February 10th, 2012, 11:44 AM
Post Count Number #1
www.bytec0de.com Byte Code Cyber Securities New Delhi : CISA Training
Name Of Training Institute : Byte Code Cyber Securities (bytec0de.com)
Location of the Institute: New Delhi
Training Offered : CISA Training
http://www.bytec0de.com/cisa-cism-training.html
CISA ( Certified Information Security Auditor ) Training
Course Fee: Course Training Fee: 25,000 + Service Tax ( Training, Books, E-Books, Tools & Softwares included )
Course Duration: 4 days + 6 Hours Mock Test
Top Instructors, 30 Hours of Hands On Labs, Hundreds of tools loaded onto VMs for you, Free Byte Code Certification For CISA
Required Prerequisites: Basic Knowledge Of Internet
The CISA curriculum covers a wide range of subject matter in a variety information technology audit topics, the examination is based on a
compendium of industry best practices, including:
• Information Systems Auditing Standards, Guidelines and Procedures and Code of Professional Ethics
• Control objectives and controls related to Information Systems
• Acceptable Procedures used to store, retrieve, transport, and dispose of confidential information assets
• Information Systems auditing practices and techniques
• Information Technology governance frameworks
• Quality management strategies and policies
• Risk management methodologies and tools
• Use of control frameworks (i.e., CobiT, ISO and ITIL)
• Monitoring and reporting of Information Technology performance, establishing metrics
• Use of maturity and process improvement models (i.e., CMM, CobiT)
• Contracting strategies, processes and contract management practices
• Control objectives and techniques that ensure the completeness, accuracy, validity, and authorization of transactions and data within IT systems applications
• Enterprise architecture design related to data, applications, and technology
• Acquisition and contract management processes
• System development methodologies and tools and an understanding of their strengths and weaknesses
• Data conversion tools, techniques, and procedures
• Business Impact Analysis (BIA)
• Audit tools and their usefulness in the enterprise
• Capacity planning and monitoring techniques
• The IS Audit Process
• Information Technology Governance
• Systems and Infrastructure Life Cycle Management
• IT Service Delivery and Support
• Protection of Information Assets
• Disaster Recovery and Business Continuity
• Introduction to the CISA Update Series
• CISA Updates
CISM ( Certified Information Security Manager )
Course Fee: Course Training Fee: ? 25,000 + Service Tax ( Training, Books, E-Books, Tools & Softwares included )
Course Duration: 4 days + 6 Hours Mock Test
Top Instructors, 30 Hours of Hands On Labs, Hundreds of tools loaded onto VMs for you, Free Byte Code Certification for CISM
Required Prerequisites: Basic Knowledge Of Internet
Next Batch is going to start from 5th-Feb-2012 click here to register now
The CISM curriculum covers a wide range of subject matter in a variety information technology audit topics, the examination is based on a
compendium of industry best practices, including:
• Information Security Governance
• An information security steering group function
• Legal and regulatory issues associated with Internet businesses, global transmissions and transborder data flows
• Common insurance policies and imposed conditions
• Information security process improvement
• Recovery time objectives (RTO) for information resources
• Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
• Security metrics design, development and implementation.
External vulnerability reporting sources
• The key components of cost benefit analysis and enterprise migration plans
• Privacy and tax laws and tariffs, data import/export restrictions, restrictions on cryptography, warranties, patents, copyrights, trade secrets, national security
• CISM information classification methods
• Life-cycle-based risk management principles and practices.
• Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
• Security baselines and configuration management in the design and management of business applications and the infrastructure.
• Acquisition management methods and techniques
• Evaluation of vendor service level agreements, preparation of contracts)
• CISM question and answer review
Address:
Byte Code Cyber Securities
72-B, 3rd Floor, Main Vikas Marg,
Laxmi Nagar, New Delhi - 110092
Last edited by MariPriya; February 23rd, 2012 at 03:16 PM.