Certified in Risk and Information Systems Control – CRISC
ISACA’s Certified in Risk and Information Systems Control (CRISC®) certification …
What you'll learn
Prepare for the Certified in Risk and Information Systems Control exam.
Understanding enterprise risk.
Plan, execute, scrutinize and retain information systems controls.
Risk: identification, evaluation, assessment, response, and monitoring.
IS control design and execution.
IS control maintenance and monitoring.
ITIL 4 Managing Professional Transition Module
As the title implies, the ITIL 4® Managing Professional Transition …
What you'll learn
Understand the key concepts of service management
Understand how the ITIL guiding principles can help an organization adopt and adapt service management
Understand the four dimensions of service management
Understand the purpose and components of the ITIL service value system
Understand the activities of the service value chain, and how they interconnect
Describe the interconnected nature of the service value chain and how this supports value streams
TOGAF® 9 Combined level 1 and level 2
‘The Open Group Architecture Framework’, or ‘TOGAF’, offers a comprehensive, …
What you'll learn
The Architecture Development Method
Adapting TOGAF to the Context
Architecture principles and Requirements
Architecture Vision
Stakeholder Management and Risk Management
Security architecture
Enterprise Integration and Service Oriented Architecture
Enterprise Continuum and architecture repository
Architecture Content framework
Business Architecture Phase
Information system Architecture
Technology Architecture
Transition planning
Building organization capability
Architecture Governance
ITIL® 4 Foundation Certification
An ITIL Foundation certification is a stepping stone to a …
What you'll learn
An overview of ITIL 4 guiding principles
Identifying opportunities to implement IT best practices using ITIL 4 framework
ITIL 4 terminology and concepts and use similar language with other IT teams
Service value system
Service value chain activities and how they interconnect with other processes
4 new dimensions of Service Management
Understanding the importance of IT services and business integration
Continual Improvement and its benefits
How to clear your ITIL 4 Foundation exam on the first attempt
Certified Information Security Manager – CISM
ISACA’s Certified Information Security Manager (CISM) certification indicates expertise in …
Certified Information Systems Auditor – CISA
Validate your expertise and get the leverage you need to …
What you'll learn
Validate your expertise and move up in your career as an information systems auditor
Achieve a world-renowned standard through CISA certification for auditing, monitoring, and assessing enterprise IT systems
Get instant recognition with CISA from stakeholders, external auditors, regulators, and other professionals
Kickstart your Information Systems Auditor career with a globally-acknowledged CISA certification from ISACA
Create effective teams that adhere to enterprise objectives through heightened control and monitoring
Achieve a minimum of 22% salary increase through CISA credential
Be part of an esteemed group of over 150K+ CISA certified professionals globally
Certified Ethical Hacker – CEH v11
CEH stands for Certified Ethical Hacker, and it is arguably …
What you'll learn
The step-by-step process and tactics utilized by hackers to penetrate systems
Trojans, backdoors, and countermeasures to stop attacks
Powershell, Oracle databases, hacking SQL, Apache Web servers, and more
Network, mobile application security, and assess threats and vulnerabilities
Information assurance and managing information security
Advanced hacking concepts, smartphone hacking, writing virus codes, corporate espionage, and reverse engineering
IDS, firewalls, wireless hacking, and more
Certified Information Systems Security Professional – CISSP
Certified Information Systems Security Professional (CISSP) is one of the …
What you'll learn
A holistic understanding of information security aspects in an organization
Defining the architecture, design, and management of IT security
Necessary skills required to become a CISSP certified professional
Gain a thorough understanding of all the 8 domains prescribed in the ISC2 CISSP Common Body of Knowledge (CBK)
Optimizing security operations in an enterprise
Access control systems and various methodologies that complement IT Security and governance for an enterprise
- 1
- 2