<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity &#8211; QAI Global Institute</title>
	<atom:link href="https://qaiglobalinstitute.com/product-category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://qaiglobalinstitute.com</link>
	<description></description>
	<lastBuildDate>Wed, 09 Apr 2025 05:54:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://qaiglobalinstitute.com/wp-content/uploads/2020/10/cropped-logo-1-1-32x32.png</url>
	<title>Cybersecurity &#8211; QAI Global Institute</title>
	<link>https://qaiglobalinstitute.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Decoding Cyber security</title>
		<link>https://qaiglobalinstitute.com/product/decoding-cyber-security/</link>
		
		<dc:creator><![CDATA[Gaurav]]></dc:creator>
		<pubDate>Tue, 08 Apr 2025 05:11:54 +0000</pubDate>
				<guid isPermaLink="false">https://qaiglobalinstitute.com/?post_type=product&#038;p=87123</guid>

					<description><![CDATA[<p>Fee per participant: INR 16,000 plus 18% GST. Please add the listed trainings to your cart below and proceed with payments. If a training is not listed, kindly use the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/decoding-cyber-security/">Decoding Cyber security</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-tabs fusion-tabs-1 classic horizontal-tabs"><style type="text/css">.fusion-tabs.fusion-tabs-1 .nav-tabs li a{border-top-color:#ebeaea;background-color:#ebeaea;}.fusion-tabs.fusion-tabs-1 .nav-tabs{background-color:#ffffff;}.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a:focus{border-right-color:#ffffff;}.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a:focus{background-color:#ffffff;}.fusion-tabs.fusion-tabs-1 .nav-tabs li a:hover{background-color:#ffffff;border-top-color:#ffffff;}.fusion-tabs.fusion-tabs-1 .tab-pane{background-color:#ffffff;}.fusion-tabs.fusion-tabs-1 .nav,.fusion-tabs.fusion-tabs-1 .nav-tabs,.fusion-tabs.fusion-tabs-1 .tab-content .tab-pane{border-color:#00519f;}</style><div class="nav"><ul class="nav-tabs nav-justified"><li class="active"><a class="tab-link" id="courseoverview" href="#tab-0a58a105849a29ba207" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-eye"></i>Course Overview</h4></a></li><li><a class="tab-link" id="agenda" href="#tab-61986fd022d6819d4ce" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-check-square-o"></i>Agenda</h4></a></li></ul></div><div class="tab-content"><div class="tab-pane fade in active" id="tab-0a58a105849a29ba207">
<p><strong>Duration: 2 Days</strong></p>
<p>Cyber security has become a paramount concern for individuals, businesses, and governments in today’s digitally driven world. With the increasing reliance on technology, the threats to our digital assets have grown exponentially. With the interconnectedness of devices, the need for robust cyber security measures has become more pressing than ever before.<br />
Businesses can differentiate themselves as trustworthy partners in the digital ecosystem by committing to protecting data and information assets.<br />
This Training will help simplify the understanding of cybersecurity concepts and how to construct effective cyber control strategies to protect the enterprise assets.</p>
<p><strong>Who can attend:</strong></p>
<p>Those who wish to start their career in cybersecurity or practitioners who wish to build on their capabilities to build cyber resilience for their organizations.</p>
</div><div class="tab-pane fade" id="tab-61986fd022d6819d4ce">
<table border="1" cellspacing="0" cellpadding="10" >
<tbody>
<tr>
<td width="113" valign="top"><span lang="EN-US"> Module 1</span></td>
<td width="488" valign="top"><span lang="EN-US"> Understanding key Cyber Security concepts, including C,I,A.</span></td>
</tr>
<tr>
<td width="113" valign="top"><span lang="EN-US"> Module 2</span></td>
<td width="488" valign="top"><span lang="EN-US"> Overview of Cyber security lifecycle stages.</span></td>
</tr>
<tr>
<td width="113" valign="top"><span lang="EN-US"> Module 3</span></td>
<td width="488" valign="top"><span lang="EN-US"> Understand the landscape of Threat Vectors.</span></td>
</tr>
<tr>
<td width="113" valign="top"><span lang="EN-US"> Module 4</span></td>
<td width="488" valign="top"><span lang="EN-US"> Threat Modeling, Conducting threat and vulnerability assessment.</span></td>
</tr>
<tr>
<td width="113" valign="top"><span lang="EN-US"> Module 5</span></td>
<td width="488" valign="top"><span lang="EN-US"> Handling Cyber attacks:</span></p>
<ul>
<li>Malware.</li>
<li>Denial-of-Service (DoS) Attacks.</li>
<li>Phishing.</li>
<li>Spoofing.</li>
<li>Identity-Based Attacks.</li>
<li>Code Injection Attacks.</li>
<li>Supply Chain Attacks.</li>
<li>Social Engineering Attacks.</li>
<li>Insider Threats.</li>
<li>DNS Tunneling.</li>
<li>IoT-Based Attacks.</li>
<li>AI-Powered Attacks.</li>
</ul>
</td>
</tr>
<tr>
<td width="113" valign="top"><span lang="EN-US"> Module 6</span></td>
<td width="488" valign="top"><span lang="EN-US"> Threat Intelligence.</span></td>
</tr>
<tr>
<td width="113" valign="top"><span lang="EN-US"> Module 7</span></td>
<td width="488" valign="top"><span lang="EN-US"> Designing Controls for Cyber security.</span></td>
</tr>
<tr>
<td width="113" valign="top"><span lang="EN-US"> Module 8</span></td>
<td width="488" valign="top"><span lang="EN-US"> Framing Security Objectives and Metrics, Security strategy.</span></td>
</tr>
<tr>
<td width="113" valign="top"><span lang="EN-US"> Module 9</span></td>
<td width="488" valign="top"><span lang="EN-US"> Security Reviews and Testing.</span></td>
</tr>
<tr>
<td width="113" valign="top"><span lang="EN-US"> Module 10</span></td>
<td width="488" valign="top"><span lang="EN-US"> Overview of the Industry standards for Info security.</span></td>
</tr>
<tr>
<td width="113" valign="top"><span lang="EN-US"> Module 11</span></td>
<td width="488" valign="top"><span lang="EN-US"> Common tools used in Cyber security.</span></td>
</tr>
</tbody>
</table>
<p>&nbsp;<br />
<strong>The course will have hands -on activities for each module to understand practical nuances, quizzes and case studies.</strong><br />
</div></div></div>
<div class="su-button-center"><a href="#" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#oooooo;border-color:#000000;border-radius:0px;-moz-border-radius:0px;-webkit-border-radius:0px" target="_self" id="registernow"><span style="color:#FFFFFF;padding:0px 26px;font-size:20px;line-height:40px;border-color:#4d4d4d;border-radius:0px;-moz-border-radius:0px;-webkit-border-radius:0px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Register now</span></a></div>
<p><strong>Fee per participant: INR 16,000 plus 18% GST.</strong></p>
<p><span style="color: #000000; font-size: 16px;"><strong>Please add the listed trainings to your cart below and proceed with payments.<br />
If a training is not listed, kindly use the below placed &#8220;Register Now&#8221; button to share your details and we will get in touch with you with necessary details.</strong></span></p>
<a href="#brave_open_popup_86893" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#5aabd6;border-color:#4889ab;border-radius:0px;-moz-border-radius:0px;-webkit-border-radius:0px" target="_self"><span style="color:#FFFFFF;padding:0px 26px;font-size:20px;line-height:40px;border-color:#8cc4e2;border-radius:0px;-moz-border-radius:0px;-webkit-border-radius:0px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> <span>Register now </span></span></a>
<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/decoding-cyber-security/">Decoding Cyber security</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Instructional Design</title>
		<link>https://qaiglobalinstitute.com/product/instructional-design/</link>
		
		<dc:creator><![CDATA[Gaurav]]></dc:creator>
		<pubDate>Wed, 31 Jul 2024 10:36:31 +0000</pubDate>
				<guid isPermaLink="false">https://qaiglobalinstitute.com/?post_type=product&#038;p=86265</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/instructional-design/">Instructional Design</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-tabs fusion-tabs-2 classic horizontal-tabs"><style type="text/css">.fusion-tabs.fusion-tabs-2 .nav-tabs li a{border-top-color:#ebeaea;background-color:#ebeaea;}.fusion-tabs.fusion-tabs-2 .nav-tabs{background-color:#ffffff;}.fusion-tabs.fusion-tabs-2 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-2 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-2 .nav-tabs li.active a:focus{border-right-color:#ffffff;}.fusion-tabs.fusion-tabs-2 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-2 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-2 .nav-tabs li.active a:focus{background-color:#ffffff;}.fusion-tabs.fusion-tabs-2 .nav-tabs li a:hover{background-color:#ffffff;border-top-color:#ffffff;}.fusion-tabs.fusion-tabs-2 .tab-pane{background-color:#ffffff;}.fusion-tabs.fusion-tabs-2 .nav,.fusion-tabs.fusion-tabs-2 .nav-tabs,.fusion-tabs.fusion-tabs-2 .tab-content .tab-pane{border-color:#00519f;}</style><div class="nav"><ul class="nav-tabs nav-justified"><li class="active"><a class="tab-link" id="courseoverview:day1-day3" href="#tab-9dcf1c00eb8420ce7cf" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-eye"></i>Course Overview: Day 1 - Day 3</h4></a></li><li><a class="tab-link" id="whoshouldattend?" href="#tab-60b946dc78b913f5409" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-check-square-o"></i>Who Should Attend?</h4></a></li></ul></div><div class="tab-content"><div class="tab-pane fade in active" id="tab-9dcf1c00eb8420ce7cf">
<p dir="ltr"><span style="font-weight: 400;">Instruction design workshop is our flagship certification program designed for HR professional’s educator academician and content developers. In this three-day intensive workshop, the principles of designing and developing are covered. Creating an effective engaging experiential training is the need of the hour. This certification will help the learners to acquire design skills that can be applied to the principles of instructional design and instructional strategies. </span></p>
<p dir="ltr">
<p dir="ltr"><b>Course Objectives: </b></p>
<p dir="ltr"><span style="font-weight: 400;">After attending this program, the participants will be able to </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Apply the instructional Design principles in content and training development effectively </span><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Understand the learning theories and several principles governing instructional design </span><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Design instructional strategies to design and deliver effective learning course </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Implement effective, qualitative, robust and measurable content </span></p>
<p dir="ltr">
<p dir="ltr"><b>Course Outline: </b></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">History of education and educational psychology </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Evolution of instructional design </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Principles of pedagogy and andragogy </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Learning and conditions of learning </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Define instructional design and instructional strategies </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Learners and their needs </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Unique integration of several theories and principles </span></p>
<p dir="ltr">
<p dir="ltr"><b>Practice and Application: </b></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Instructional strategies </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Training needs analysis </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Writing learning objectives and enabling objectives </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Mini project </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Individual and Team assignment Case studies </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Case studies </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Discussion </span></p>
<p dir="ltr">
<p dir="ltr"><b>Methodology: </b></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Management games </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Case studies </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Videos &amp; interactive group learning. </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Project </span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Teach-back</span></p>
<p dir="ltr"><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Presentation </span></p>
<p><span style="font-weight: 400;">▪ </span><span style="font-weight: 400;">Group Discussions </span></p>
</div><div class="tab-pane fade" id="tab-60b946dc78b913f5409">
<ul>
<li>HR professionals and trainers.</li>
<li>Managers.</li>
<li>Content developers.</li>
<li>Team leaders and supervisors.</li>
<li>Business leaders.</div></div></div></li>
</ul>
<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/instructional-design/">Instructional Design</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Certified Information Systems Security Professional (CISSP)</title>
		<link>https://qaiglobalinstitute.com/product/certified-information-systems-security-professional/</link>
		
		<dc:creator><![CDATA[Gaurav]]></dc:creator>
		<pubDate>Wed, 31 Jul 2024 10:21:34 +0000</pubDate>
				<guid isPermaLink="false">https://qaiglobalinstitute.com/?post_type=product&#038;p=86263</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/certified-information-systems-security-professional/">Certified Information Systems Security Professional (CISSP)</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-tabs fusion-tabs-3 classic horizontal-tabs"><style type="text/css">.fusion-tabs.fusion-tabs-3 .nav-tabs li a{border-top-color:#ebeaea;background-color:#ebeaea;}.fusion-tabs.fusion-tabs-3 .nav-tabs{background-color:#ffffff;}.fusion-tabs.fusion-tabs-3 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-3 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-3 .nav-tabs li.active a:focus{border-right-color:#ffffff;}.fusion-tabs.fusion-tabs-3 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-3 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-3 .nav-tabs li.active a:focus{background-color:#ffffff;}.fusion-tabs.fusion-tabs-3 .nav-tabs li a:hover{background-color:#ffffff;border-top-color:#ffffff;}.fusion-tabs.fusion-tabs-3 .tab-pane{background-color:#ffffff;}.fusion-tabs.fusion-tabs-3 .nav,.fusion-tabs.fusion-tabs-3 .nav-tabs,.fusion-tabs.fusion-tabs-3 .tab-content .tab-pane{border-color:#00519f;}</style><div class="nav"><ul class="nav-tabs nav-justified"><li class="active"><a class="tab-link" id="courseoverview:day1-day3" href="#tab-38467629ab700c10967" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-eye"></i>Course Overview: Day 1 - Day 3</h4></a></li><li><a class="tab-link" id="day4-day5" href="#tab-def3a6ed0b22303c4c1" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-check-square-o"></i>Day 4 - Day 5</h4></a></li></ul></div><div class="tab-content"><div class="tab-pane fade in active" id="tab-38467629ab700c10967">
<p><strong>DURATION: 5 Days </strong></p>
<p><strong>Course Overview</strong></p>
<p dir="ltr"><b>DAY 1</b></p>
<ul>
<li dir="ltr" aria-level="1"><b>Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)</b></li>
</ul>
<ol>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand and apply concepts of confidentiality, integrity and availability</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Apply security governance principles through</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Compliance</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand legal and regulatory issues pertain to information security in a global context</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand professional ethics</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Develop and implement documented security policy, standards, procedures and guidelines.</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand business continuity requirements</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Contribute to personnel security policies</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand and apply risk management concepts</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand and apply threat modelling</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Integrate security risk considerations into acquisition strategy and practice</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Establish and manage information security education, training and awareness</span></li>
</ol>
<p dir="ltr"><b>DAY 2</b></p>
<ul>
<li dir="ltr" aria-level="1"><b>Asset Security (Protecting Security of Assets)</b></li>
</ul>
<ol>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Classify information and supporting assets (e.g. sensitivity, criticality)</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Determine and maintain ownership (e.g., data owners, system owners, business/mission owners</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Protect Privacy</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Ensure appropriate retention (e.g., media, hardware, personnel)  </span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Determine data security controls (e.g., data at rest, data in transit)</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Establish handling requirements (markings, labels, storage, destruction of sensitive information)</span></li>
</ol>
<p><b></b></p>
<ul>
<li dir="ltr" aria-level="1"><b>Security Engineering (Engineering and Management of Security)</b></li>
</ul>
<ol>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implement and manage engineering processes using secure design principles</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand the fundamental concepts of security models (e.g., Confidentiality, integrity and multi-level models)</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Select controls  and countermeasures based upon systems security evaluation models</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand security capabilities of information systems (e.g., memory protection, virtualization, trusted platform module, interfaces, fault tolerance)</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Assess and mitigate the vulnerabilities of security architectures, designs and solution elements</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Assess and mitigate vulnerabilities in web-based systems (e.g., XML, OWASP)</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Assess and mitigate vulnerabilities in mobile systems</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Assess and mitigate the vulnerabilities in embedded devices and cyber-physical systems (e.g., network-enables devices, internet of things (IOT)</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Apply cryptography</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Apply secure principles to site and facility design</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"> Design and implement physical security</span></li>
</ol>
<p>&nbsp;</p>
<p dir="ltr"><b>DAY 3</b></p>
<ul>
<li dir="ltr" aria-level="1"><b>Communications and Network Security (Designing and Protecting Network Security)</b></li>
</ul>
<ol>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Apply secure design principles to network architecture (e.g., IP &amp; non-IP protocols, segmentation</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Secure Network components</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Design and establish secure communication channels</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Prevent or mitigate network attacks</span></li>
</ol>
<p><b></b></p>
<ul>
<li dir="ltr" aria-level="1"><b>Identify and Access Management (Controlling Access and Managing Identity)</b></li>
</ul>
<ol>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Control physical and logical access to assets</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Manage identification and authentication of people and devices</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Integrate Identity as a service (e.g, cloud identity)</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Integrate third-party identity services (e.g., on-premise)</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implement and manage authorization mechanisms</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Prevent or mitigate access control attacks</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Manage the identity and access provisioning lifecycle (e.g., provisioning review)</span></li>
</ol>
</div><div class="tab-pane fade" id="tab-def3a6ed0b22303c4c1">
<p dir="ltr"><b>DAY 4</b></p>
<ul>
<li dir="ltr" aria-level="1"><b>Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)</b></li>
</ul>
<ol>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Design and validate assessment and test strategies</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Conduct security control testing</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Collect security process data (e.g, management and operational controls)</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Analyse and report test outputs (e.g. automated, manual)</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Conduct or facilitate internal and third party audits</span></li>
</ol>
<ul>
<li dir="ltr" aria-level="1"><b>Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)</b></li>
</ul>
<ol>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand and support investigations</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand requirements for investigation types</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Conduct logging and monitoring activities</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Secure the provisioning of resources</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand and apply foundational security operations concepts</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Employ resource protection techniques</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Conduct incident management</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Operate and maintain preventative measures</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implement and support patch and vulnerability management</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Participate in and understand change management process (e.g., versioning, baselining, security impact analysis)</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implement recovery strategies</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implement disaster recovery processes</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Test disaster recovery plans</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Participate in business continuity planning and exercises</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implement and manage physical security</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Participate in addressing personal safety concerns(e.g. Duress, travel, monitoring)</span></li>
</ol>
<p dir="ltr"><b>DAY 5</b></p>
<ul>
<li dir="ltr" aria-level="1"><b>Software Development Security (Understanding, Applying, and Enforcing Software Security) </b></li>
</ul>
<ol>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand and apply security in the software development lifecycle</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Enforce security controls in development environments</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Assess the effectiveness of software security</span></li>
<li dir="ltr" style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Assess security impact of acquired software</span></li>
</ol>
<ul>
<li dir="ltr" aria-level="1"><b>MOCK TEST</b></li>
</ul>
<p><b></b><br />
</div></div></div>
<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/certified-information-systems-security-professional/">Certified Information Systems Security Professional (CISSP)</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Advanced Cloud Security Auditing for CSA STAR Certification (CSA Star)</title>
		<link>https://qaiglobalinstitute.com/product/advanced-cloud-security-auditing-for-csa-star-certification/</link>
		
		<dc:creator><![CDATA[Gaurav]]></dc:creator>
		<pubDate>Mon, 27 May 2024 04:47:36 +0000</pubDate>
				<guid isPermaLink="false">https://qaiglobalinstitute.com/?post_type=product&#038;p=86043</guid>

					<description><![CDATA[<p>For further pricing related details kindly contact us at: customer_relations@qaiglobal.com</p>
<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/advanced-cloud-security-auditing-for-csa-star-certification/">Advanced Cloud Security Auditing for CSA STAR Certification (CSA Star)</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-tabs fusion-tabs-4 classic horizontal-tabs"><style type="text/css">.fusion-tabs.fusion-tabs-4 .nav-tabs li a{border-top-color:#ebeaea;background-color:#ebeaea;}.fusion-tabs.fusion-tabs-4 .nav-tabs{background-color:#ffffff;}.fusion-tabs.fusion-tabs-4 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-4 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-4 .nav-tabs li.active a:focus{border-right-color:#ffffff;}.fusion-tabs.fusion-tabs-4 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-4 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-4 .nav-tabs li.active a:focus{background-color:#ffffff;}.fusion-tabs.fusion-tabs-4 .nav-tabs li a:hover{background-color:#ffffff;border-top-color:#ffffff;}.fusion-tabs.fusion-tabs-4 .tab-pane{background-color:#ffffff;}.fusion-tabs.fusion-tabs-4 .nav,.fusion-tabs.fusion-tabs-4 .nav-tabs,.fusion-tabs.fusion-tabs-4 .tab-content .tab-pane{border-color:#00519f;}</style><div class="nav"><ul class="nav-tabs nav-justified"><li class="active"><a class="tab-link" id="." href="#tab-fb7181fcf05e77f3d50" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-."></i>.</h4></a></li></ul></div><div class="tab-content"><div class="tab-pane fade in active" id="tab-fb7181fcf05e77f3d50">
<p><strong>DURATION: 5 Days </strong><br />
<strong>Course Outline</strong></p>
<h2 dir="ltr"><b>Day 1</b></h2>
<div dir="ltr" align="left">
<table border="1">
<colgroup>
<col width="58" />
<col width="499" /></colgroup>
<tbody>
<tr>
<td>
<p dir="ltr"><b> Time </b></p>
</td>
<td>
<p dir="ltr"><b> Topic</b></p>
</td>
</tr>
<tr>
<td rowspan="13">
<p dir="ltr"><span style="font-weight: 400;"> 09.00 </span></p>
<p dir="ltr"><span style="font-weight: 400;"> 17.00</span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Introduction</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Ice breaker</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Overview of course structure and learning objectives</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Introduce Cloud</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Who are the CSA?</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> What is the Cloud Controls Matrix (CCM)?</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Control areas of the CCM</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Concept of Maturity</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Maturity Model</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Interpret the Maturity Model</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> What is STAR Certification?</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Benefits of STAR Certification to Cloud Service Providers</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Close of Day 1</span></p>
</td>
</tr>
</tbody>
</table>
</div>
<h2 dir="ltr"><b>Day 2</b></h2>
<div dir="ltr" align="left">
<table border="1">
<colgroup>
<col width="58" />
<col width="499" /></colgroup>
<tbody>
<tr>
<td>
<p dir="ltr"><b> Time </b></p>
</td>
<td>
<p dir="ltr"><b> Topic</b></p>
</td>
</tr>
<tr>
<td rowspan="3">
<p dir="ltr"><span style="font-weight: 400;"> 09.00 </span></p>
<p dir="ltr"><span style="font-weight: 400;"> </span></p>
<p dir="ltr"><span style="font-weight: 400;"> 17.00</span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Apply the Maturity Model</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Examination (2 hours)</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Final questions and Close of Day 2</span></p>
</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
</div>
<p>Two short breaks will be taken at suitably convenient times in the morning and afternoon.<br />
45 minutes will be given for a lunch break. Additional breaks may be taken as long as agreed<br />
by delegates and tutor, and all learning objectives are met.</p>
</div></div></div>
<p><strong><span style="color: #000000;font-size: 18px;">For further pricing related details kindly contact us at:</span> <span style="color: #000080;"><a href="mailto:customer_relations@qaiglobal.com" style="color: #000080; font-size: 18px;">customer_relations@qaiglobal.com</a></span></strong></p>
<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/advanced-cloud-security-auditing-for-csa-star-certification/">Advanced Cloud Security Auditing for CSA STAR Certification (CSA Star)</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Certified Risk Professional (CRiSP)</title>
		<link>https://qaiglobalinstitute.com/product/certified-risk-professional/</link>
		
		<dc:creator><![CDATA[Gaurav]]></dc:creator>
		<pubDate>Fri, 24 May 2024 11:15:14 +0000</pubDate>
				<guid isPermaLink="false">https://qaiglobalinstitute.com/?post_type=product&#038;p=86037</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/certified-risk-professional/">Certified Risk Professional (CRiSP)</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-tabs fusion-tabs-5 classic horizontal-tabs"><style type="text/css">.fusion-tabs.fusion-tabs-5 .nav-tabs li a{border-top-color:#ebeaea;background-color:#ebeaea;}.fusion-tabs.fusion-tabs-5 .nav-tabs{background-color:#ffffff;}.fusion-tabs.fusion-tabs-5 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-5 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-5 .nav-tabs li.active a:focus{border-right-color:#ffffff;}.fusion-tabs.fusion-tabs-5 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-5 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-5 .nav-tabs li.active a:focus{background-color:#ffffff;}.fusion-tabs.fusion-tabs-5 .nav-tabs li a:hover{background-color:#ffffff;border-top-color:#ffffff;}.fusion-tabs.fusion-tabs-5 .tab-pane{background-color:#ffffff;}.fusion-tabs.fusion-tabs-5 .nav,.fusion-tabs.fusion-tabs-5 .nav-tabs,.fusion-tabs.fusion-tabs-5 .tab-content .tab-pane{border-color:#00519f;}</style><div class="nav"><ul class="nav-tabs nav-justified"><li class="active"><a class="tab-link" id="courseoverview" href="#tab-8c24a846404fe2342d7" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-eye"></i>Course Overview</h4></a></li><li><a class="tab-link" id="courseoutline" href="#tab-d66a2d6e587a198f076" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-check-square-o"></i>Course Outline</h4></a></li></ul></div><div class="tab-content"><div class="tab-pane fade in active" id="tab-8c24a846404fe2342d7">
<p>Certified Risk Professional (CRiSP), based on Risk management processes in ISO 31000: 2018, ISO 27001:2013 &amp; ISO 22301:2012</p>
<p><strong>DURATION: 5 Days </strong><br />
<strong>Welcome to the “Certified Risk Professional (CRiSP) Training Course!:</strong></p>
<p>We aim to provide the best and most authoritative training available on implementing an integrated risk management system, encompassing the risk management processes in ISO 31000:2018 (Risk management guidelines), ISO 27001:2013 (Information security management system requirements) and ISO 22301:2012 (Business continuity management system requirements). We believe that you get the most out of the course by fully joining in the discussions and exercises. Participation brings better understanding and provides a good foundation on which to further develop your expertise. It also makes the course fun. We invite you to join in!</p>
<p><strong>Recording:</strong></p>
<p>Please do not use recording devices since they tend to restrict free discussions.</p>
</div><div class="tab-pane fade" id="tab-d66a2d6e587a198f076">
<h2 dir="ltr"><b>Day 1</b></h2>
<div dir="ltr" align="left">
<table border="1">
<colgroup>
<col width="58" />
<col width="499" /></colgroup>
<tbody>
<tr>
<td>
<p dir="ltr"><b> Time </b></p>
</td>
<td>
<p dir="ltr"><b> Topic</b></p>
</td>
</tr>
<tr>
<td rowspan="9">
<p dir="ltr"><span style="font-weight: 400;"> 09.00 </span></p>
<p dir="ltr"><span style="font-weight: 400;"> 17.00</span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Welcome and Introductions</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Course Aims, Objectives and Structure</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Risk Management – Overview &amp; updates to previous version of ISO  31000</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Understanding Risks – Key concepts and definition</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Risk Management Principles</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Risk Management Framework</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Risk Management Process</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Learning Application – Activity 2 to 6</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Summary</span></p>
</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<h2 dir="ltr"><b>Day 2</b></h2>
<div dir="ltr" align="left">
<table border="1">
<colgroup>
<col width="58" />
<col width="499" /></colgroup>
<tbody>
<tr>
<td>
<p dir="ltr"><b> Time </b></p>
</td>
<td>
<p dir="ltr"><b> Topic</b></p>
</td>
</tr>
<tr>
<td rowspan="9">
<p dir="ltr"><span style="font-weight: 400;"> 09.00 </span></p>
<p dir="ltr"><span style="font-weight: 400;"> 17.00</span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Review of Day 1</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Risk Process in Detail</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Risk Identification</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Risk Analysis and Evaluation</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Risk Treatment and Risk Treatment plans</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Risk Monitoring and Review</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Risk Recording and Reporting</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Learning Application Activity 7 &#8211; 12</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Summary</span></p>
</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<h2 dir="ltr"><b>Day 3</b></h2>
<div dir="ltr" align="left">
<table border="1">
<colgroup>
<col width="58" />
<col width="499" /></colgroup>
<tbody>
<tr>
<td>
<p dir="ltr"><b> Time </b></p>
</td>
<td>
<p dir="ltr"><b> Topic</b></p>
</td>
</tr>
<tr>
<td rowspan="10">
<p dir="ltr"><span style="font-weight: 400;"> 09.00 </span></p>
<p dir="ltr"><span style="font-weight: 400;"> 17.00</span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Review of Day 2</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Tailoring Risk Management Process – ISMS</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Establishing the Context for Risk Assessment – Internal Issues,   External</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Issues, Expectations of Interested Parties – ISMS Perspective</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Integrating the criteria for security risk assessment as per ISO  27001:2013</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Conducting a Risk Assessment (Identification, Analysis and   Evaluation)</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> based on ICT case study of Pacific Telecom</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Establishing Risk Treatment Plans for ISMS – case study based</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Establishing Information Security Objectives</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Summary</span></p>
</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<h2 dir="ltr"><b>Day 4</b></h2>
<div dir="ltr" align="left">
<table border="1">
<colgroup>
<col width="58" />
<col width="499" /></colgroup>
<tbody>
<tr>
<td>
<p dir="ltr"><b> Time </b></p>
</td>
<td>
<p dir="ltr"><b> Topic</b></p>
</td>
</tr>
<tr>
<td rowspan="10">
<p dir="ltr"><span style="font-weight: 400;"> 09.00 </span></p>
<p dir="ltr"><span style="font-weight: 400;"> 17.00</span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Review of Day 3</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Tailoring Risk Management Process for BCMS &#8211; Risk appetite</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Risk assessment as per ISO 22301:2012</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Establishing Business Continuity Objectives</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Business Continuity Operations Processes</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Conducting a BIA – case study based</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Determine a Business Continuity strategy and procedures</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Business continuity exercising and testing</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Specimen Exam paper</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Summary</span></p>
</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<h2 dir="ltr"><b>Day 5</b></h2>
<div dir="ltr" align="left">
<table border="1">
<colgroup>
<col width="58" />
<col width="499" /></colgroup>
<tbody>
<tr>
<td>
<p dir="ltr"><b> Time </b></p>
</td>
<td>
<p dir="ltr"><b> Topic</b></p>
</td>
</tr>
<tr>
<td rowspan="4">
<p dir="ltr"><span style="font-weight: 400;"> 09.00 </span></p>
<p dir="ltr"><span style="font-weight: 400;"> 12.30</span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Review of course</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Final questions</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> Exam</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> End of Course</span></p>
</td>
</tr>
</tbody>
</table>
</div>
</div></div></div>
<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/certified-risk-professional/">Certified Risk Professional (CRiSP)</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Certified Information Security  Manager (CISM)</title>
		<link>https://qaiglobalinstitute.com/product/certified-information-security-manager/</link>
		
		<dc:creator><![CDATA[Gaurav]]></dc:creator>
		<pubDate>Fri, 24 May 2024 10:40:05 +0000</pubDate>
				<guid isPermaLink="false">https://qaiglobalinstitute.com/?post_type=product&#038;p=86036</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/certified-information-security-manager/">Certified Information Security  Manager (CISM)</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-tabs fusion-tabs-6 classic horizontal-tabs"><style type="text/css">.fusion-tabs.fusion-tabs-6 .nav-tabs li a{border-top-color:#ebeaea;background-color:#ebeaea;}.fusion-tabs.fusion-tabs-6 .nav-tabs{background-color:#ffffff;}.fusion-tabs.fusion-tabs-6 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-6 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-6 .nav-tabs li.active a:focus{border-right-color:#ffffff;}.fusion-tabs.fusion-tabs-6 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-6 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-6 .nav-tabs li.active a:focus{background-color:#ffffff;}.fusion-tabs.fusion-tabs-6 .nav-tabs li a:hover{background-color:#ffffff;border-top-color:#ffffff;}.fusion-tabs.fusion-tabs-6 .tab-pane{background-color:#ffffff;}.fusion-tabs.fusion-tabs-6 .nav,.fusion-tabs.fusion-tabs-6 .nav-tabs,.fusion-tabs.fusion-tabs-6 .tab-content .tab-pane{border-color:#00519f;}</style><div class="nav"><ul class="nav-tabs nav-justified"><li class="active"><a class="tab-link" id="courseoverview" href="#tab-10d1d1356618c7f096b" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-eye"></i>Course Overview</h4></a></li><li><a class="tab-link" id="learningoutcomes" href="#tab-3d0e494ecf0bbb247ef" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-check-square-o"></i>Learning Outcomes </h4></a></li><li><a class="tab-link" id="courseoutline" href="#tab-d342ffcfb1f16dfe236" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-th"></i>Course Outline </h4></a></li></ul></div><div class="tab-content"><div class="tab-pane fade in active" id="tab-10d1d1356618c7f096b">
<p><strong>DURATION: 4 Days </strong></p>
<p><strong>Course Overview:</strong></p>
<p>The Certified Information Security Manager (CISM) is a globally recognized certification that validates an  individual&#8217;s knowledge, expertise, and skills in managing, designing, and assessing an organization&#8217;s  information security. It is issued by the Information Systems Audit and Control Association (ISACA) and is  widely used by industries to identify professionals capable of safeguarding sensitive data and managing  cybersecurity risks. CISM emphasizes the importance of aligning security strategies with business  objectives, ensuring compliance with regulations, and implementing efficient security policies. The  certification is essential for professionals seeking career growth in information security management, and  it is valued by employers seeking skilled security managers.  </p>
<p>Amidst this transformative period, the Certified Information Security Manager (CISM) certification emerges  as a beacon of credibility and competence in the field of cybersecurity. With over 50,000 certifications  issued by ISACA, CISM has become the most sought-after cybersecurity certification from ISACA.</p>
<p><strong>Course Pre-Requisites:</strong></p>
<p>The specific prerequisites for a Certified Information Security Manager (CISM) training course may vary  depending on the training provider. However, some common prerequisites include:  </p>
<ul>
<li>Knowledge of information security: Candidates should have a solid understanding of information  security concepts, such as confidentiality, integrity, and availability. This knowledge can be gained  through formal education, self-study, or work experience.</li>
<li>IT/security work experience: It is recommended that candidates have at least five years of work  experience in the IT or security fields before pursuing CISM certification. This experience should  include a minimum of three years in an information security management role.</li>
<li>Familiarity with relevant frameworks and standards: Candidates should be familiar with  frameworks and standards such as ISO/IEC 27001, NIST SP 800-53, and the COBIT framework.</li>
<li>Basic understanding of risk management and business continuity: Candidates should understand risk management concepts, such as risk identification, assessment, and mitigation, as well as the  importance of business continuity planning.</li>
<li>English language proficiency: Since most CISM training courses are conducted in English, candidates  should have strong reading, writing, and oral communication skills in English.</li>
<li>Exam eligibility: To take the CISM exam, candidates must meet specific work experience  requirements set by ISACA. It is essential to ensure you meet these requirements before investing  in a CISM training course.
<li>Accumulation of 5 years of experience in the Information Security Management field </li>
<li>Experience required within 3 out of the 4 domains.</li>
<li>All applicable experience must fall within the past 10 years of the application.</li>
</ul>
<p><strong>Why should you learn Certified Information Security Manager (CISM)?  </strong></p>
<p>CISM certification significantly boosts career prospects, with certified professionals earning 35% higher  average salaries compared to non-certified counterparts. This globally recognized designation provides in depth knowledge and skills on information security, satisfying increased demand for proficient  practitioners. Consequently, businesses benefit from improved protection against cyber threats and  enhanced managerial competence for their security teams.  </p>
<p><strong>Why should you learn Certified Information Security Manager (CISM)? </strong><br />
CISM certification significantly boosts career prospects, with certified professionals earning 35% higher  average salaries compared to non-certified counterparts. This globally recognized designation provides in depth knowledge and skills on information security, satisfying increased demand for proficient  practitioners. Consequently, businesses benefit from improved protection against cyber threats and  enhanced managerial competence for their security teams. </p>
<p><strong>Target Audience </strong><br />
The target audience for Certified Information Security Manager (CISM) training includes IT professionals,  cybersecurity experts, IT auditors, risk managers, compliance officers, and security consultants. This  training is ideal for individuals who have experience managing, designing, overseeing, and assessing an  enterprise&#8217;s information security program. It is also suitable for those looking to enhance their career  prospects in information security management and broaden their knowledge of global security practices,  as well as professionals seeking to demonstrate their expertise through a globally recognized certification. </p>
</div><div class="tab-pane fade" id="tab-3d0e494ecf0bbb247ef">
<p>The Certified Information Security Manager (CISM) training aims to equip professionals with the knowledge  and skills to manage, design, and assess enterprise information security programs. The main objectives  include understanding information security governance, risk management, incident response, and business  continuity. Additionally, participants learn how to align security strategies with business objectives, ensure  compliance with regulatory requirements, evaluate and enhance security policies, and develop effective  incident management plans. Ultimately, CISM training prepares professionals to become industry<br />
recognized leaders in managing and protecting an organization&#8217;s critical information assets. </p>
<p>After completing Certified Information Security Manager (CISM) certification training, an individual can  earn the following skills:  </p>
<ul>
<li>Information security governance: Understand and establish a strong security governance  framework, aligning it with business objectives and ensuring compliance with legal and regulatory  requirements.</li>
<li>Information risk management: Identify, assess, and manage information security risks in a  systematic manner, prioritizing and mitigating them according to the business context.   Information security program development and management: Design, develop, and manage a  comprehensive and agile information security program that supports the organization&#8217;s goals and  objectives.</li>
<li>Incident management and response: Develop and maintain an effective incident management  strategy, including the capability to detect, respond to, and recover from security incidents in a  timely manner.
<li>Policy development and management: Establish, communicate, and maintain the organization&#8217;s  information security policies, procedures, guidelines, and standards.</li>
<li>Security awareness and training: Develop and implement a security awareness and training  program to ensure that employees, contractors, and other relevant parties understand their  information security responsibilities.</li>
<li>Business continuity and disaster recovery planning: Develop, implement, and maintain a business  continuity and disaster recovery plan to ensure the organization&#8217;s resilience in case of a security  incident, natural disaster, or other disruption.</li>
<li>Third-party security management: Evaluate and manage the information security risks associated  with third-party relationships, such as vendors, partners, and service providers.</li>
<li>Security architecture and technology: Understand and apply principles of secure system design,  data protection, and technology controls to protect the organization&#8217;s critical assets.</li>
<li>Compliance and audit management: Ensure ongoing compliance with applicable laws, regulations,  and industry standards, as well as internal policies and procedures, through regular audits and  assessments.</li>
</ul>
<p>By earning these skills, an individual becomes capable of effectively managing an organization&#8217;s information  security program, thereby contributing to its overall success and resilience.  </p>
<p><strong>How to become Certified?  </strong></p>
<p>Taking and passing the CISM certification exam is just the first step in becoming certified. To become  CISM certified, an individual must first meet the following requirements:  </p>
<ul>
<li>Pass the certification exam.</li>
<li>Pay the application processing fee.</li>
<li>Submit application to demonstrate experience requirements.</li>
<li>Adhere to the Code of Professional Ethics.</li>
<li>Adhere to the Continuing Professional Education Policy.</li>
<li>Candidates have 5 years from passing the exam to apply for CISM certification.</li>
</ul>
</div><div class="tab-pane fade" id="tab-d342ffcfb1f16dfe236">
<p><strong>Module 1: Introduction</strong> </p>
<ul>
<li>Welcome to Certified Information Security Manager Course.</li>
<li>Certification Overview.</li>
<li>Skills Covered.</li>
</ul>
<p><strong>Module 2: Information Security Governance: Enterprise Governance  </strong></p>
<ul>
<li>Organizational Culture.</li>
<li>Governance vs. Management.</li>
<li>Legal Regulatory and Contractual Requirements.</li>
<li>Data Security Frameworks.</li>
<li>Data States.</li>
<li> Organizational Structures Roles and Responsibilities.</li>
</ul>
<p><strong>Module 3: Information Security Governance: Information Security Strategy  </strong></p>
<ul>
<li>Information Security Strategy Development.</li>
<li>Information Governance Frameworks and Standards.</li>
<li>Strategic Planning.</li>
<li>SWOT Analysis .</li>
<li>Opex and Capex.</li>
<li>KGI&#8217;s KPI&#8217;s and KRI&#8217;s.</li>
<li>CIA Triad.</li>
<li>Designing security into software.</li>
<li>US Data Privacy Laws.</li>
<li>GDPR.</li>
</ul>
<p><strong>Module 4: Information Security Risk Management Information Security: Risk Assessment</strong></p>
<ul>
<li>Emerging Risk and Threat Landscape.</li>
<li>Risk Identification.</li>
<li>Risk Management.</li>
<li>Vulnerability and Control Deficiency Analysis.</li>
<li>Risk Assessment and Analysis.</li>
<li>COBIT.</li>
<li>Attackers and Phishing.</li>
<li>ISO 27001.</li>
</ul>
<p><strong>Module 5: Information Security Risk Management Information Security: Risk Response </strong> </p>
<ul>
<li>Risk Treatment and Response.</li>
<li>Risk and Control Ownership.</li>
<li>Risk Monitoring and Reporting.</li>
</ul>
<p><strong>Module 6: Strategy Analysis </strong> </p>
<ul>
<li>Information Security Program Resources.</li>
<li>Information Asset Identification and Classification.</li>
<li>Information Security Policies Procedures and Guidelines.</li>
<li>Information Security Program Metrics.</li>
</ul>
<p><strong>Module 7: Information Security Program Information Security: Program Management  </strong></p>
<ul>
<li>Information Security Control Design and Selection.</li>
<li>Information Security Control Implementation and Integrations.</li>
<li>Information Security Control Testing and Evaluation.</li>
<li>Information Security Awareness and Training.</li>
<li>Management of External Services.</li>
<li>Information Security Program Communications and Reporting.</li>
<li>Introduction to Access Control.</li>
<li>Authentication and Authorization.</li>
<li>Introduction to Cryptography.</li>
<li>Overview of Encryption.</li>
<li>Hashing.</li>
<li>Social Engineering Attacks.</li>
</ul>
<p><strong>Module 8: Incident Management: Incident Management Readiness </strong> </p>
<ul>
<li>Incident Management Plan.</li>
<li>Business Impact Analysis (BIA).</li>
<li>Business Continuity Plan (BCP).</li>
<li>Disaster Recovery Plan (DRP).</li>
<li>Incident Classification and Categorization.</li>
<li>Incident Management Training and Testing.</li>
</ul>
<p><strong>Module 9: Incident Management: Incident Management Operations </strong> </p>
<ul>
<li>Incident Management Tools and Techniques.</li>
<li>Incident Containment Methods.</li>
<li>Incident Response Communications.</li>
<li>Incident Eradication and Recovery.</li>
<li>Post incident Review Practices.</li>
</ul>
</div></div></div>
<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/certified-information-security-manager/">Certified Information Security  Manager (CISM)</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Certified Cloud Security Professional (CCSP)</title>
		<link>https://qaiglobalinstitute.com/product/certified-cloud-security-professional/</link>
		
		<dc:creator><![CDATA[Gaurav]]></dc:creator>
		<pubDate>Fri, 24 May 2024 10:36:57 +0000</pubDate>
				<guid isPermaLink="false">https://qaiglobalinstitute.com/?post_type=product&#038;p=86034</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/certified-cloud-security-professional/">Certified Cloud Security Professional (CCSP)</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-tabs fusion-tabs-7 classic horizontal-tabs"><style type="text/css">.fusion-tabs.fusion-tabs-7 .nav-tabs li a{border-top-color:#ebeaea;background-color:#ebeaea;}.fusion-tabs.fusion-tabs-7 .nav-tabs{background-color:#ffffff;}.fusion-tabs.fusion-tabs-7 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-7 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-7 .nav-tabs li.active a:focus{border-right-color:#ffffff;}.fusion-tabs.fusion-tabs-7 .nav-tabs li.active a,.fusion-tabs.fusion-tabs-7 .nav-tabs li.active a:hover,.fusion-tabs.fusion-tabs-7 .nav-tabs li.active a:focus{background-color:#ffffff;}.fusion-tabs.fusion-tabs-7 .nav-tabs li a:hover{background-color:#ffffff;border-top-color:#ffffff;}.fusion-tabs.fusion-tabs-7 .tab-pane{background-color:#ffffff;}.fusion-tabs.fusion-tabs-7 .nav,.fusion-tabs.fusion-tabs-7 .nav-tabs,.fusion-tabs.fusion-tabs-7 .tab-content .tab-pane{border-color:#00519f;}</style><div class="nav"><ul class="nav-tabs nav-justified"><li class="active"><a class="tab-link" id="courseoverview" href="#tab-6164807158c2b36f748" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-eye"></i>Course Overview</h4></a></li><li><a class="tab-link" id="architecturalconcepts" href="#tab-822d02db3e1bb665170" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-check-square-o"></i>Architectural Concepts</h4></a></li><li><a class="tab-link" id="cloudapplicationsecurity" href="#tab-0ae4b8b455a0167eb73" data-toggle="tab"><h4 class="fusion-tab-heading"><i class="fa fontawesome-icon fa-th"></i>Cloud Application Security</h4></a></li></ul></div><div class="tab-content"><div class="tab-pane fade in active" id="tab-6164807158c2b36f748">
<p><strong>DURATION: 5 Days </strong></p>
<p><strong>Course Overview:</strong></p>
<p>The CCSP exam tests your skills in six domains. The domains draw from a range of cloud security topics within the (ISC)² Common Body of Knowledge (CBK). Here’s a closer look at the CCSP domains and how they’re weighted on the exam:</p>
<p>&nbsp;</p>
<div dir="ltr" align="left">
<table>
<colgroup>
<col width="414" />
<col width="85" /></colgroup>
<tbody>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"></span><b> Domains </b></p>
</td>
<td>
<p dir="ltr"><b> Weight</b></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> 1. Architectural Concepts and Design Requirements </span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> 19%</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> 2. Cloud Data Security </span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> 20%</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> 3. Cloud Platform and Infrastructure Security </span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> 19%</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> 4. Cloud Application Security </span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> 15%</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> 5. Operations </span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> 15%</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><span style="font-weight: 400;"> 6. Legal and Compliance </span></p>
</td>
<td>
<p dir="ltr"><span style="font-weight: 400;"> 12%</span></p>
</td>
</tr>
<tr>
<td>
<p dir="ltr"><b> Total </b></p>
</td>
<td>
<p dir="ltr"><b> 100%</b></p>
</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
</div><div class="tab-pane fade" id="tab-822d02db3e1bb665170">
<p><strong>Architectural Concepts &#038; Design Requirements</strong> – Cloud computing concepts &#038; definitions based on the ISO/IEC 17788 standard; security concepts and principles relevant to secure cloud computing. </p>
<ul>
<li>Understand Cloud Computing Concepts.</li>
<li>Describe Cloud Reference Architecture.</li>
<li>Understand Security Concepts Relevant to Cloud Computing.</li>
<li>Understand Design Principles of Secure Cloud Computing.</li>
<li>Identify Trusted Cloud Services.</li>
</ul>
<p><strong>Cloud Data Security</strong> – Concepts, principles, structures, and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability in cloud environments. </p>
<ul>
<li>Understand Cloud Data Lifecycle.</li>
<li>Design and Implement Cloud Data Storage Architectures.</li>
<li>Design and Apply Data Security Strategies.</li>
<li>Understand and Implement Data Discovery and Classification Technologies.</li>
<li>Design and Implement Relevant Jurisdictional Data Protections for Personally Identifiable Information (PII).</li>
<li>Design and Implement Data Rights Management.</li>
<li>Plan and Implement Data Retention, Deletion, and Archiving Policies.</li>
<li>Design and Implement Auditability, Traceability and Accountability of Data Events.</li>
</ul>
<p><strong>Cloud Platform &#038; Infrastructure Security</strong> – Knowledge of the cloud infrastructure components, both the physical and virtual, existing threats, and mitigating and developing plans to deal with those threats. </p>
<ul>
<li>Comprehend Cloud Infrastructure Components.</li>
<li>Analyze Risks Associated to Cloud Infrastructure.</li>
<li>Design and Plan Security Controls.</li>
<li>Plan Disaster Recovery and Business Continuity Management.</li>
</ul>
</div><div class="tab-pane fade" id="tab-0ae4b8b455a0167eb73">
<p><strong>Cloud Application Security –</strong> Processes involved with cloud software assurance and validation; and the use of verified secure software. </p>
<ul>
<li>Recognize the need for Training and Awareness in Application Security.</li>
<li>Understand Cloud Software Assurance and Validation.</li>
<li>Use Verified Secure Software.</li>
<li>Comprehend the Software Development Life-Cycle (SDLC) Process.</li>
<li>Apply the Secure Software Development Life-Cycle.</li>
<li>Comprehend the Specifics of Cloud Application Architecture.</li>
<li>Design Appropriate Identity and Access Management (IAM) Solutions.</li>
</ul>
<p><strong>Operations –</strong> Identifying critical information and the execution of selected measures that eliminate or reduce adversary exploitation of it; requirements of cloud architecture to running and managing that infrastructure; definition of controls over hardware, media, and the operators with access privileges as well as the auditing and monitoring are the mechanisms, tools and facilities. </p>
<ul>
<li>Support the Planning Process for the Data Center Design.</li>
<li>Implement and Build Physical Infrastructure for Cloud Environment.</li>
<li>Run Physical Infrastructure for Cloud Environment.</li>
<li>Manage Physical Infrastructure for Cloud Environment.</li>
<li>Build Logical Infrastructure for Cloud Environment.</li>
<li>Run Logical Infrastructure for Cloud Environment.</li>
<li>Manage Logical Infrastructure for Cloud Environment.</li>
<li>Ensure Compliance with Regulations and Controls (e.g., ITIL, ISO/IEC 20000-1).</li>
<li>Conduct Risk Assessment to Logical and Physical Infrastructure.</li>
<li>Understand the Collection, Acquisition and Preservation of Digital Evidence.</li>
<li>Manage Communication with Relevant Parties.</li>
</ul>
<p><strong>Legal &#038; Compliance –</strong> Addresses ethical behavior and compliance with regulatory frameworks. Includes investigative measures and techniques, gathering evidence (e.g., Legal Controls, eDiscovery, and Forensics); privacy issues and audit process and methodologies; implications of cloud environments in relation to enterprise risk management. </p>
<ul>
<li>Understand Legal Requirements and Unique Risks within the Cloud Environment.</li>
<li>Understand Privacy Issues, Including Jurisdictional Variation.</li>
<li>Understand Audit Process, Methodologies, and Required Adaption&#8217;s for a Cloud Environment.</li>
<li>Understand Implications of Cloud to Enterprise Risk Management.</li>
<li>Understand Outsourcing and Cloud Contract Design.</li>
<li>Execute Vendor Management.</li>
</ul>
</div></div></div>
<p>The post <a rel="nofollow" href="https://qaiglobalinstitute.com/product/certified-cloud-security-professional/">Certified Cloud Security Professional (CCSP)</a> appeared first on <a rel="nofollow" href="https://qaiglobalinstitute.com">QAI Global Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
