2. ISO 27001 Lead Auditor
In this five day course certified to IRCA* guidelines, our experienced tutors will
teach you how to lead, plan, execute and report on an audit of an ISMS in an
organization assessing its conformance with ISO/IEC 27001:2013.
Average Satisfaction Score - Information Security Lead Auditor training course
To attend this course, you should already have knowledge of the key
Plan-Do-Check-Act (PDCA) cycle within management systems. You should also
have knowledge of Information Security Management principles, concepts and
specifically the requirements of ISO/IEC 27001:2013.
3. EC Council CEH v8
CEHv8 is a comprehensive Ethical Hacking and Information Systems Security
Auditing program, suitable for candidates who want to acquaint themselves with
the latest security threats, advanced attack vectors, and practical real time
demonstrations of the latest hacking techniques, methodologies, tools, tricks,
and security measures.
4. CCSK
The CCSK lets the marketplace know you are ready for the challenge with the
first credential dedicated to cloud security, offered by the world’s thought leader
in cloud security.
As enterprises and consumers move greater amounts of sensitive information to
the cloud, employers struggle to find information security leaders who have the
necessary breadth and depth of knowledge to establish cloud security programs
protecting sensitive information.
5. CHFI
EC-Council’s CHFI certifies individuals in the specific security discipline of
computer forensics from a vendor-neutral perspective. The CHFI certification will
fortify the application knowledge of law enforcement personnel, system
administrators, security officers, defense and military personnel, legal
professionals, bankers, security professionals, and anyone who is concerned
about the integrity of the network infrastructure.
6. RHCSS
A Red Hat Certified Security Specialist (RHCSS) is a Red Hat Certified Engineer
(RHCE®) whose status is current and who are these Red Hat Certified
Specialists:
7. CCIE Security
The Cisco Certified Internetwork Expert Security (CCIE Security) program
recognizes security experts who have the knowledge and skills to architect,
engineer, implement, troubleshoot, and support the full suite of Cisco security
technologies and solutions using the latest industry best practices to secure
systems and environments against modern security risks, threats, vulnerabilities,
and requirements.
8. CRISC
CRISC is the only certification that prepares and enables IT professionals for the
unique challenges of IT and enterprise risk management, and positions them to
become strategic partners to the enterprise.
The American National Standards Institute (ANSI) has accredited the CRISC
certification program under ISO/IEC 17024:2012, General Requirements for
Bodies Operating Certification Systems of Persons.
9. ISMS LA
In this five day course certified to IRCA* guidelines, our experienced tutors will
teach you how to lead, plan, execute and report on an audit of an ISMS in an
organization assessing its conformance with ISO/IEC 27001:2013.
Average Satisfaction Score - Information Security Lead Auditor training course
To attend this course, you should already have knowledge of the key
Plan-Do-Check-Act (PDCA) cycle within management systems. You should also
have knowledge of Information Security Management principles, concepts and
specifically the requirements of ISO/IEC 27001:2013.
10. COBIT
The power of COBIT 5 is in its breadth of tools, resources and guidance. The
value of COBIT 5 is in how it applies to your profession. COBIT 5 is now online,
search specific uses by topic area and bring the power and value of COBIT 5 to
your organization.
11. BS25999
ISO 22301, published in May 2012, is the new international standard for business
continuity management. This Standard effectively supersedes BS25999, which
has now been withdrawn.
12. ISO 27001
IT Governance are globally known as the authorities on ISO 27001. Our team
successfully led the world’s first ISO 27001 certification project.
13. BS 7799
BS 7799 was a standard originally published by BSI Group (BSI) [1]in 1995. It was
written by the United Kingdom Government's Department of Trade and Industry
(DTI), and consisted of several parts.
14. ISO 20000
ISO/IEC 20000, often referred to simply as ISO 20000, is the international IT
service management (ITSM) standard that enables IT organisations (whether
in-house, outsourced or external) to ensure that their ITSM processes are aligned
both with the needs of the business and with international best practice.
15. CeISB
Institute of Banking & Finance provides CERTIFICATE EXAMINATION IN CeISB
Course. During This program Students can learn all the aspects of CERTIFICATE
EXAMINATION IN CeISB.
16. JNCP
The Juniper Networks Certification Program (JNCP) Junos Security certification
track is a program that allows participants to demonstrate competence with
Juniper Networks technology. Successful candidates demonstrate thorough
understanding of security technology in general and Junos software for SRX
Series devices.
17. CS-MARS
Identifying threats on the Cisco network by "learning" the topology, configuration,
and behavior of your environment
Making precise recommendations for threat mitigation, including the ability to
visualize the attack path and identify the source of the threat
Simplifying incident management and response through integration with Cisco
Security Manager security management software
18. ISO 27001
Developed by global ISO 27001 experts Alan Calder and Steve Watkins, and
drawing on their industry-leading implementation guide IT Governance – An
International Guide to Data Security and IS027001/ISO27002, this three-day
course covers all nine of the key steps involved in planning, implementing and
maintaining an ISO 27001-compliant ISMS.
19. ISO 9000
ISO 9000 is a set of international standards on quality management and quality
assurance developed to help companies effectively document the quality system
elements to be implemented to maintain an efficient quality system. They are
not specific to any one industry and can be applied to organizations of any size.
20. Check Point Certified Security Administrator
Advance your knowledge on the GAiA operating system! 3-day course covers
everything you need to start-up, configure and manage daily operations of Check
Point Security Gateway and Management Software Blades systems on the GAiA
operating system.
21. CSSLP
As a CSSLP, you have an internationally-recognized ability to incorporate security
practices — authentication, authorization and auditing — into each phase of the
software development lifecycle (SDLC). The CSSLP shows you can:
22. ITIL
ITIL is the most widely accepted approach to IT service management in the
world. ITIL can help individuals and organizations use IT to realize business
change, transformation and growth.
23. CASP
CompTIA Advanced Security Practitioner (CASP) meets the growing demand for
advanced IT security in the enterprise. Recommended for IT professionals with
at least 5 years of experience, CASP certifies critical thinking and judgment
across a broad spectrum of security disciplines and requires candidates to
implement clear solutions in complex environments.
24. QSA
Qualified Security Assessor (QSA) companies are independent security
organizations that have been qualified by the PCI Security Standards Council to
validate an entity’s adherence to PCI DSS. QSA Employees are individuals who
are employed by a QSA Company and have satisfied and continue to satisfy all
QSA Requirements.
25. PA-QSA
Payment Application Qualified Security Assessor (PA-QSA) Companies are
organizations that have been qualified by the PCI Security Standards Council to
perform PA-DSS Assessments for PA-DSS Program purposes. PA-QSA
Employees are individuals who are employed by a PA-QSA Company and have
satisfied all PA-QSA Qualification Requirements applicable to employees of
PA-QSA Companies who will conduct PA-DSS Assessments, as described in
further detail in the PA-QSA Qualification Requirements.
26. ASV
The PCI Security Standards Council maintains a structured process for security
solution providers to become Approved Scanning Vendors (ASVs), as well as to
be re-approved each year. The five founding members of the Council recognize
the ASVs certified by the PCI Security Standards Council as being qualified to
validate adherence to the PCI DSS by performing vulnerability scans of Internet
facing environments of merchants and service providers.
27. Trend Micro Certified Professional
The Trend Micro Certified Professional designation is intended for consultants
who work with Trend Micro product solutions in enterprise environments.
Successful candidates demonstrate the knowledge necessary to successfully
install, deploy, scale, and manage a product, along with a solid foundation in
basic concepts including public/private/hybrid clouds, multi-tenancy, and cloud
security.
28. IT Management
IT management is the process of overseeing all matters related to information
technology operations and resources within an IT organization.
29. GIAC Penetration Tester (GPEN)
The GPEN certification is for security personnel whose job duties involve
assessing target networks and systems to find security vulnerabilities.
Certification objectives include penetration-testing methodologies, the legal
issues surrounding penetration testing and how to properly conduct a
penetration test as well as best practice technical and non-technical techniques
specific to conduct a penetration test.
30. Offensive Security Certified Professional
The Offensive Security Certified Professional (OSCP) is the companion
certification for our Penetration Testing with Kali Linux training course and is the
world’s first completely hands-on offensive information security certification.
The OSCP challenges the students to prove they have a clear and practical
understanding of the penetration testing process and life-cycle through an
arduous twenty-four (24) hour certification exam.
31. ISACA CISA
The CISA designation is a globally recognized certification for IS audit control,
assurance and security professionals. Being CISA-certified showcases your audit
experience, skills and knowledge, and demonstrates you are capable to assess
vulnerabilities, report on compliance and institute controls within the enterprise.
32. GIAC Security Essentials (GSEC)
This certification is designed for candidates who want to demonstrate skills in IT
systems roles with respect to security tasks. Ideal candidates for this
certification possess an understanding of information security beyond simple
terminology and concepts.
33. Cambridge Certified Security Associates
● Over 14 years of sustainable education in IT & Management.
● Over 1,20,000 certified professionals worldwide.
● Certified Professionals serving more than 1000 companies worldwide.
● Only institution in India providing Network Security courses at university
level.
● Strong Research & development center for introducing innovative
technology products.
34. CISSP
(ISC)² certifications are globally acknowledged as the Gold Standard in for
educating and certifying information security professionals. (ISC)2 provides
certification in areas such as information security, system security, authorization,
software development, digital forensics and healthcare. The two key
certifications are Certified Information Systems Security Professional (CISSP)
and Systems Security Certified Practitioner (SSCP).
35. SSCP
This certification is designed for candidates interested in the field of information
security. The ideal candidates are those who are information assurance
professionals and know how to define the information system architecture,
design, management and controls that can assure the security of business
environments.
36. CISM
The key certifications offered by ISACA are Certified Information Security
Manager (CISM) and Certified Information Systems Auditor (CISA). Other
certifications offered include Certified in the Governance of Enterprise IT (CGEIT)
and Certified in Risk and Information Systems Control (CRISC).
37. CompTIA Security+
CompTIA is the leading provider of vendor-neutral IT certifications, offering 16
certification exams in PC support, networking, servers, Linux, security, cloud,
mobile and more. CompTIA provides certification series that test various
knowledge standards, from entry-level to expert. For security specifically,
CompTIA offers the CompTIA Security+ certification.
38. CWSP
The CWSP certification is a professional level wireless LAN certification that
ensures candidates have the skills to successfully secure enterprise Wi-Fi
networks from hackers, without dependency on the brand of Wi-Fi gear deployed
in the organization.
39. CNSSI
The Committee on National Security Systems is a United States
intergovernmental organization that sets policy for the security of the US security
systems.
40. CQA
The Certified Quality Auditor is a professional who understands the standards
and principles of auditing and the auditing techniques of examining, questioning,
evaluating and reporting to determine a quality system's adequacy and
deficiencies. The Certified Quality Auditor analyzes all elements of a quality
system and judges its degree of adherence to the criteria of industrial
management and quality evaluation and control systems.
41. CSQA
Acquiring the designation of Certified Software Quality Analyst (CSQA) indicates
a professional level of competence in the principles and practices of quality
assurance in the IT profession. CSQA’s become members of a recognized
professional group and receive recognition of their competence by business and
professional associates, potentially more rapid career advancement, and greater
acceptance in the role as advisor to management.
42. QMS
A quality management system (QMS) is a set of policies, processes and
procedures required for planning and execution
(production/development/service) in the core business area of an organization.
(i.e. areas that can impact the organization’s ability to meet customer
requirements.) ISO 9001 is an example of a Quality Management System.
43. DISA RME
DISA Risk Management Executive (RME) develops and maintains Security
Requirements Guides (SRGs) and Security Technical Implementation Guides
(STIGs) which provide the DOD with operationally implementable secure
configuration guidance. These guides are used for the Command Cyber
Readiness Inspections (CCRIs) and Assessment and Authorization (A&A)
activities, as well as vendor product development.
44. CPFA
The term Cyber Crime no longer refers only to hackers and other external
attackers. Almost all every case of financial fraud or employee misuse involves a
very strong element of computer-based evidence. NII Consulting has been
providing professional computer forensics, cyber breach investigation, incident
detection and response services to clients for more than 5 years. It now brings
together its consolidated expertise into a four-day hands-on training on Certified
Professional Forensic Analyst (CPFA).
45. CCSC
The Cisco Cybersecurity Specialist certification recognizes security
professionals who have attained specialized in-depth expertise and proven
knowledge in the essential areas of proactive cyber threat detection and
mitigation.
46. PCI DSS
The PCI Security Standards Council touches the lives of hundreds of millions of
people worldwide. A global organization, it maintains, evolves and promotes
Payment Card Industry standards for the safety of cardholder data across the
globe.
47. CPT
It is for this reason that the CEH and CPT certification courses were developed.
CEH stands for Certified Ethical Hackers and CPT stands for Certified
Penetration Testers. There are marked differences between these courses even
though they seem somewhat similar. They are often offered together for
effectiveness however in discovering all the hidden problems with a system that
a hacker can use to their advantage.
48. CCSS
The Ohio State University requires all devices connected to university network
resources to be compliant with the Client Computer Security Standard (CCSS)
document. The CCSS consists of four components:
49. CDCS
The CDCS has been developed in consultation with industry experts to make
sure that the qualification reflects best practice. It was created by the
International Financial Services Association (IFSA) and The London Institute of
Banking & Finance and was first examined in 1999. CDCS is now managed by
The London Institute of Banking & Finance in partnership with the International
Chamber of Commerce (ICC).
50. CIPP
The IAPP offers the most encompassing, up-to-date and sought-after global
training and certification program for privacy and data protection. The Certified
Information Privacy Professional (CIPP) helps organizations around the world
bolster compliance and risk mitigation practices, and arms practitioners with the
insight needed to add more value to their businesses.
51. “
“No Problem can be solved from the
same level of consciousness that created
it..you must learn to see the world a
new”
”- Albert Einstein