www.bytec0de.com Byte Code Cyber Securities New Delhi : CISA Training

+ Ask Question / Post resume
Results 1 to 1 of 1
  1. Post Count Number #1
    IJT addict
    Join Date
    November 14th, 2011
    Location
    tuticorin
    Posts
    2,287

    www.bytec0de.com Byte Code Cyber Securities New Delhi : CISA Training

    Name Of Training Institute : Byte Code Cyber Securities (bytec0de.com)
    Location of the Institute: New Delhi
    Training Offered : CISA Training

    http://www.bytec0de.com/cisa-cism-training.html

    CISA ( Certified Information Security Auditor ) Training
    Course Fee: Course Training Fee: 25,000 + Service Tax ( Training, Books, E-Books, Tools & Softwares included )
    Course Duration: 4 days + 6 Hours Mock Test
    Top Instructors, 30 Hours of Hands On Labs, Hundreds of tools loaded onto VMs for you, Free Byte Code Certification For CISA
    Required Prerequisites: Basic Knowledge Of Internet
    The CISA curriculum covers a wide range of subject matter in a variety information technology audit topics, the examination is based on a
    compendium of industry best practices, including:
    • Information Systems Auditing Standards, Guidelines and Procedures and Code of Professional Ethics
    • Control objectives and controls related to Information Systems
    • Acceptable Procedures used to store, retrieve, transport, and dispose of confidential information assets
    • Information Systems auditing practices and techniques
    • Information Technology governance frameworks
    • Quality management strategies and policies
    • Risk management methodologies and tools
    • Use of control frameworks (i.e., CobiT, ISO and ITIL)
    • Monitoring and reporting of Information Technology performance, establishing metrics
    • Use of maturity and process improvement models (i.e., CMM, CobiT)
    • Contracting strategies, processes and contract management practices
    • Control objectives and techniques that ensure the completeness, accuracy, validity, and authorization of transactions and data within IT systems applications
    • Enterprise architecture design related to data, applications, and technology
    • Acquisition and contract management processes
    • System development methodologies and tools and an understanding of their strengths and weaknesses
    • Data conversion tools, techniques, and procedures
    • Business Impact Analysis (BIA)
    • Audit tools and their usefulness in the enterprise
    • Capacity planning and monitoring techniques
    • The IS Audit Process
    • Information Technology Governance
    • Systems and Infrastructure Life Cycle Management
    • IT Service Delivery and Support
    • Protection of Information Assets
    • Disaster Recovery and Business Continuity
    • Introduction to the CISA Update Series
    • CISA Updates

    CISM ( Certified Information Security Manager )
    Course Fee: Course Training Fee: ? 25,000 + Service Tax ( Training, Books, E-Books, Tools & Softwares included )
    Course Duration: 4 days + 6 Hours Mock Test
    Top Instructors, 30 Hours of Hands On Labs, Hundreds of tools loaded onto VMs for you, Free Byte Code Certification for CISM
    Required Prerequisites: Basic Knowledge Of Internet
    Next Batch is going to start from 5th-Feb-2012 click here to register now
    The CISM curriculum covers a wide range of subject matter in a variety information technology audit topics, the examination is based on a
    compendium of industry best practices, including:
    • Information Security Governance
    • An information security steering group function
    • Legal and regulatory issues associated with Internet businesses, global transmissions and transborder data flows
    • Common insurance policies and imposed conditions
    • Information security process improvement
    • Recovery time objectives (RTO) for information resources
    • Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
    • Security metrics design, development and implementation.

    External vulnerability reporting sources
    • The key components of cost benefit analysis and enterprise migration plans
    • Privacy and tax laws and tariffs, data import/export restrictions, restrictions on cryptography, warranties, patents, copyrights, trade secrets, national security
    • CISM information classification methods
    • Life-cycle-based risk management principles and practices.
    • Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
    • Security baselines and configuration management in the design and management of business applications and the infrastructure.
    • Acquisition management methods and techniques
    • Evaluation of vendor service level agreements, preparation of contracts)
    • CISM question and answer review

    Address:
    Byte Code Cyber Securities
    72-B, 3rd Floor, Main Vikas Marg,
    Laxmi Nagar, New Delhi - 110092
    Last edited by MariPriya; February 23rd, 2012 at 03:16 PM.