Name Of Training Institute : Byte Code Cyber Securities (bytec0de.com)
Location of the Institute: New Delhi
Training Offered : CISA Training
http://www.bytec0de.com/cisa-cism-training.html
CISA ( Certified Information Security Auditor ) Training :
Course Fee: Course Training Fee: 25,000 + Service Tax ( Training, Books, E-Books, Tools & Softwares included )
Course Duration: 4 days + 6 Hours Mock Test
Top Instructors, 30 Hours of Hands On Labs, Hundreds of tools loaded onto VMs for you, Free Byte Code Certification For CISA
Required Prerequisites: Basic Knowledge Of Internet
The CISA curriculum covers a wide range of subject matter in a variety information technology audit topics, the examination is based on a
compendium of industry best practices, including:
** Information Systems Auditing Standards, Guidelines and Procedures and Code of Professional Ethics
** Control objectives and controls related to Information Systems
** Acceptable Procedures used to store, retrieve, transport, and dispose of confidential information assets
** Information Systems auditing practices and techniques
** Information Technology governance frameworks
** Quality management strategies and policies
** Risk management methodologies and tools
** Use of control frameworks (i.e., CobiT, ISO and ITIL)
** Monitoring and reporting of Information Technology performance, establishing metrics
** Use of maturity and process improvement models (i.e., CMM, CobiT)
** Contracting strategies, processes and contract management practices
** Control objectives and techniques that ensure the completeness, accuracy, validity, and authorization of transactions and data within IT systems applications
** Enterprise architecture design related to data, applications, and technology
** Acquisition and contract management processes
** System development methodologies and tools and an understanding of their strengths and weaknesses
** Data conversion tools, techniques, and procedures
** Business Impact Analysis (BIA)
** Audit tools and their usefulness in the enterprise
** Capacity planning and monitoring techniques
** The IS Audit Process
** Information Technology Governance
** Systems and Infrastructure Life Cycle Management
** IT Service Delivery and Support
** Protection of Information Assets
** Disaster Recovery and Business Continuity
** Introduction to the CISA Update Series
** CISA Updates
CISM ( Certified Information Security Manager ) :
Course Fee: Course Training Fee: ? 25,000 + Service Tax ( Training, Books, E-Books, Tools & Softwares included )
Course Duration: 4 days + 6 Hours Mock Test
Top Instructors, 30 Hours of Hands On Labs, Hundreds of tools loaded onto VMs for you, Free Byte Code Certification for CISM
Required Prerequisites: Basic Knowledge Of Internet
Next Batch is going to start from 5th-Feb-2012 click here to register now
The CISM curriculum covers a wide range of subject matter in a variety information technology audit topics, the examination is based on a
compendium of industry best practices, including:
** Information Security Governance
** An information security steering group function
** Legal and regulatory issues associated with Internet businesses, global transmissions and transborder data flows
** Common insurance policies and imposed conditions
** Information security process improvement
** Recovery time objectives (RTO) for information resources
** Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
** Security metrics design, development and implementation.
External vulnerability reporting sources :
** The key components of cost benefit analysis and enterprise migration plans
** Privacy and tax laws and tariffs, data import/export restrictions, restrictions on cryptography, warranties, patents, copyrights, trade secrets, national security
** CISM information classification methods
** Life-cycle-based risk management principles and practices.
** Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
** Security baselines and configuration management in the design and management of business applications and the infrastructure.
** Acquisition management methods and techniques
** Evaluation of vendor service level agreements, preparation of contracts)
** CISM question and answer review
Contact Us :
Byte Code Cyber Securities
72-B, 3rd Floor, Main Vikas Marg,
Laxmi Nagar, New Delhi – 110092