

95
Security
Core Model and its 40 governance and management
objectives provide the platform for establishing your
governance program. The performance management
system is updated and allows the flexibility to use maturity
measurements as well as capability measurements.
Introductions to design factors and focus areas offer
additional practical guidance on flexible adoption of COBIT
2019, whether for specific projects or full implementation.
From its foundation in the IT audit community, COBIT
has developed into a broader and more comprehensive
information and technology (I&T) governance and
management framework and continues to establish itself
as a generally accepted framework for I&T governance.
SC-400T00 Microsoft Information Protection
Administrator
3 Day(s) | $1785
Learn how to protect information in your Microsoft 365
deployment. This course focuses on data governance and
information protection within your organization. The course
covers implementation of data loss prevention policies,
sensitive information types, sensitivity labels, data retention
policies and Office 365 message encryption among other
related topics. The course helps learners prepare for the
Microsoft Information Protection Administrator exam (SC-400).
EC-Council Certified Incident Handler (ECIH)
3 Day(s) | $1799
The EC-Council Certified Incident Handler program is
designed to provide the fundamental skills to handle
and respond to the computer security incidents in an
information system. The course addresses various
underlying principles and techniques for detecting and
responding to current and emerging computer security
threats. Students will learn how to handle various types
of incidents, risk assessment methodologies, and various
laws and policy related to incident handling. In addition,
the students will learn about computer forensics and its
role in handling and responding to incidents. The course
also covers incident response teams, incident reporting
methods, and incident recovery techniques in detail.
EC-Council Certified DevSecOps Engineer (ECDE)
3 Day(s) | $1799
EC-Council Certified DevSecOps Engineer (E|CDE) is
a hands-on, instructor-led comprehensive DevSecOps
certification program that helps professionals build the
essential skills to design, develop, and maintain secure
applications and infrastructure.
Certified Information Security Manager (CISM)
3 Day(s) | $1995
In this course, students will establish processes to ensure
that information security measures align with established
business needs.
NCSP® Foundation Certificate
2 Day(s) | $2010
Accredited through APMG International, certified in the UK
by the National Cyber Security Centre (NCSC) and listed
as qualified cyber training by Department of Homeland
Security Cybersecurity and Infrastructure Security
Agency (DHS CISA) in the USA, the NIST Cyber Security
Professional (NCSP®) training program teaches individuals
and organizations how to engineer, operationalize and
continually improve a NIST Cybersecurity Framework
program. This NCSP® Foundation Certificate course
is designed to teach IT, Business and Cybersecurity
professionals the fundamentals of digital transformation,
cyber security risk management and the NIST
Cybersecurity Framework (NIST-CSF). Accredited through
APMG International, certified in the UK by the National
Cyber Security Centre (NCSC) and listed as qualified cyber
training by Department of Homeland Security Cybersecurity
and Infrastructure Security Agency (DHS CISA) in the US,
the NIST Cyber Security Professional (NCSP®) training
program teaches individuals and organizations how to
engineer, operationalize and continually improve a NIST
Cyber Security Framework (NIST-CSF) Program.
Certified in Risk and Information Systems Control
(CRISC)
3 Day(s) | $2037
The CRISC course is designed for those who have
experience with risk identification, assessment, and
evaluation; risk response; risk monitoring; information
systems control design and implementation; and
information systems control monitoring and maintenance.
Cyber Secure Coder (CSC)
3 Day(s) | $2085
The stakes for software security are very high, and yet
many development teams deal with software security only
after the code has been developed and the software is
being prepared for delivery. As with any aspect of software
quality, to ensure successful implementation, security and
privacy issues should be managed throughout the entire
software development lifecycle. This course presents an
approach for dealing with security and privacy throughout
the entire software development lifecycle. You will learn
about vulnerabilities that undermine security, and how to
identify and remediate them in your own projects. You will