (ISC)² and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information

CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES. Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance

CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES. Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance ABOUT THE BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT CLOUD

More information

A guide to CompTIA training and certification DDLS Australia Pty Ltd

A guide to CompTIA training and certification DDLS Australia Pty Ltd A guide to CompTIA training and certification 1 DDLS DDLS is an accredited CompTIA training organisation, offering the courses needed to establish CompTIA A+, Linux+, Network+, Security+ and CySA+. DDLS

More information

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification COURSE BROCHURE COBIT5 FOUNDATION Training & Certification What is COBIT5? COBIT 5 (Control Objectives for Information and Related Technology) is an international open standard that defines requirements

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

COBIT 5 Assessor Certification Course

COBIT 5 Assessor Certification Course COBIT 5 Assessor Certification Course About COBIT 5.0 Information is created, used, retained, disclosed and destroyed. Technology plays a key role in these actions and technology is becoming pervasive

More information

itsm003 v.3.0 NISTCSF.COM Role-Based IT & NIST Cybersecurity Curriculum Solutions

itsm003 v.3.0 NISTCSF.COM Role-Based IT & NIST Cybersecurity Curriculum Solutions itsm003 v.3.0 NISTCSF.COM Role-Based IT & NIST Cybersecurity Curriculum Solutions Agenda and Objectives NISTCSF.COM Curriculum Consortium IT & NIST Cybersecurity Frameworks & Methodologies NISTCSF.COM

More information

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program Agenda and Objectives The Digital Transformation (Dx) Problem NISTCSF.COM Cybersecurity Curriculum

More information

COURSE BROCHURE CISA TRAINING

COURSE BROCHURE CISA TRAINING COURSE BROCHURE CISA TRAINING What is CISA? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual within

More information

VMEdu. 94 (Out of 100) D&B Rating. A+ BBB Rating. VMEdu Training. VMEdu Platform

VMEdu. 94 (Out of 100) D&B Rating. A+ BBB Rating. VMEdu Training. VMEdu Platform VMEdu VMEdu provides organizations with corporate training and training solutions to manage their learning and development needs efficiently. VMEdu Training VMEdu Inc. is a leading global training service

More information

Ingram Micro Cyber Security Portfolio

Ingram Micro Cyber Security Portfolio Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT) DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE

More information

CCSK Research Sponsorship

CCSK Research Sponsorship CCSK Research Sponsorship Overview The industry s first user certification program for secure cloud computing, the Certificate of Cloud Security Knowledge (CCSK) is designed to ensure that a broad range

More information

Digital Service Management (DSM)

Digital Service Management (DSM) Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Managing, Improving and Securing an Enterprise Digital Service Portfolio itsm003 v.3.0 Agenda and Objectives What is

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1 SECURITY+ VS GIAC GSEC Where does GSEC fit? 3 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

PCI DSS Compliance and the Cloud

PCI DSS Compliance and the Cloud PCI DSS Compliance and the Cloud Daniel Farr, Managing Consultant CyberSecurity Consulting PCI & Compliance Services DF&IR Risk Reduction Solutions www.foregenix.com A Brief History of Foregenix Foregenix

More information

SAFe AGILE TRAINING COURSES

SAFe AGILE TRAINING COURSES SAFe AGILE TRAINING COURSES INDEX INTRODUCTION COURSE Implementing SAfe Leading SAFe SAFe for Teams SAFe Scrum Master CERTIFICATION SAFe Program Consultant SAFe Agilist SAFe Practitioner SAFe Scrum Master

More information

Digital Service Management (DSM)

Digital Service Management (DSM) Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Securing, Managing and Improving the Online Services that Drive the Digital Enterprise itsm003 v.3.0 Agenda and Objectives

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

COBIT 5 Foundation Certification Training Course - Brochure

COBIT 5 Foundation Certification Training Course - Brochure COBIT 5 Foundation Certification Training Course - Brochure The Next Level of IT Security Governance Course Name : COBIT 5 Foundation Version : INVL_Cobit5_BR_02_081_1.1 Course ID : ITSG-130 www.invensislearning.com

More information

2016 COBIT 5 Foundation Training Course

2016 COBIT 5 Foundation Training Course 1 of 5 For View this email in your browser Newsletter Decemeber 2015 With Father Christmas dusting off his sleigh, shining up his boots and trimming his beard, it s now time

More information

ITIL Managing Across the Lifecycle (MALC) Certification Training - Brochure

ITIL Managing Across the Lifecycle (MALC) Certification Training - Brochure ITIL Managing Across the Lifecycle (MALC) Certification Training - Brochure Integrate ITIL Content and Application Knowledge with an ITIL MALC Certification Course Name : ITIL MALC Version : INVL_ITILMALC_BR_02_018_1.2

More information

TUV SUD Certified Cloud Computing Elementary Professional (TCCEP) Certification - Brochure

TUV SUD Certified Cloud Computing Elementary Professional (TCCEP) Certification - Brochure TUV SUD Certified Cloud Computing Elementary Professional (TCCEP) Certification - Brochure Get Certified in the Technology that will Drive the Future Course Name : Cloud Computing Version : INVL_CC_BR_02_042_1.2

More information

EXIN BCS SIAM TM Foundation Certification Training - Brochure

EXIN BCS SIAM TM Foundation Certification Training - Brochure EXIN BCS SIAM TM Foundation Certification Training - Brochure Understand How to Manage Multiple Service Providers to Achieve Common Goal Course Name : SIAM TM Foundation Training Certification Version

More information

Training and Certifying Security Testers Beyond Penetration Testing

Training and Certifying Security Testers Beyond Penetration Testing Training and Certifying Security Testers Beyond Penetration Testing Randall W. Rice, CTAL (Full), CTAL-SEC Director, ASTQB Board of Directors www.astqb.org Most organizations do not know the true status

More information

IT Consulting and Implementation Services

IT Consulting and Implementation Services PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from

More information

Why MyITstudy is the best solution for your IT training needs

Why MyITstudy is the best solution for your IT training needs MyITstudy - The most trusted and effective partner for your IT training needs MyITstudy is a brand of, a leading global education training provider with offices in the US, UK, Australia, Germany, Canada,

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Avanade s Approach to Client Data Protection

Avanade s Approach to Client Data Protection White Paper Avanade s Approach to Client Data Protection White Paper The Threat Landscape Businesses today face many risks and emerging threats to their IT systems and data. To achieve sustainable success

More information

Shared Learning Course Schedule at all ICC locations 2019 (Document version March 2019)

Shared Learning Course Schedule at all ICC locations 2019 (Document version March 2019) Shared Learning Course Schedule at all ICC locations 2019 (Document version March 2019) ICC Learning Group Telephone: + 41 (0) 22 929 14 11 Email: icttraining@unicc.org BRINDISI GENEVA NEW YORK ROME VALENCIA

More information

Cloud Services. Infrastructure-as-a-Service

Cloud Services. Infrastructure-as-a-Service Cloud Services Infrastructure-as-a-Service Accelerate your IT and business transformation with our networkcentric, highly secure private and public cloud services - all backed-up by a 99.999% availability

More information

The Business of Security in the Cloud

The Business of Security in the Cloud The Business of Security in the Cloud Dr. Pamela Fusco Vice President Industry Solutions Solutionary Inc. CISSP, CISM, CHSIII, IAM, NSA/CSS Adjunct Faculty Promises Promises The promise of cloud computing

More information

SABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA )

SABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA Title / definition SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA is a framework for developing risk-driven enterprise information security and information assurance architectures

More information

CISI - International Introduction to Securities & Investment Study Support Training EUROPE MIDDLE EAST & NORTH AFRICA ASIA

CISI - International Introduction to Securities & Investment Study Support Training EUROPE MIDDLE EAST & NORTH AFRICA ASIA CISI - International Introduction to Securities & Investment Study Support Training About ISC & UIC Investment Studies Center (ISC) Contributing to the provision of promising national cadres, capable of

More information

IMS Asia - Professional Training Schedule for Jan - Dec 2017 v1.3 Page 1 of 5

IMS Asia - Professional Training Schedule for Jan - Dec 2017 v1.3 Page 1 of 5 HELPDESK INSTITUTE (HDI) HDI Customer Service Representative 2 3,500 6-7 23-24 4-5 6-7 7-8 2-3 HDI Desktop Support Manager 4 5,800 3-6 6-9 1-4 2-5 4-7 HDI Desktop Support Technician 3 4,300 6-8 15-17 17-19

More information

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC (USA)

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC (USA) THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC (USA) CHARTERD CERTIFIED FORENSIC ACCOUNTANT, CCFA CAPSTONE PROGRAM, CANDIDATE GUIDE Table of Contents THE INTERNATIONAL INSTITUTE OF

More information

CFE Exam Review Course

CFE Exam Review Course CFE Exam Review Course Leading Excellence in Banking BIBF plays a vital role in the training and development of human capital in the Kingdom of Bahrain. Our commitment to excellence has strengthened our

More information

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World CYBER CAMPUS THE CYBER SCHOOL FOR THE REAL WORLD. KPMG BUSINESS SCHOOL The Business School for the Real World In the real world, cyber security applies to all: large firms and small companies, tech experts,

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background

More information

The Netherlands USA France UK India. Xebia Training Crafting Champions

The Netherlands USA France UK India. Xebia Training Crafting Champions The Netherlands USA France UK India Xebia Training Crafting Champions Xebia Xebia - A Preface #DigitalAuthority We explore and create new frontiers in IT. We provide innovative products and services and

More information

Securing the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA

Securing the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA Securing the cloud ISACA Korea Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA What is cloud computing? Source: Wikipedia 2 What is cloud computing A model for enabling:- convenient on-demand network

More information

Technology Transformation. Transformation. Excellence. Governance. PMO

Technology Transformation. Transformation. Excellence. Governance. PMO Technology Transformation Transformation. Excellence. Governance. PMO THE FIRM Resilience& is a UK-based network of independently owned and managed consulting firms and independent experts who are leading

More information

SY

SY SY0-401 CompTIA Security+ SY0-401 The CompTIA Security+ certification is an internationally recognized validation of foundation-level security skills and knowledge. The exam will certify that the successful

More information

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure Get a Management-level overview of Service Design to advance in your Career Course Name : ITIL SD Version : INVL_ITILSD_BR_02_033_1.2

More information

IT123: SABSA Foundation Training

IT123: SABSA Foundation Training IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom

More information

SECURITY TRAINING SECURITY TRAINING

SECURITY TRAINING SECURITY TRAINING SECURITY TRAINING SECURITY TRAINING Addressing software security effectively means applying a framework of focused activities throughout the software lifecycle in addition to implementing sundry security

More information

Cloud Security Certification CCSP Certified Cloud Security Professional

Cloud Security Certification CCSP Certified Cloud Security Professional Cloud Security Certification CCSP Certified Cloud Security Professional Course code: 10006308 Prove You re on the Forefront of Cloud Security In the ever-changing world of the cloud, you face unique security

More information

Security as a Service (Implementation Guides) Research Sponsorship

Security as a Service (Implementation Guides) Research Sponsorship Security as a Service (Implementation Guides) Research Sponsorship Overview The purpose of the Security as a Service (SecaaS) Working Group will be to identify consensus definitions of what Security as

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

Risk Advisory Academy Training Brochure

Risk Advisory Academy Training Brochure Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty

More information

Certification Exam Outline Effective Date: August 1, 2019

Certification Exam Outline Effective Date: August 1, 2019 Certification Exam Outline Effective Date: August 1, 2019 About CCSP (ISC)² and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud

More information

You Can Click at the enclosed Link to check out AATP Authorization:

You Can Click at the enclosed Link to check out AATP Authorization: Apple Education App Development Training Introduction to Swift 4 Introduction to the ios 11 SDK App Development with Swift 4 macos and OS X Training macos Support Essentials 10.12 (Sierra 101) macos Server

More information

CompTIA CASP (Advanced Security Practitioner)

CompTIA CASP (Advanced Security Practitioner) CompTIA CASP (Advanced Security Practitioner) Course Length: 5 days (virtual) Click here to view the current class schedule! Overview: The CompTIA Advanced Security Practitioner (CASP) Certification is

More information

ITIL Intermediate Service Design (SD) Certification Training - Brochure

ITIL Intermediate Service Design (SD) Certification Training - Brochure ITIL Intermediate Service Design (SD) Certification Training - Brochure Get a Management-level overview of Service Design to advance in your Career Course Name : ITIL SD Version : INVL_ITILSD_BR_02_033_1.2

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar Course Outline CISM - Certified Information Security Manager 22 Mar 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES. forebrook

INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES. forebrook INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES forebrook INFRASTRUCTURE ASSESSMENT SECURITY ASSESSMENT RISK ASSESSMENT VULNERABILITY ASSESSMENT PENETRATION

More information

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL BECOME A PECB CERTIFIED ISO 27001 AUDITOR OR INSTRUCTOR Trasys International established a partnership with the Professional Evaluation and Certification

More information

The Value of Certification with DRI International Presented by Chloe Demrovsky Director of Global Operations, DRI International

The Value of Certification with DRI International Presented by Chloe Demrovsky Director of Global Operations, DRI International The Value of Certification with DRI International Presented by Chloe Demrovsky Director of Global Operations, DRI International Mumbai, India January 17, 2011 DRI International DRI has Certified INDIVIDUALS

More information

Professional Evaluation and Certification Board Frequently Asked Questions

Professional Evaluation and Certification Board Frequently Asked Questions Professional Evaluation and Certification Board Frequently Asked Questions 1. About PECB... 2 2. General... 2 3. PECB Official Training Courses... 4 4. Course Registration... 5 5. Certification... 5 6.

More information

Top 10 Cloud Computing Certifications for Glen Roberts President Cloud Security Alliance Austin Chapter

Top 10 Cloud Computing Certifications for Glen Roberts President Cloud Security Alliance Austin Chapter Top 10 Cloud Computing Certifications for 2012 Glen Roberts President Cloud Security Alliance Austin Chapter Certificate of Cloud Security Knowledge (CCSK) * Cloud Security Alliance * First certification

More information

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Jim Reavis CEO and Founder Cloud Security Alliance December 2017 CLOUD THREAT HUNTING Jim Reavis CEO and Founder Cloud Security Alliance December 2017 A B O U T T H E BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT C L O U D S E C U R I T Y A L L I A N C E GLOBAL,

More information

GDPR Update and ENISA guidelines

GDPR Update and ENISA guidelines GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure

More information

Defensible Security DefSec 101

Defensible Security DefSec 101 Defensible Security DefSec 101 Security Day November 2017 Information Security Branch Paul Falohun Senior Security Analyst Dan Lathigee Senior Project Manager Content 1 Introduction 2 DefSec for PSO 3

More information

Course Catalogue

Course Catalogue Course Catalogue 2018 www.preparationinfo.com About Us PreparationInfo is one of the best World s Leading Certification Training Provider in various on demand courses in multiple domains. We partner with

More information

CyberVista Certify cybervista.net

CyberVista Certify cybervista.net ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify CyberVista offers the industry s most comprehensive cybersecurity training

More information

ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure

ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure ITIL Intermediate Continual Service Improvement (CSI) Certification Boot Camp - Brochure Gain Knowledge to Align IT Services to Business Needs US Course Name : CISSP Version : INVL_CISSP_BR_02_089_1.2

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

AT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant

AT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant Our Contact Details IT-SCAN GMBH c/o: DOCK3 Hafenstrasse 25-27 68159 Mannheim E: info@it-scan.de W: www.it-scan.de Nationalität Berufserfahrung C U R R I C U L U M V I T A E Diplom-Betriebswirt (FH) Peter

More information

PMP Exam Prep Classroom Course Fact Sheet

PMP Exam Prep Classroom Course Fact Sheet ITpreneurs Project and Program Management PMP Exam Prep Classroom Course Fact Sheet Certificate: PMP Duration: 4-Days, 35 hours Course Delivery: Classroom, Virtual Classroom, Blended (combined with Classroom)

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

TRAINING CURRICULUM 2017 Q2

TRAINING CURRICULUM 2017 Q2 TRAINING CURRICULUM 2017 Q2 Index 3 Why Security Compass? 4 Discover Role Based Training 6 SSP Suites 7 CSSLP Training 8 Course Catalogue 14 What Can We Do For You? Why Security Compass? Role-Based Training

More information

TRIAEM LLC Corporate Capabilities Briefing

TRIAEM LLC Corporate Capabilities Briefing TRIAEM LLC Corporate Capabilities Briefing 3/4/ 1 CORPORATE OVERVIEW CORPORATE VALUES MISSION STATEMENT SERVICES WORKFORCE EXPERIENCE CORPORATE CONTACTS 3/4/ 2 CORPORATE OVERVIEW TRIAEM is certified through

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

Effective COBIT Learning Solutions Information package Corporate customers

Effective COBIT Learning Solutions Information package Corporate customers Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides

More information