Table of Contents Table of Contents
Previous Page  97 / 108 Next Page
Information
Show Menu
Previous Page 97 / 108 Next Page
Page Background

95

Security

Core Model and its 40 governance and management

objectives provide the platform for establishing your

governance program. The performance management

system is updated and allows the flexibility to use maturity

measurements as well as capability measurements.

Introductions to design factors and focus areas offer

additional practical guidance on flexible adoption of COBIT

2019, whether for specific projects or full implementation.

From its foundation in the IT audit community, COBIT

has developed into a broader and more comprehensive

information and technology (I&T) governance and

management framework and continues to establish itself

as a generally accepted framework for I&T governance.

SC-400T00 Microsoft Information Protection

Administrator

3 Day(s) | $1785

Learn how to protect information in your Microsoft 365

deployment. This course focuses on data governance and

information protection within your organization. The course

covers implementation of data loss prevention policies,

sensitive information types, sensitivity labels, data retention

policies and Office 365 message encryption among other

related topics. The course helps learners prepare for the

Microsoft Information Protection Administrator exam (SC-400).

EC-Council Certified Incident Handler (ECIH)

3 Day(s) | $1799

The EC-Council Certified Incident Handler program is

designed to provide the fundamental skills to handle

and respond to the computer security incidents in an

information system. The course addresses various

underlying principles and techniques for detecting and

responding to current and emerging computer security

threats. Students will learn how to handle various types

of incidents, risk assessment methodologies, and various

laws and policy related to incident handling. In addition,

the students will learn about computer forensics and its

role in handling and responding to incidents. The course

also covers incident response teams, incident reporting

methods, and incident recovery techniques in detail.

EC-Council Certified DevSecOps Engineer (ECDE)

3 Day(s) | $1799

EC-Council Certified DevSecOps Engineer (E|CDE) is

a hands-on, instructor-led comprehensive DevSecOps

certification program that helps professionals build the

essential skills to design, develop, and maintain secure

applications and infrastructure.

Certified Information Security Manager (CISM)

3 Day(s) | $1995

In this course, students will establish processes to ensure

that information security measures align with established

business needs.

NCSP® Foundation Certificate

2 Day(s) | $2010

Accredited through APMG International, certified in the UK

by the National Cyber Security Centre (NCSC) and listed

as qualified cyber training by Department of Homeland

Security Cybersecurity and Infrastructure Security

Agency (DHS CISA) in the USA, the NIST Cyber Security

Professional (NCSP®) training program teaches individuals

and organizations how to engineer, operationalize and

continually improve a NIST Cybersecurity Framework

program. This NCSP® Foundation Certificate course

is designed to teach IT, Business and Cybersecurity

professionals the fundamentals of digital transformation,

cyber security risk management and the NIST

Cybersecurity Framework (NIST-CSF). Accredited through

APMG International, certified in the UK by the National

Cyber Security Centre (NCSC) and listed as qualified cyber

training by Department of Homeland Security Cybersecurity

and Infrastructure Security Agency (DHS CISA) in the US,

the NIST Cyber Security Professional (NCSP®) training

program teaches individuals and organizations how to

engineer, operationalize and continually improve a NIST

Cyber Security Framework (NIST-CSF) Program.

Certified in Risk and Information Systems Control

(CRISC)

3 Day(s) | $2037

The CRISC course is designed for those who have

experience with risk identification, assessment, and

evaluation; risk response; risk monitoring; information

systems control design and implementation; and

information systems control monitoring and maintenance.

Cyber Secure Coder (CSC)

3 Day(s) | $2085

The stakes for software security are very high, and yet

many development teams deal with software security only

after the code has been developed and the software is

being prepared for delivery. As with any aspect of software

quality, to ensure successful implementation, security and

privacy issues should be managed throughout the entire

software development lifecycle. This course presents an

approach for dealing with security and privacy throughout

the entire software development lifecycle. You will learn

about vulnerabilities that undermine security, and how to

identify and remediate them in your own projects. You will