Certified Information Security Manager (CISM) | ISACA

Deep Dive Security Sessions | Real-time Case Studies | Comprehensive CBK Coverage | Certification Exam Readiness Support | Interactive Discussions | Latest Security Branches and Technology Risk Issues

CISSP curriculum covers subject matter in a variety of Information Security topics.[8] The CISSP examination is based on what (ISC)² terms the Common Body of Knowledge (or CBK). According to (ISC)², "the CISSP CBK is a taxonomy – a collection of topics relevant to information security professionals around the world. The CISSP CBK establishes a common framework of information security terms and principles that allow information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession with a common understanding.

Course Duration: 6 Weekends
Microsoft Azzure TRAINING SYLLABUS

Understand Cloud Computing Concepts

Describe Cloud Reference Architecture

Understand Security Concepts Relevant to Cloud Computing

Understand Design Principles of Secure Cloud Computing

Evaluate Cloud Service Providers

Describe Cloud Data Concepts

Design and Implement Cloud Data Storage Architectures

Design and Apply Data Security Technologies and Strategies

Implement Data Discovery

Implement Data Classification

Design and Implement Information Rights Management (IRM)

Plan and Implement Data Retention, Deletion and Archiving Policies

Design and Implement Auditability, Traceability and Accountability of Data Events

Comprehend Cloud Infrastructure Components

Design a Secure Data Center

Analyze Risks Associated with Cloud Infrastructure

Design and Plan Security Controls

Plan Disaster Recovery (DR) and Business Continuity (BC)

Advocate Training and Awareness for Application Security

Describe the Secure Software Development Life Cycle (SDLC) Process

Apply the Secure Software Development Life Cycle (SDLC)

Apply Cloud Software Assurance and Validation

Use Verified Secure Software

Comprehend the Specifics of Cloud Application Architecture

Design Appropriate Identity and Access Management (IAM) Solutions

Implement and Build Physical and Logical Infrastructure for Cloud Environment

Operate Physical and Logical Infrastructure for Cloud Environment

Manage Physical and Logical Infrastructure for Cloud Environment

Implement Operational Controls and Standards

Support Digital Forensics

Manage Communication with Relevant Parties

Manage Security Operations

Articulate Legal Requirements and Unique Risks within the Cloud Environment

Understand Privacy Issues

Understand Audit Process, Methodologies, and Required Adaptations for a Cloud Environment

Understand Implications of Cloud to Enterprise Risk Management

Understand Outsourcing and Cloud Contract Design

Contact Us For More Details

Please fill out the form below to enroll now

Training Calendar

S.No Course Hours Total no of hours Days Batch Dates Start time (IST) End time (IST) Batch Status
1 CISA 4 36 Weekend Sep 7,8,14,15,21,22,28,29, Oct 5 7:00 PM 11:00 PM [ Open ]
2 CISM 4 32 Weekend Sep 21,22,28,29, Oct 5,6,12,13 7:00 PM 11:00 PM [ Open ]
3 CEH WORLD 4 32 Weekend Sep 7,8,14,21,22,28,29, Oct 5,6,12 8:00 PM 12:00 PM [ Open ]
S.No Course Hours Total no of hours Days Batch Dates Start time (IST) End time (IST) Batch Status
1 CISA 4 36 Weekend Sep 7,8,14,15,21,22,28,29, Oct 5 7:00 PM 11:00 PM [ Open ]
2 CISM 4 32 Weekend Sep 21,22,28,29, Oct 5,6,12,13 7:00 PM 11:00 PM [ Open ]
3 CEH WORLD 4 32 Weekend Sep 7,8,14,21,22,28,29, Oct 5,6,12 8:00 PM 12:00 PM [ Open ]