<?xml version="1.0" encoding="UTF-8"?><rss
version="2.0"	xmlns:content="http://purl.org/rss/1.0/modules/content/"	xmlns:wfw="http://wellformedweb.org/CommentAPI/"	xmlns:dc="http://purl.org/dc/elements/1.1/"	xmlns:atom="http://www.w3.org/2005/Atom"	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"	xmlns:slash="http://purl.org/rss/1.0/modules/slash/">	<channel><title>Laimoon.com</title><link>https://courses.laimoon.com/sitemap/rss</link>	    <description>Courses in Dubai, Abu Dhabi, Sharjah Diplomas, Degrees &amp; Doctorates - Laimoon Course Guide</description>	    <language>en-us</language>	    	    	    						<item><title><![CDATA[Cybersec First Responder CFR-410  - emt Academy  , Dubai ]]></title><link>https://courses.laimoon.com/course/cybersec-first-responder-cfr-410-emt-academy/online</link>				  <description>				  <![CDATA[						<strong>CyberSec First Responder (CFR-410)</strong><br
/><strong>Course Length</strong>: 5 days<br
/><strong>Location: </strong>Dubai Silicon Oasis, Dubai - UAE<br
/><strong>Overview</strong>:&nbsp;<br
/>This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT&#39;s National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination, NIST (Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations). It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization&#39;s security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.<br
/>This course is designed to assist students in preparing for the CertNexus CyberSec First Responder <strong>(Exam CFR-410)</strong> certification examination. What you learn and practice in this course can be a significant part of your preparation.<br
/><strong>Course Objectives:</strong><br
/>In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will:<ul><li>Assess cybersecurity risks to the organization</li><li>Analyze the threat landscape. &nbsp;</li><li>Analyze various reconnaissance threats to computing and network environments.</li><li>Analyze various attacks on computing and network environments.</li><li>Analyze various post-attack techniques.</li><li>Assess the organization&#39;s security posture through auditing, vulnerability management, and penetration testing.</li><li>Collect cybersecurity intelligence from various network-based and host-based sources. Copyright 2021 CertNexus. All Rights Reserved</li><li>Analyze log data to reveal evidence of threats and incidents.</li><li>Perform active asset and network analysis to detect incidents.</li><li>Respond to cybersecurity incidents using containment, mitigation, and recovery tactics.</li><li>Investigate cybersecurity incidents using forensic analysis techniques.</li></ul><p>Cost: 6000 AED</p><p>Duration: 3 Days</p>					]]>				  </description>				  <pubDate>Tue, 17 Jan 2023 18:06:21 +04</pubDate>				</item> 								<item><title><![CDATA[CISSP Certification  - Learners Point Training Institute , UAE, Dubai,Dubai,Bahrain,Oman,Qatar,Saudi Arabia,United Arab Emirates,Kuwait ]]></title><link>https://courses.laimoon.com/course/part-time-cissp-certification-learners-point-training-institute/online</link>				  <description>				  <![CDATA[						<strong>OVERVIEW: </strong>The Certified Information Systems Security Professional CISSP certification is recognized around the world as a mark of expertise for professionals working in Information Technology Security. The CISSP certification training in Dubai develops the expertise of professionals in defining IT architecture. This CISSP training enhances professionals&#39; skills in designing, creating, and maintaining secure business environments using globally approved information security standards.<br
/><br
/><strong>CAREER OPPORTUNITIES:<br
/><br
/>Market Trends:</strong> In today&#39;s information age, networks have become increasingly interconnected, making cyberattacks and their prevention more challenging. In 2020, cyber crimes have increased by 600% boosting the need for information security experts. The global cybersecurity market has been valued at USD billion in 2020, growing at a CAGR of McKinsey &amp; Company found that only 16% of executives believe their organizations are well prepared to deal with cyber risks, showing the huge dearth of information security management. As this data indicates, professionals with CISSP certification in Dubai have numerous career options.<br
/><br
/><strong>Salary Trends:</strong> Cybercrimes have become prevalent in this age of information technology, making cybersecurity jobs one of the most lucrative careers with hefty salaries. According to Burning Glass, 59% of all cybersecurity positions require at least one certification, among which the CISSP certification is most sought after. Due to the high demand for CISSP - certified professionals in the job market, they command a premium on their salaries. In the UAE, the average salary for professionals with CISSP certification is AED 308,000 per annum.<br
/><br
/><strong>Demand and Opportunities: </strong>The Internet and computers are now an integral part of any organization, so security against data breaches is an extremely crucial issue, which drives the demand for IT security professionals. The Bureau of Labor Statistics reports that employment of Information Security Analysts is increasing at a rate of 33%, which is much higher than all other occupations. In 2021, the cost of cybercrime is expected to amount to $6 trillion, leading to the creation of million cybersecurity jobs. From the data above it can be observed that there is a massive demand for cybersecurity professionals with CISSP certification in Dubai.<br
/><br
/><strong>COURSE OUTLINE:</strong><br
/><br
/>Security and Risk Management<ul><li>Security Governance Principles</li><li>Compliance</li><li>Professional Ethics</li><li>Security Documentation</li><li>Risk Management</li><li>Threat Modeling</li><li>Business Continuity Plan Fundamentals</li><li>Acquisition Strategy and Practice</li><li>Personnel Security Policies</li><li>Security Awareness and Training</li></ul>Asset Security<ul><li>Asset Classification</li><li>Privacy Protection</li><li>Asset Retention</li><li>Data Security Controls</li><li>Secure Data Handling</li></ul>Security Engineering<ul><li>Security in the Engineering Lifecycle</li><li>System Component Security</li><li>Security Models</li><li>Controls and Countermeasures in Enterprise Security</li><li>Information System Security Capabilities</li><li>Design and Architecture Vulnerability Mitigation</li><li>Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems</li><li>Cryptography Concepts</li><li>Cryptography Techniques</li><li>The site and Facility Design for Physical Security</li><li>Physical Security Implementation in Sites and Facilities</li></ul>Communications and Network Security<ul><li>Network Protocol Security</li><li>Network Components Security</li><li>Communication Channel Security</li><li>Network Attack Mitigation</li></ul>Identity and Access Management<ul><li>Physical and Logical Access Control</li><li>Identification, Authentication, and Authorization</li><li>Identity as a Service</li><li>Authorization Mechanisms</li><li>Access Control Attack Mitigation</li></ul>Security Assessment and Testing<ul><li>System Security Control Testing</li><li>Software Security Control Testing</li><li>Security Process Data Collection</li><li>Audits</li></ul>Security Operations<ul><li>Security Operations Concepts</li><li>Physical Security</li><li>Personnel Security</li><li>Logging and Monitoring</li><li>Preventative Measures</li><li>Resource Provisioning and Protection</li><li>Patch and Vulnerability Management</li><li>Change Management</li><li>Incident Response</li><li>Investigations</li><li>Disaster Recovery Planning</li><li>Disaster Recovery Strategies</li><li>Disaster Recovery Implementation</li></ul><strong>KEY TAKEAWAYS:</strong><br
/><br
/>Successful completion of our CISSP course in Dubai will enable candidates to:<ul><li>Understand the fundamentals of communication and network security</li><li>Reduce security risks by recognizing and mitigating them</li><li>Identify network-based attacks</li><li>Manage threats, data assets, and principles pertaining to data security</li><li>Oversee the information technology security in a corporate setting</li></ul><strong>ACCREDITATION:</strong><br
/><br
/>Our CISSP training in Dubai is accredited by ISO 9001: 2015 and the Knowledge and Human Development Authority (KHDA).<br
/><br
/><strong>ALUMNI:</strong> Our academy graduates are successfully placed in some of the top-notch companies in Dubai like Jumeirah, Aramex, Airarabia, Damac, Emaar, etc. They are entrepreneurs, career changers, and lifelong learners.<br
/><br
/><strong>WHY LEARNER&rsquo;S POINT:</strong><br
/><br
/>Being the leading providers of the CISSP course in Dubai, we have substantial experience in delivering relevant skills and knowledge to prepare for CISSP certification in Dubai.<br
/>Our CISSP certification course offers the following advantages:<ul><li>Our CISSP training is designed based on real-world scenarios, formulating and evaluating practical requirements</li><li>Our CISSP courses strive to provide a reality check and insight into the requirements of a challenging role and how to fulfill it</li><li>We also provide live interactive sessions and hands-on experience through assignments associated with the actual work environment</li><li>To enhance the learning experience of our students we provide organized group sessions and integrated training modules</li><li>Our discrete approach to career guidance enables our students to get successfully placed in renowned organizations</li></ul><p>Cost: 7500 AED</p><p>Discount: 50% Off for Laimoon Users!</p><p>Duration: 34 Hours</p>					]]>				  </description>				  <pubDate>Mon, 08 Nov 2021 14:47:16 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Ethical Hacker CEH V11  - Learners Point Training Institute , UAE, Dubai,Dubai,Bahrain,Egypt,Iraq,Jordan,Kuwait,Oman,Saudi Arabia,United Arab Emirates,Yemen,Qatar ]]></title><link>https://courses.laimoon.com/course/part-time-certified-ethical-hacker-ceh-v11-learners-point-training-institute/online</link>				  <description>				  <![CDATA[						<strong>OVERVIEW: </strong>The Certified Ethical Hacker course provides professionals with the skills required to master the techniques hackers exploit to hack into networks and defend against them. The Certified Ethical Hacker CEH training Dubai trains professionals on the utilization of advanced methodologies to protect corporate infrastructure from data breaches, such as reverse engineering and creating virus codes.<br
/><br
/><strong>CAREER OPPORTUNITIES:<br
/><br
/>Market Trends:</strong> Due to the proliferation of cybercrime in recent years, the demand for cybersecurity professionals and ethical hackers has grown significantly. The 2020 IBM Cost of a Data Breach Report indicates that the average cost of a data breach is approximately $ million. By 2029, the Bureau of Labor Statistics predicts the rate of employment of Ethical Hackers to rise by 31%. The unprecedented rise in cybercrimes and data breaches has prompted significant growth in job opportunities for professionals with CEH certification in Dubai.<br
/><br
/><strong>Salary Trends: </strong>As the IT security industry sets its feet in the UAE, recruiters are also placing a premium on professionals with CEH certification in Dubai and providing competitive salaries. It was found that professionals with Ethical Hacker certification earn 44% higher salaries than non - certified professionals. Professionals with CEH certification in Dubai in the United Arab Emirates typically earn a monthly income of 16,700 AED, which can rise to 25,200 AED depending on the level of experience.<br
/><br
/><strong>Demand and Opportunities: </strong>The digital revolution has led to the emergence of new concerns about security and privacy, which in turn has led to a rise in the demand for CEH certified professionals. There has been an unexpected growth of 75% in the industry for ethical hackers, a much higher rate than the rest of the occupations. Employers, who are increasingly threatened by data breaches and hacking, are highly motivated to hire qualified ethical hackers to secure their business&#39;s private data, thus fueling the demand for ethical hackers.<br
/><br
/><strong>COURSE OUTLINE:</strong><ul><li>Introduction to Ethical Hacking</li><li>Footprinting and Reconnaissance</li><li>Social Engineering</li><li>Denial-of-Service</li><li>Session Hijacking</li><li>Evading IDS, Firewalls, and Honeypots</li><li>Hacking Web Servers</li><li>Hacking Web Applications</li><li>SQL Injection</li><li>Scanning Networks</li><li>Enumeration</li><li>Vulnerability Analysis</li><li>System Hacking</li><li>Malware Threats</li><li>Sniffing</li><li>Hacking Wireless Networks</li><li>Hacking Mobile Platforms</li><li>IoT and OT Hacking</li><li>Cloud Computing</li><li>Cryptography</li></ul><strong>KEY TAKEAWAYS:</strong><br
/><br
/>Successful completion of our CEH V11 training enables candidates to:<ul><li>Become familiar with concepts of ethical hacking, information security, and security controls</li><li>Scan networks, hosts, and ports with various scanning tools</li><li>List enumeration techniques such as enumerating NFS shares, and querying DNS caches, and describe the countermeasures</li><li>Identify firewalls and intrusion detection systems, their functions, and strategies for protecting against intrusion</li><li>Learn offensive techniques for obtaining, escalating, and maintaining access to the victim while covering the tracks</li></ul><strong>ACCREDITATION:</strong><br
/><br
/>Our Certified Ethical Hacker course is accredited by ISO 9001: 2015 and the Knowledge and Human Development Authority (KHDA).<br
/><br
/><strong>ALUMNI: </strong>Our academy graduates of Ethical Hacking training Dubai are successfully placed in some of the top-notch companies in Dubai like Jumeirah, Aramex, Airarabia, Damac, Emaar, etc. They are entrepreneurs, career changers, and lifelong learners.<br
/><br
/><strong>WHY LEARNER&rsquo;S POINT:</strong><br
/><br
/>Being the leading providers of the Certified Ethical Hacker CEH course in Dubai, we have substantial experience in teaching relevant skills and knowledge.<br
/>Our CEH V11 training course offers the following benefits:<ul><li>Our Certified Ethical Hacker course is designed based on real-world scenarios, formulating and evaluating practical requirements</li><li>Our CEH courses in Dubai strive to provide a reality check and insight into the requirements of a challenging role and how to fulfill it</li><li>Certified Ethical Hacker course provides live interactive sessions and hands-on experience through assignments associated with the actual work environment</li><li>To enhance the learning experience of our students we provide organized group sessions and integrated training modules in our CEH training Dubai</li><li>Our discrete approach to career guidance enables our students to get successfully placed in a renowned organization</li></ul><p>Cost: 12000 AED</p><p>Discount: 50% Off for Laimoon Users!</p><p>Duration: 40 Hours</p>					]]>				  </description>				  <pubDate>Fri, 15 Oct 2021 07:05:06 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Security Manager  - LEORON Professional Development Institute , Dubai,Azerbaijan,Georgia,Kazakhstan,Oman,Saudi Arabia ]]></title><link>https://courses.laimoon.com/course/certified-information-security-manager-cism-leoron-professional-development-institute/online</link>				  <description>				  <![CDATA[						This CISM exam preparation seminar provides an overview and key points of all domains of the CISM exam. We offer the CISM exam preparation seminar in association with the ISACA Local ;<br
/>CISM Prep seminar covers four information security management areas, each further defined through Tasks &amp; Knowledge ;<br
/>These areas and statements were approved by the CISM Certification Committee and represent a job practice analysis of the work performed by information security managers as validated by prominent industry leaders, subject matter experts and industry practitioners.<p>Cost: 5670 USD</p><p>Duration: 4 Days</p>					]]>				  </description>				  <pubDate>Mon, 24 Feb 2020 15:47:10 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Security Manager (CISM)  - Delphi Star Training Centre , UAE, Dubai,Dubai,Abu Dhabi,Muscat,Saudi Arabia,United Arab Emirates,Riyadh,Oman,Jeddah,Bahrain,Egypt,Ethiopia,Kenya,Kuwait ]]></title><link>https://courses.laimoon.com/course/part-time-certified-information-security-manager-cism-delphi/online</link>				  <description>				  <![CDATA[						The ISACA governed Certified Information Security Manager (CISM) certification is the most sought-after certification in the Information Security arena. Established in 2002, the CISM is a management-focused globally renowned credential for professionals who create, build and administer enterprise security programs. This certification is a professional certification sponsored by the reputed Information Systems Audit and Control Association (ISACA).<br
/>The CISM certification training is intended towards professionals working in managerial, consulting or related views in IT operations or compliance. Several CISM Certified Professionals today are functioning in the capacities of IT Directors, Audit Directors, CIOs, CISOs, CEOs, CFOs and other leadership positions showcasing a good demand as well as career advancement potential of the credential.<br
/><br
/><strong>CISM Course Structure:</strong><ul><li>Area 1&mdash;Information Security Governance (24%)</li><li>Area 2&mdash;Information Risk Management (30%)</li><li>Area 3&mdash;Information Security Program Development and Management (27%)</li><li>Area 4&mdash;Information Security Incident Management (19%)</li></ul><p>Cost: 2799 AED</p><p>Duration: 20 To 40 Hours</p>					]]>				  </description>				  <pubDate>Tue, 22 Oct 2019 16:37:21 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Systems Security Professional (CISSP)  - Delphi Star Training Centre , UAE, Dubai,Dubai,Abu Dhabi,Muscat,Saudi Arabia,United Arab Emirates,Riyadh,Jeddah,Bahrain,Egypt,Ethiopia,Kenya,Kuwait,Oman,Sudan ]]></title><link>https://courses.laimoon.com/course/part-time-certified-information-systems-security-professional-cissp-delphi/online</link>				  <description>				  <![CDATA[						This course assists a learner in preparing, studying, and passing the Certified Information Systems Security Professional (CISSP) Cybersecurity Examination. The exam covers Eight domains of cybersecurity knowledge, including access control systems and methodology, network and telecommunications security, security management and practices, applications and systems development security, cryptography, security and architecture models, operations security, business continuity and disaster recovery planning, law, investigation, and ethics, as well as physical security.<br
/><br
/>The CISSP certification is essential for security professionals to be successful in their careers. Many employers value the CISSP for its designation as a standard for security professionals. While the investments in time and money are substantial, the career rewards can be respected as professionals with the CISSP are in need.<br
/><br
/><em>There will be 20 million job vacancies in cybersecurity by 2020.</em><br
/><br
/><strong>Become a cybersecurity professional this millennial!</strong><p>Cost: 3299 AED</p><p>Discount: 20% Off for Laimoon Users!</p><p>Duration: 30 To 50 Hours</p>					]]>				  </description>				  <pubDate>Tue, 22 Oct 2019 16:31:26 +04</pubDate>				</item> 								<item><title><![CDATA[ITIL (Information Technology Infrastructure Library)  - Delphi Star Training Centre , UAE, Dubai,Dubai,Abu Dhabi,Muscat,United Arab Emirates,Saudi Arabia,Riyadh,Jeddah,Oman ]]></title><link>https://courses.laimoon.com/course/part-time-itil-information-technology-infrastructure-libraby-delphi/online</link>				  <description>				  <![CDATA[<p><strong>ITIL Foundation Course:</strong><br>The&nbsp;Information Technology Infrastructure Library, popularly known as&nbsp;ITIL&nbsp;Certification is a framework based on industry best practices to apply IT Service Management Business Processes to IT Management.<br>Management of IT Services is all about long-term oversight. It's critical for firms that want to deliver products successfully to plan out and oversee each stage of a service's life-cycle. ITIL Foundation training gives students a knowledge base for each Service Area as they help their firms plan out projects from beginning to end.<br>For Network Administrators and other IT professionals, being able to implement ITIL could lead to more central and valued roles within their current Organizations. The way to gain those skills may be through the ITIL Foundation Certification program in Dubai.</p><p>Cost: 1200 AED</p><p>Duration: Upto 3 Days</p>					]]>				  </description>				  <pubDate>Thu, 26 Sep 2019 14:52:30 +04</pubDate>				</item> 								<item><title><![CDATA[CCNAX  - Learners Point Training Institute , UAE, Dubai,Dubai,Bahrain,Kuwait,Oman,Qatar,Saudi Arabia,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/ccnax-learners-point-training-institute/online</link>				  <description>				  <![CDATA[						CCNA is the one-exam entry level certification also known as &lsquo;Cisco Certified Network Associate Routing &amp; ; This course tests a candidate&#39;s knowledge and skills required to install, operate, and troubleshoot a small-to-medium size enterprise branch network.<br
/><br
/>Course Objectives<ul><li>To provide CCNAX preparation to students pursuing a Cisco certification. The training follows official outlined guides and course material provided by Cisco and is taught by trainers from within the profession</li></ul><strong>Course Modules</strong><br
/><br
/>Network Fundamentals<ul><li>Explain the role and function of network components</li><li>Describe the characteristics of network topology architectures</li><li>Compare physical interface and cabling types</li><li>Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)</li><li>Compare TCP to UDP</li><li>Configure and verify IPv4 addressing and subnetting</li><li>Describe the need for private IPv4 addressing</li><li>Configure and verify IPv6 addressing and prefix</li><li>Compare IPv6 address types</li><li>Verify IP parameters for Client OS (Windows, Mac OS, Linux)</li><li>Describe wireless principles</li><li>Explain virtualization fundamentals (virtual machines)</li><li>Describe switching concepts</li></ul><strong>Network Access</strong><ul><li>Configure and verify VLANs (normal range) spanning multiple switches</li><li>Configure and verify Interswitch connectivity</li><li>Course outline</li><li>Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)</li><li>Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)</li><li>Describe the need for and basic operations of Rapid PVST+</li><li>Spanning Tree Protocol and identify basic operations</li><li>Compare Cisco Wireless Architectures and AP modes</li><li>Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG)</li><li>Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)</li><li>Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings</li></ul><strong>IP Connectivity</strong><ul><li>Interpret the components of the routing table</li><li>Determine how a router makes a forwarding decision by default</li><li>Configure and verify IPv4 and IPv6 static routing</li><li>Configure and verify single area OSPFv2</li><li>Describe the purpose of the first-hop redundancy protocol</li></ul><strong>IP Services</strong><ul><li>Configure and verify inside source NAT using static and pools</li><li>Configure and verify NTP operating in a client and server mode</li><li>Explain the role of DHCP and DNS within the network</li><li>Explain the function of SNMP in network operations</li><li>Describe the use of Syslog features including facilities and levels</li><li>Configure and verify the DHCP client and relay</li><li>Explain the forwarding per-hop behaviour (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping</li><li>Configure network devices for remote access using SSH</li><li>Describe the capabilities and function of TFTP/FTP in the network</li></ul><strong>Security Fundamentals</strong><ul><li>Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)</li><li>Describe security program elements (user awareness, training, and physical access control)</li><li>Configure device access control using local passwords</li><li>Describe security password policy elements, such as management, complexity, and password alternatives (multi-factor authentication, certificates, and biometrics)</li></ul><p>Cost: 8500 AED</p><p>Discount: 55% Off for Laimoon Users!</p><p>Duration: Upto 40 Hours</p>					]]>				  </description>				  <pubDate>Sun, 19 May 2019 12:44:47 +04</pubDate>				</item> 								<item><title><![CDATA[Information Security Management  - Convertas , Dubai,Kuala Lumpur, Istanbul,Malaysia,Turkey,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/five-days-information-security-management-convertas/online</link>				  <description>				  <![CDATA[						<strong>Day One:<br>Information Security Management - An Overview</strong><br>&nbsp;IT Risk Management<br>&nbsp;Categorizing Physical and Electronic Risk<br>&nbsp;IT and Networks<br>&nbsp;Computer Systems Design<br>&nbsp;Legal and Regulatory Considerations<br>&nbsp;Information, Business and Risk - Case Study<br>&nbsp;<br><strong>Day Two:<br>Information Security Management</strong><br>&nbsp;Ensuring Information Security<br>&nbsp;Confidentiality<br>&nbsp;Integrity<br>&nbsp;Availability<br>&nbsp;Authenticity<br>&nbsp;Non Repudiation of Data<br>&nbsp;Ethical hacking and Industrial Espionage<br>&nbsp;Where to design and place effective computer and management controls<br>&nbsp;<br><strong>Day Three:<br>Information Management - International Standards</strong><br>&nbsp;Code or Practice for Information Security Management - ISO 17799 / ISO27002<br>&nbsp;Best Practice and Implementing Guidance and Controls For ISO27002<br>&nbsp;Information Security Management Overview<br>&nbsp;Risk Assessment and Controls<br>&nbsp;Security Policy Documentation<br>&nbsp;Organizing Information Security Management<br>&nbsp;IT Asset Management<br>&nbsp;Personnel and Human Resources<br>&nbsp;<br><strong>Day Four:<br>Information Management ISO27002</strong><br>&nbsp;Best Practice and Implementing Guidance and Controls For ISO27002<br>&nbsp;Physical and Environmental Security<br>&nbsp;Operations Management and Communications<br>&nbsp;Access Control<br>&nbsp;Information Systems (Design, Development, Maintenance)<br>&nbsp;Incident Management<br>&nbsp;Business Continuity<br>&nbsp;Regulatory Compliance<br>&nbsp;Best Practice and Implementation Guidance for BS ISO/IEC 38500:2008<br>&nbsp;Case Study<br>&nbsp;<br><strong>Day Five:<br>Implementing Effective Information Security Management Frameworks</strong><br>&nbsp;Successful steps for IT Security Management<br>&nbsp;Audit and Compliance for IT Resources<br>&nbsp;Business Process Engineering<br>&nbsp;Case Study<br>&nbsp;<br>&nbsp;<p>Cost: 3995 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Sun, 09 Dec 2018 11:27:53 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information System Auditor (CISA)  - Delphi Star Training Centre , UAE, Sharjah ]]></title><link>https://courses.laimoon.com/course/four-days-part-time-certified-information-system-auditor-cisa-delphi/online</link>				  <description>				  <![CDATA[						CISA&nbsp;Certification is a globally acknowledged certification for IS Audit Control, Assurance and Security Professionals. It is sponsored by the&nbsp;ISACA&nbsp;(Information Systems Audit and Control Association). A&nbsp;CISACertificate helps in demonstrating the followings -<br
/><br
/>Audit Experience<br
/>Skills and Knowledge<br
/>Ability to Manage Vulnerabilities<br
/>Capability to Ensure Compliance, and<br
/>Competence to Institute Controls within Organization<ul><li>The&nbsp;CISA&nbsp;Course is focused on providing an improved understanding of IS Security Audit Processes and better awareness on how to protect Information Systems.</li></ul>&nbsp;<ul><li>Completing the CISA Certification&nbsp;ensures that the IT Professional has the necessary Knowledge and Experience for adequately Controlling, Monitoring and Assessing an Enterprise&#39;s IT and Business ;The CISA online course proves that the Professional can perform reviews while adhering to Global Standards, Practices and Guidelines.</li></ul>&nbsp;<ul><li>The CISA (Certified Information Security Auditor) helps IT Security and Audit Professionals to quantify and market their Experience.</li><li>CISA course demonstrates the level of knowledge acquired and maintained to meet Dynamic Challenges and increases their value in the Organization resulting in higher earnings and Career Growth.</li><li>Being CISA Certified not only gives individuals a competitive edge but also helps them to become part of the Elite Peer Network.</li></ul><p>Cost: 2199 AED</p><p>Discount: 31% Off for Laimoon Users!</p><p>Duration: 28 To 40 Hours</p>					]]>				  </description>				  <pubDate>Thu, 20 Sep 2018 23:09:12 +04</pubDate>				</item> 					</channel></rss>
<!-- Apr 25, 2026 07:58:59 -->