Security Certifications: CISSP, CISA and CISM

Security Certifications: CISSP, CISA and CISM

Security Certifications- CISSP CISA and CISM

Computek offers a wide range of security certifications, including ISC2 and ISACA, Computek offers Certified Information Systems Security Professional (CISSP) which is developed by ISC2 and Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM) which are developed by ISACA.


CISSP-Logo-3CISA logo   CISM logo

Certified Information Systems Security Professional (CISSP) 

ISC2Logo

 

CISSP Course overview
 
The Certified Information System Security Professional (CISSP) training courses program addresses the essential elements of the 10 domains that comprise a Common Body of Knowledge.
 It offers a job-related approach to the security process, and provides basic skills required to prepare for CISSP certification and to pass the CISSP exam.
 It is the perfect option for those seeking to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.
  
Is this course for you?
 Our CISSP courses is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career
  
Job Opportunities
 The CISSP is ideal for those working in positions such as, but not limited to:
Security Engineer, Information Systems
Information Security Analyst
Security Consultant, (Computing / Networking / Information Technology)
Information Security Manager
Information Security Officer
 
 What you will learn
 CISSP (Certified Information System Security Professional) Training Course
Lesson 1: Information Systems Access Control
Lesson 2: Security Architecture and Design
Lesson 3: Network and Telecommunications Security
Lesson 4: Information Security Management Goals
Lesson 5: Information Security Classification and Program Development
Lesson 6: Risk Management and Ethics
Lesson 7: Application Security
Lesson 8: Cryptography
Lesson 9: Physical Security
Lesson 10: Operations Security
Lesson 11: Business Continuity and Disaster Recovery Planning
Lesson 12: Legal, Regulations, Compliance and Investigation
 
Full course outline
CISSP (Certified Information System Security Professional) Training Course
Lesson 1: Information Systems Access Control
Data Access Principles
System Access and Authentication
Penetration Tests
 Lesson 2: Security Architecture and Design
 Security Models
Security Modes
System Assurance
 Lesson 3: Network and Telecommunications Security
 Data Network Design
Remote Data Access
Data Network Security
Data Network Management
 Lesson 4: Information Security Management Goals
Organizational Security
The Application of Security Concepts
 Lesson 5: Information Security Classification and Program Development
Information Classification
Security Program Development
 Lesson 6: Risk Management and Ethics
 Risk Management
Ethics
 Lesson 7: Application Security
Software Configuration Management
Software Controls
Database System Security
 Lesson 8: Cryptography
 Ciphers and Cryptography
Symmetric-Key Cryptography
Asymmetric-Key Cryptography
Hashing and Message Digests
Email, Internet, and Wireless Security
Cryptographic Weaknesses
 Lesson 9: Physical Security
 Physical Access Control
Physical Access Monitoring
Physical Security Methods
Facilities Security
 Lesson 10: Operations Security
 Major Legal Systems
Legal Concepts
Regulatory Issues
Investigation
Computer Forensics
 Lesson 11: Business Continuity and Disaster Recovery Planning
Business Continuity Plan Fundamentals
Business Continuity Plan Implementation
Disaster Recovery Plan Fundamentals
Disaster Recovery Plan Implementation
 Lesson 12: Legal, Regulations, Compliance, and Investigations
 Computer Crime Laws and Regulations
 Computer Crime Incident Response
Back to top

Certified Information Systems Auditor (CISA) Training Course

isaca-logoThe CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise.
 
CISA Course overview
In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives.
Students taking this course should have a professional information systems auditing, control, or security work experience as described in the CISA job practice domain areas: The Process of Auditing Information Systems Governance and Management of IT Information Systems Acquisition, Development, and Implementation Information Systems Operations, Maintenance and Support Protection of Information Assets .
The CISA certification is more technical and specialized. If you want to prove your technical expertise in IT auditing, and show your dedication in this industry, CISA certification will prove to be a great investment.
 
Is this course for you?
The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security.
 
What you will learn
Certified Information Systems Auditor (CISA) Training Course
Lesson 1: The Process of Auditing Information Systems
Lesson 2: IT Governance and Management
Lesson 3: Acquisition, Development, and Implementation
Lesson 4: Operations, Maintenance, and Support
Lesson 5: Protection of Information Assets
 
Full course outline
Certified Information Systems Auditor (CISA) Training Course
Lesson 1: The Process of Auditing Information Systems
ISACA Information Systems Auditing Standards and Guidelines
Fundamental Business Processes
Develop and Implement an Information Systems Audit Strategy
Plan an Audit
Conduct an Audit
The Evidence Life Cycle
Communicate Issues, Risks, and Audit Results
Support the Implementation of Risk Management and Control Practices
Lesson 2: IT Governance and Management
Evaluate the Effectiveness of IT Governance
Evaluate the IT Organizational Structure and HR Management
Evaluate the IT Strategy and Direction
Evaluate IT Policies, Standards, and Procedures
Evaluate the Effectiveness of Quality Management Systems
Evaluate IT Management and Monitoring of Controls
IT Resource Investment, Use, and Allocation Practices
Evaluate IT Contracting Strategies and Policies
Evaluate Risk Management Practices
Performance Monitoring and Assurance Practices
Evaluate the Organizations Business Continuity Plan
Lesson 3: Information Systems Acquisition, Development, and Implementation
Evaluate the Business Case for Change
Evaluate Project Management Frameworks and Governance Practices
Development Life Cycle Management
Perform Periodic Project Reviews
Evaluate Control Mechanisms for Systems
Evaluate Development and Testing Processes
Evaluate Implementation Readiness
Evaluate a System Migration
Perform a Post-Implementation System Review
Lesson 4: Information Systems Operations, Maintenance, and Support
Perform Periodic System Reviews
Evaluate Service Level Management Practices
Evaluate Third-Party Management Practices
Evaluate Operations and End User Management Practices
Evaluate the Maintenance Process
Evaluate Data Administration Practices
Evaluate the Use of Capacity and Performance Monitoring Methods
Evaluate Change, Configuration, and Release Management Practices
Evaluate Problem and Incident Management Practices
Evaluate the Adequacy of Backup and Restore Provisions
Lesson 5: Protection of Information Assets
Information Security Design
Encryption Basics
Evaluate the Functionality of the IT Infrastructure
Evaluate Network Infrastructure Security
Evaluate the Design, Implementation, and Monitoring of Logical Access Controls
Risks and Controls of Virtualization
Evaluate the Design, Implementation, and Monitoring of Data Classification Process
Evaluate the Design, Implementation, and Monitoring of Physical Access Controls
Evaluate the Design, Implementation, and Monitoring of Environmental Controls
 
 
Certified Information Security Manager (CISM)
isaca-logoCourse Overview
In this course, students will establish processes to ensure that information security measures align with established business needs. The ISACA Certified Information Security Manager (CISM) is a signature certification created by the reputable ISACA
 
Who Should Attend
The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification.
 
Course Objectives
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.
 
Course Outline
1 - Information Security Governance
Develop an Information Security Strategy
Align Information Security Strategy with Corporate Governance
Identify Legal and Regulatory Requirements
Justify Investment in Information Security
Identify Drivers Affecting the Organization
Obtain Senior Management Commitment to Information Security
Define Roles and Responsibilities for Information Security
Establish Reporting and Communication Channels
2 - Information Risk Management
Implement an Information Risk Assessment Process
Determine Information Asset Classification and Ownership
Conduct Ongoing Threat and Vulnerability Evaluations
Conduct Periodic BIAs
Identify and Evaluate Risk Mitigation Strategies
Integrate Risk Management into Business Life Cycle Processes
Report Changes in Information Risk
3 - Information Security Program Development
Develop Plans to Implement an Information Security Strategy
Security Technologies and Controls
Specify Information Security Program Activities
Coordinate Information Security Programs with Business Assurance Functions
Identify Resources Needed for Information Security Program Implementation
Develop Information Security Architectures
Develop Information Security Policies
Develop Information Security Awareness, Training, and Education Programs
Develop Supporting Documentation for Information Security Policies
4 - Information Security Program Implementation
Integrate Information Security Requirements into Organizational Processes
Integrate Information Security Controls into Contracts
Create Information Security Program Evaluation Metrics
5 - Information Security Program Management
Manage Information Security Program Resources
Enforce Policy and Standards Compliance
Enforce Contractual Information Security Controls
Enforce Information Security During Systems Development
Maintain Information Security Within an Organization
Provide Information Security Advice and Guidance
Provide Information Security Awareness and Training
Analyze the Effectiveness of Information Security Controls
Resolve Noncompliance Issues
6 - Incident Management and Response
Develop an Information Security Incident Response Plan
Establish an Escalation Process
Develop a Communication Process
Integrate an IRP
Develop IRTs
Test an IRP
Manage Responses to Information Security Incidents
Perform an Information Security Incident Investigation
Conduct Post-Incident Reviews
     

sat-guaranteed

We are committed to providing our customers with the best service and products available.

100% satisfaction guarantee

why students prefer computek as the best training center in egypt new

1.Computek Training Center has trained over 1,000,000 trainees in Egypt and over 100,000 trainees in Middle East and africa.

2.Our programs are designed to meet our clients' training necessities including budget and time limitation.

3.We will cooperate with you to bring out effective programs fitting your organization.

4.Computek Training Center provides customer-focus training in mutable deliverymethods offering top quality training and high qualified instructor to meet individual learning styles and organization profession training.

5.Computek instructors are selected from the best of training professional instructors in Egypt who awarded the trust worthy certified international companies, Computek instructors not only provide superior education but also reliable work experience in the field of giving courses

6.Trainees prefer Computek Training Center not only due to our high quality training but also for our reasonable and cost-effective price list.

7.Computek Classroom is designed with cutting edge facilities strong from hardware and software technologies to the most sophisticated educational aids.

8.The information desk with our friendly and professional customers support representative is highly qualified to answer any questions and also deliver your unique requirements.

9.Computek Training Center staff is available 7 days in week from 10:00 AM to 10:00 PM to deal with any inquiries and assist student with anything they need.

10.Computek Training Center is partner of world's technology leads such as Microsoft, Cisco, Oracle, Comptia, EC Council ,Adobe , Autodesk, prometric and Pearson VUE.

 


 

 

All Rights Reseved © Computekeg.com