<?xml version="1.0" encoding="UTF-8"?><rss
version="2.0"	xmlns:content="http://purl.org/rss/1.0/modules/content/"	xmlns:wfw="http://wellformedweb.org/CommentAPI/"	xmlns:dc="http://purl.org/dc/elements/1.1/"	xmlns:atom="http://www.w3.org/2005/Atom"	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"	xmlns:slash="http://purl.org/rss/1.0/modules/slash/">	<channel><title>Laimoon.com</title><link>https://courses.laimoon.com/sitemap/rss</link>	    <description>Courses in Dubai, Abu Dhabi, Sharjah Diplomas, Degrees &amp; Doctorates - Laimoon Course Guide</description>	    <language>en-us</language>	    	    	    						<item><title><![CDATA[Cyber Security Audit  - GBA -Professional London Training Center , Australia, Germany, India, Netherlands, Turkey, UAE, United Kingdom, Dubai, Delhi, Mumbai, Sydney, London, Istanbul, Frankfurt, Munich, The Hague ]]></title><link>https://courses.laimoon.com/course/cyber-security-audit-gba-professional-london-training-center/online</link>				  <description>				  <![CDATA[						Overview<br
/><br
/>Cyber Security Audit training equips professionals to assess and strengthen an organization&#39;s cyber defenses, covering risk assessment, vulnerability management, compliance, and implementing controls.<br
/><br
/>The Cyber Security Audit training course provides participants with a practical and structured understanding of how to assess the effectiveness of cyber security controls, policies, and governance frameworks within an organisation. The course focuses on evaluating compliance with recognised standards and regulatory requirements, identifying control gaps, and assessing cyber risks that may impact the confidentiality, integrity, and availability of information assets.<br
/><br
/>Participants will learn how to plan and conduct cybersecurity audits, review technical and organisational controls, and report audit findings in a clear and actionable manner.<br
/><br
/>Objective<ul><li>Define and apply principles of threat and vulnerability management</li><li>Assess and prioritise threats using vulnerability assessment tools</li><li>Design and implement secure authentication and authorisation mechanisms</li><li>Explain key components of effective cyber security governance</li><li>Differentiate between firewall technologies and broader network security controls</li><li>Strengthen asset, configuration, change, and patch management processes</li><li>Manage enterprise identity, access, and information security</li><li>Identify and evaluate application security controls</li></ul><p>Cost: 4250 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Wed, 24 Dec 2025 18:16:48 +04</pubDate>				</item> 								<item><title><![CDATA[Cyber Security Risk Management  - GBA -Professional London Training Center , Australia, Germany, India, Netherlands, Turkey, UAE, United Kingdom, Dubai, Delhi, Mumbai, Sydney, London, Istanbul, Frankfurt, Munich, The Hague ]]></title><link>https://courses.laimoon.com/course/cyber-security-risk-management-gba-professional-london-training-center/online</link>				  <description>				  <![CDATA[						Overview<br
/><br
/>Cyber Security Risk Management&nbsp;focuses on identifying, assessing, and mitigating cyber threats that can impact an organisation&rsquo;s information assets, operations, and reputation. This training provides a practical understanding of cyber risk frameworks, threat landscapes, and control strategies aligned with international standards and best practices.<br
/><br
/>Participants will learn how to evaluate cyber risks, implement appropriate security controls, integrate cyber risk into enterprise risk management, and support informed decision-making to enhance organisational resilience in an increasingly digital environment.<br
/><br
/>Learning Outcome<ul><li>Implement standards-based, proven methodologies for assessing and managing organisation&#39;s information infrastructure risks.</li><li>Select and implement security controls that ensure compliance with applicable laws, regulations, policies, and directives.</li><li>Extend security protection to ICS (Industrial Control Systems) and the cloud.</li><li>Understand the fundamentals of cyber security risk, including threats, vulnerabilities, and impacts on business operations</li><li>Identify and assess cyber risks using structured risk assessment frameworks and methodologies</li><li>Apply risk treatment strategies to reduce, transfer, avoid, or accept cyber risks</li><li>Align cyber security risk management with enterprise risk management and governance structures</li><li>Understand relevant standards and frameworks such as ISO 27001, NIST, and other leading practices</li><li>Enhance organisational resilience through effective monitoring, reporting, and continuous improvement of cyber risk controls</li><li>&nbsp;</li></ul><p>Cost: 4250 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Wed, 24 Dec 2025 18:04:42 +04</pubDate>				</item> 								<item><title><![CDATA[Principles and Practices of Cyber Security  - GBA -Professional London Training Center , Australia, Germany, India, Netherlands, Turkey, UAE, United Kingdom, Dubai, Delhi, Mumbai, Sydney, London, Istanbul, Frankfurt, Munich, The Hague ]]></title><link>https://courses.laimoon.com/course/principles-and-practices-of-cyber-security-gba-professional-london-training-center/online</link>				  <description>				  <![CDATA[						Cybersecurity plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, and governmental and industry information systems from theft and damage attempted by criminals and adversaries.<br
/><br
/>This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients, understanding a complete knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking, including understanding the basics of Kali Operating System and its tools and techniques.<br
/><br
/>It will also cover WiFi security, Website security, human factors, cyber forensics, cyber security team management, including all other areas related to Cyber Security.<br
/><br
/><strong>Objective</strong><ul><li>Understand the fundamental principles and concepts of cybersecurity</li><li>Identify common cyber threats, vulnerabilities, and attack vectors</li><li>Apply best practices and security controls to protect digital assets and networks</li><li>Conduct risk assessments and implement mitigation strategies for cyber threats</li><li>Develop effective incident response and recovery plans</li><li>Ensure compliance with relevant regulations, standards, and organizational policies</li><li>Promote a culture of cyber security awareness within the organization</li><li>Integrate cyber security practices into day-to-day operations to safeguard information and maintain business continuity</li></ul><p>Cost: 4250 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Fri, 19 Dec 2025 18:19:22 +04</pubDate>				</item> 								<item><title><![CDATA[Process Control Cybersecurity  - GBA -Professional London Training Center , Australia, Germany, India, Netherlands, Turkey, UAE, United Kingdom, Dubai, Delhi, Mumbai, Sydney, London, Istanbul, Frankfurt, Munich, The Hague ]]></title><link>https://courses.laimoon.com/course/process-control-cybersecurity-gba-professional-london-training-center/online</link>				  <description>				  <![CDATA[						Overview<br
/><br
/>Industrial control systems in sectors such as oil &amp; gas, energy, and manufacturing are increasingly vulnerable to cyber threats, which can disrupt operations, compromise safety, and cause significant financial loss. This training equips participants with the knowledge and practical skills to identify, assess, and mitigate cybersecurity risks in process control environments.<br
/><br
/>The program covers industrial control system (ICS) security fundamentals, threat and vulnerability assessment, network protection, incident response, and best practices for maintaining operational integrity. Participants will also learn how to implement security policies, compliance measures, and risk management strategies tailored to process control systems.<br
/><br
/>By the end of the training, participants will be able to:<ul><li>Understand the architecture and vulnerabilities of industrial control systems.</li><li>Identify and assess cybersecurity threats specific to process control environments.</li><li>Apply security measures to protect operational technology networks and systems.</li><li>Develop incident response and risk mitigation strategies.</li><li>Promote a culture of cybersecurity awareness within industrial operations.</li><li>Perform security countermeasures to protect process control networks and assets.</li><li>Utilize diagnostics and troubleshooting tools to monitor and respond to cybersecurity incidents.</li><li>Establish security governance practices, including management of change and compliance measures.</li></ul><p>Cost: 4250 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Thu, 18 Dec 2025 16:30:33 +04</pubDate>				</item> 								<item><title><![CDATA[ISO42001 Lead Implementer  - Opportunities Workshop , UAE, United Kingdom, Dubai, Online, London ]]></title><link>https://courses.laimoon.com/course/iso42001-lead-implementer-opportunities-workshop/online</link>				  <description>				  <![CDATA[						TRECCERT AI Management System ISO/IEC 42001 Lead Implementer is an expert-level course developed to equip trainees with a practical understanding of the AIMS implementation approach based on the requirements of the ISO/IEC 42001 standard.<br
/><br
/>The training course provides a comprehensive overview of the AIMS implementation based on the Plan-Do-Check-Act model and related concepts, processes, methods, and techniques.<br
/><br
/>Learning Objectives:<ul><li>Know and understand artificial intelligence management fundamental concepts, standards, best practices and laws/ regulations.</li><li>Know and understand ISO/IEC 42001 requirements, and describe their function and operation.</li><li>Know, understand and be able to define a framework for implementing a AI Management System (AIMS) within an organisation.</li><li>Know, understand and be able to interpret ISO/IEC 42001 controls and implement the AIMS based on the defined framework.</li><li>Know, understand and be able to support the implementation team to continually improve the implemented management system.</li></ul><br
/><strong>COURSE OUTLINE</strong><br
/><br
/>1. Introduction to AIMS<ul><li>Introduction to AI</li><li>AI Management System Overview</li><li>AI Governance Frameworks and Best Practices</li></ul>2. ISO/IEC 42001 Requirements<ul><li>Context of the Organization</li><li>Leadership</li><li>Planning</li><li>Support</li><li>Operation</li><li>Performance Evaluation</li><li>Improvement</li></ul>3. AI Controls<ul><li>Policies Related to AI</li><li>Internal Organisation</li><li>Resources for AI Systems</li><li>Assessing Impacts of AI systems</li><li>AI System Life Cycle</li><li>Data for AI Systems</li><li>Information for Interested Parties of AI Systems</li><li>Use of AI Systems</li><li>Third Party Relationships</li></ul>4. AIMS Initiation<ul><li>Develop the Project Charter</li><li>Ensure Management Commitment</li><li>Identify the Interested Parties</li><li>Conduct a Gap Analysis</li><li>Prepare the PDCA Cycle</li></ul>5. Establishment Phase<ul><li>Establish the Context of the Organization</li><li>Define the AIMS Scope</li><li>Establish the Objectives, Processes, and Procedures</li><li>Establish the AIMS Policy</li><li>Define the Risk Assessment Approach</li><li>Create the AIMS Implementation Plan</li><li>Management Authorization to Implement and</li><li>Operate the AIMS</li></ul>6. Implementation and Operation Phase<ul><li>AI Risk Management</li><li>Implement the AI Management Policies and Procedures</li><li>Manage AIMS Operations</li><li>Awareness and Training</li><li>Resource Management and Documented Information</li></ul>7. Monitor and Review Phase<ul><li>Monitor the AIMS</li><li>Conduct Internal Audits</li><li>Review the AIMS</li></ul><br
/>8. Maintenance and Improvement Phase<ul><li>Implement the Identified Improvements</li><li>Corrective and Preventive Actions</li><li>Communicate the Actions and Improvements</li><li>Ensure Continual Improvement of AIMS</li></ul><p>Cost: 2000 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Tue, 22 Apr 2025 16:55:08 +04</pubDate>				</item> 								<item><title><![CDATA[Cyber IT Security Diploma  - Opportunities Workshop , Online, Dubai, United Arab Emirates, London, United Kingdom ]]></title><link>https://courses.laimoon.com/course/part-time-cyber-it-security-diploma-opportunities-workshop/online</link>				  <description>				  <![CDATA[						<strong>Course Overview:</strong><br
/>The Cyber IT Security Diploma programme is designed to equip students with essential skills and knowledge for a career in cybersecurity.<br
/><br
/><strong>Key Learning Outcomes:</strong><ul><li>Understand Foundational Security Concepts and Governance:<ul><li>Gain a solid understanding of cybersecurity principles, frameworks, and governance practices.</li></ul></li><li>Develop Skills in Intrusion Prevention and Penetration Testing:<ul><li>Learn how to prevent cyber-attacks and how to conduct penetration testing to identify vulnerabilities.</li></ul></li><li>Enhance Knowledge of Networking and Cloud Security:<ul><li>Deepen understanding of network security and best practices for securing cloud infrastructures.</li></ul></li><li>Manage and Plan for Security Risks:<ul><li>Understand risk management strategies to mitigate and manage security threats effectively.</li></ul></li><li>Comply with Legal and Regulatory Frameworks:<ul><li>Learn to navigate the legal and regulatory aspects of cybersecurity, ensuring compliance with industry standards.</li></ul></li></ul><strong>Programme Structure:</strong><br
/>This programme consists of 8 two-week sprints, featuring:<ul><li>Face-to-face workshops to introduce key topics.</li><li>Flexible online learning modules to provide self-paced learning.</li><li>Practical skills activities to apply theoretical knowledge.</li></ul>Throughout the course, students will work towards achieving the CompTIA Security+ certification.<br
/><br
/>This programme is designed for anyone eager to start a career in cybersecurity or those looking to strengthen their existing IT security knowledge and skills.<p>Cost: 3999 USD</p><p>Duration: 3 To 6 Months</p>					]]>				  </description>				  <pubDate>Thu, 30 Jan 2025 14:57:04 +04</pubDate>				</item> 								<item><title><![CDATA[CCTV Operator Program  - Bright Future Training Institute , Dubai,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/cctv-operator-program-bright-future-training-institute/online</link>				  <description>				  <![CDATA[						<strong>Content</strong><br
/><br
/><strong>PART 1: Introduction to Surveillance System</strong><ul><li>Open circuit &amp; Closed Circuit</li><li>Elements of basic CCTV surveillance system</li><li>Selection of Camera:&nbsp; Analog and Digital</li><li>Parts of the Camera: Lens, Image sensor, Image Processing Unit</li><li>Measurements: Focal Length , Angle of View , Field of View</li><li>Extra Features of Camera:&nbsp; Resolution, Day/night, Varifocal, dome, Wireless, Bullet, PTZ, ANPR</li><li>Cables, Connectors and Adopter: &nbsp;Types of cables &amp;&nbsp; connectors</li><li>Controller&rsquo;s Types &amp; Categories: DVR, NVR, HDVR</li></ul><strong>PART 2: Connectivity &amp; Configuration</strong><ul><li><strong>Connectivity</strong>:&nbsp;&nbsp;&nbsp;Connecting Cameras to DVR and&nbsp; DVR to&nbsp; LCD / LED</li><li><strong>Setup Wizard</strong>:&nbsp;&nbsp;Seven steps of Initial Configuration of DVR / HDVR.</li><li><strong>Configuration</strong>:&nbsp;&nbsp;a. General Setup&nbsp; b. Record Setup c. Network Setup d. Encode Setup</li></ul><strong>Part 3: Digital / IP Camera Setup</strong><ul><li>Adding Digital / IP Camera</li><li>Deleting Digital / IP Camera</li></ul><p>Cost: 1500 AED</p><p>Duration: Upto 30 Hours</p>					]]>				  </description>				  <pubDate>Fri, 08 Nov 2024 10:36:20 +04</pubDate>				</item> 								<item><title><![CDATA[Fortinet Fortigate  - Learnovate Training Center , UAE, Dubai, Online, Bur Dubai,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/fortinet-fortigate-learnovate-training-center/online</link>				  <description>				  <![CDATA[						<strong>Fortinet Fortigate Outlines</strong><ul><li>Learn Fortinet Fortigate Firewall configuration from the basics</li><li>Fine-tune the FortiGate device and implement eye-catching dashboards</li><li>Identify threats, monitor, and correlate events</li><li>Learn all about LAN, WAN, SSL Decryption, DNS Filtering, Safe Search, Routing, Endpoint Control, Intrusion Prevention</li><li>Gain knowledge of Network Address Translation (NAT)</li><li>Link Aggregation and much more</li></ul><strong>This course is ideal for the following candidates</strong><ul><li>Network Security Professionals</li><li>Network and System Administrators</li><li>Security Administrators</li><li>Technicians desiring to work with Fortinet Technologies</li><li>Existing Cyber Security specialists</li><li>Freshers looking to expand in the field of Network Security</li></ul><p>Cost: 600 AED</p><p>Duration: Upto 12 Hours</p>					]]>				  </description>				  <pubDate>Tue, 29 Oct 2024 16:48:33 +04</pubDate>				</item> 								<item><title><![CDATA[CISM -  Certified Information Security Manager   - NLP Tech , UAE ]]></title><link>https://courses.laimoon.com/course/cism-nlptech/online</link>				  <description>				  <![CDATA[<p>Advance your career in information security management with our Certified Information Security Manager (CISM) training programs at NLPTECH Training Center. Our courses are designed to provide you with the expertise needed to excel in the CISM certification, focusing on key areas such as information security governance, risk management, incident response, and program development. You will gain a deep understanding of security management practices and strategies to protect organizational assets and ensure compliance with regulations. Through practical exercises, case studies, and expert instruction, you'll be equipped with the skills necessary to manage and oversee an enterprise&rsquo;s information security program effectively.<br><br>Timing flexible<br>Location Bur Dubai<br><strong>Enroll in this course and get another course for FREE!</strong><br>&nbsp;</p><p>Cost: 3500 AED</p><p>Duration: Upto 6 Months</p>					]]>				  </description>				  <pubDate>Sun, 08 Sep 2024 17:55:38 +04</pubDate>				</item> 								<item><title><![CDATA[Cyber Security Fundamentals  - London Training For Excellence , Netherlands, UAE, United Kingdom, Dubai, London, Amsterdam,United Arab Emirates,United Kingdom ]]></title><link>https://courses.laimoon.com/course/cyber-security-fundamentals-london-training-for-excellence/online</link>				  <description>				  <![CDATA[						<strong>Overview</strong><br
/>To help address the global cyber security skills crisis head on ISACA has created Cybersecurity Nexus&trade; (CSX) a certification path for the cyber security professional.<br
/><br
/>The Cybersecurity (CSX) certification path starts with the knowledge-based Cybersecurity Fundamentals (CSX) Certificate for those who are new to the profession or are considering to change careers and centres the performance-based certification as the CSX Practitioner CSX Specialist and CSX Expert level. Cybersecurity Fundamentals (CSX) offers a knowledge-based Certificate in the concepts that frame and define the standards guidelines and practices of the industry.<br
/><br
/>Cyber security is a growing and rapidly changing field and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of ;<br
/><br
/>In addition this practical cyber security knowledge training will prepare you for the ISACA Cybersecurity Fundamentals (CSX) exam. *CSX is a registered trademark of ISACA. The Cybersecurity Fundamentals (CSX) exam is an online closed book remotely proctored ;<br
/><br
/>The number of questions in each domain depends on the weight assigned. The exam takes 2 hours and the passing score is 65%. This 4-day training reviews a total of 5 exam domains:<ul><li>Domain 1 - Cyber security concepts</li><li>Domain 2 - Cyber security architecture principles</li><li>Domain 3 - Security of networks systems applications and data</li><li>Domain 4 - Incident response</li><li>Domain 5 - Security implications and adoption of evolving technology</li></ul><br
/><strong>Objective</strong><br
/>In this 4-day training you will learn to:<ul><li>understand basic cyber security concepts and definitions</li><li>understand basic security architecture principles</li><li>understand security of networkssystemsapplications and data</li><li>define types of incidents and identify elements of an incident response plan</li><li>explain the core Information Assurance (IA) principles</li><li>identify the key components of cyber security network architecture</li><li>apply cyber security architecture principles</li><li>describe risk management processes and practices</li><li>identify security tools and hardening techniques</li><li>distinguish system and application security threats and vulnerabilities</li><li>describe different classes of attacks</li><li>define types of incidents including categoriesresponses and timelines for response</li><li>describe new and emerging IT and Information Security (IS) technologies</li><li>analyze threats and risks within the context of the cyber security architecture</li><li>appraise cyber security incidents to apply appropriate response</li><li>evaluate decision making outcomes of cyber security solutions</li><li>access additional external responses to supplement knowledge of cyber security</li></ul>In addition you will be prepared to take the ISACA Cybersecurity Fundamentals (CSX) Certificate exam.<br
/><br
/><strong>Who Should Attend</strong><br
/>This training is ideal for staff that are new to cyber security, or are looking to move into a cyber security role from a related IT ;<br
/><br
/><strong>Course Outlines</strong><br
/><strong>DAY 1</strong><br
/>Domain 1<ul><li>Cyber security concepts</li><li>Cyber security principles used to manage risks related to the use processing storage and transmission of information or data</li><li>Security management</li><li>Risk management processes including steps and methods for assessing risk</li><li>Threat actors</li><li>Cyber security roles</li><li>Common Adversary Tactics Techniques and Procedures (TTPs)&nbsp; Relevant laws policies procedures and governance requirements&nbsp;</li><li>Cyber security controls</li></ul><br
/>Domain 2<ul><li>Cyber security architecture principles</li><li>Network design processes to include understanding of security objectives operational objectives and trade-offs</li><li>Security system design methods tools and techniques</li><li>Network access Identity and Access Management (IAM)</li><li>IT security principles and methods</li><li>Network security architecture concepts including technology protocols components and principles</li><li>Malware analysis concepts and methodology</li><li>Intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies</li><li>Defense in depth principles and network security architecture</li><li>Encryption algorithms</li><li>Cryptography</li><li>Encryption methodologies</li><li>The process of traffic flows across the network ( transmission and encapsulation)</li><li>Network protocols dynamic host configuration protocol and directory services</li></ul><br
/><strong>DAY 2</strong><br
/><br
/>Domain 3<ul><li>Security of networks systems applications and data</li><li>Vulnerability assessment tools and their capabilities</li><li>Basic system administration network and operating system hardening techniques</li><li>Risk associated with virtualizations</li><li>Penetration testing</li><li>Network systems management principles modules methods and tools</li><li>Remote access technology</li><li>Unix command line</li><li>System and application security threats and vulnerabilities</li><li>System life cycle management principles including software security and usability</li><li>Local specialized system requirements for safety performance and reliability</li><li>System and application security threats and vulnerabilities u Social dynamics of computer attackers in a global context u Secure configuration management techniques</li><li>Capabilities and applications of network equipment including hubs routers switches bridges servers transmission media an related hardware</li><li>Communication methods principles and concepts that support the network infrastructure</li><li>Common networking protocols and services and how they interact to provide network communications</li><li>Different types of network communication</li><li>Virutalisation technologies and virtual machine development and maintenance</li><li>Application security</li><li>Risk threat assessment</li></ul><br
/><strong>DAY 3</strong><br
/><br
/>Domain 4<ul><li>Incident response</li><li>Incident categories and response</li><li>Business continuity/disaster recovery</li><li>Incident response and handling methodologies</li><li>Security event correlation tools</li><li>Processes for seizing and preserving digital evidence</li><li>Types of digital forensics data</li><li>Basic concepts and practices of processing digital evidence</li><li>Anti-forensics tactics techniques and procedures (TTPS)</li><li>Common forensic tool configuration and support applications</li><li>Network traffic analysis methods</li><li>Which system files contain relevant information and where to find those system files</li></ul><br
/>Domain 5<ul><li>Security implications and adoption of evolving technology</li><li>Emerging technology and associated security issues risks and vulnerabilities</li><li>Risk associated with mobile computing</li><li>Cloud concepts around data and collaboration</li><li>Risk of moving applications and infrastructure to the cloud</li><li>Risk associated with outsourcing</li><li>Supply chain risk management processes and practices</li></ul><br
/><strong>Day 4</strong><br
/>Exam Prep<p>Cost: 4900 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Mon, 05 Aug 2024 16:10:33 +04</pubDate>				</item> 								<item><title><![CDATA[Hardware and Networking   - Oscar Education Group , UAE, Dubai ]]></title><link>https://courses.laimoon.com/course/part-time-hardware-and-networking-oasis-institute/online</link>				  <description>				  <![CDATA[<p>A hardware and networking course provides essential skills for computer hardware, network setup, and maintenance.&nbsp;</p><p>Topics include computer components, network protocols, IP addressing, wireless technologies, security measures, and hands-on troubleshooting.&nbsp;</p><p>Students gain practical knowledge in configuring networks and are introduced to virtualization and cloud computing basics.<br><br><br><br>&nbsp;</p><p>Cost: 750 AED</p><p>Duration: 24 Hours</p>					]]>				  </description>				  <pubDate>Wed, 17 Jan 2024 19:40:36 +04</pubDate>				</item> 								<item><title><![CDATA[Cybersec First Responder CFR-410  - emt Academy  , Dubai ]]></title><link>https://courses.laimoon.com/course/cybersec-first-responder-cfr-410-emt-academy/online</link>				  <description>				  <![CDATA[						<strong>CyberSec First Responder (CFR-410)</strong><br
/><strong>Course Length</strong>: 5 days<br
/><strong>Location: </strong>Dubai Silicon Oasis, Dubai - UAE<br
/><strong>Overview</strong>:&nbsp;<br
/>This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT&#39;s National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination, NIST (Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations). It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization&#39;s security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.<br
/>This course is designed to assist students in preparing for the CertNexus CyberSec First Responder <strong>(Exam CFR-410)</strong> certification examination. What you learn and practice in this course can be a significant part of your preparation.<br
/><strong>Course Objectives:</strong><br
/>In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will:<ul><li>Assess cybersecurity risks to the organization</li><li>Analyze the threat landscape. &nbsp;</li><li>Analyze various reconnaissance threats to computing and network environments.</li><li>Analyze various attacks on computing and network environments.</li><li>Analyze various post-attack techniques.</li><li>Assess the organization&#39;s security posture through auditing, vulnerability management, and penetration testing.</li><li>Collect cybersecurity intelligence from various network-based and host-based sources. Copyright 2021 CertNexus. All Rights Reserved</li><li>Analyze log data to reveal evidence of threats and incidents.</li><li>Perform active asset and network analysis to detect incidents.</li><li>Respond to cybersecurity incidents using containment, mitigation, and recovery tactics.</li><li>Investigate cybersecurity incidents using forensic analysis techniques.</li></ul><p>Cost: 6000 AED</p><p>Duration: 3 Days</p>					]]>				  </description>				  <pubDate>Tue, 17 Jan 2023 18:06:21 +04</pubDate>				</item> 								<item><title><![CDATA[       - Saad Allah Management Training & consultancy , UAE, Dubai ]]></title><link>https://courses.laimoon.com/course/----saad-allah-management-training-consultancy/online</link>				  <description>				  <![CDATA[						<strong>  :      </strong><br
/><br
/><br
/><strong>  :</strong><br
/>&nbsp;<br
/>                       ()    .<br
/>                .<br
/>&nbsp;<br
/><strong>   :</strong><br
/>&nbsp;<br
/>        :<br
/>           <br
/>      <br
/>&nbsp;   <br
/>       <br
/>&nbsp;     <br
/>        <br
/>&nbsp;             <br
/>&nbsp;           <br
/>&nbsp;<br
/>&nbsp;<br
/>&nbsp;<br
/><strong>    :</strong><br
/><br
/><strong> :</strong><br
/>&nbsp;    <br
/>&nbsp;  <br
/>&nbsp;  <br
/>&nbsp;<br
/><strong>  :</strong><br
/>&nbsp;   <br
/>&nbsp;  <br
/>&nbsp;   <br
/>&nbsp;<br
/><strong>  :</strong><br
/>&nbsp;        <br
/>&nbsp;    &ndash;  <br
/>&nbsp;  <br
/>&nbsp; <br
/>&nbsp;<br
/><strong>  () :</strong><br
/>&nbsp;    -  <br
/>&nbsp;   <br
/>&nbsp;  <br
/><strong>&nbsp;<br
/>   :</strong><br
/>&nbsp;     <br
/>&nbsp;      CCTV   <br
/>&nbsp; <br
/>&nbsp;<br
/><strong>    :</strong><br
/>&nbsp; <br
/>&nbsp;  <br
/>&nbsp; <br
/>&nbsp; -  <br
/> <br
/>&nbsp; <br
/>&nbsp;    <br
/>&nbsp; <br
/>&nbsp;<br
/><strong>   :</strong><br
/>&nbsp; <br
/>&nbsp;  <br
/>&nbsp;  <br
/>&nbsp;<br
/><strong>  :</strong><br
/>            .<br
/> <br
/>   <br
/>   <br
/>        .<p>Cost: 2500 AED</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Mon, 07 Nov 2022 13:22:56 +04</pubDate>				</item> 								<item><title><![CDATA[        - Saad Allah Management Training & Consultancy , UAE, Dubai ]]></title><link>https://courses.laimoon.com/course/-----saad-allah-management-training-consultancy/online</link>				  <description>				  <![CDATA[						<strong>Program Name: Training Diploma in Cybersecurity, </strong><br
/><br
/><strong>Diploma message:</strong><br
/>&nbsp;<br
/>Preparing graduates in the field of cybersecurity equipped with specialized practical knowledge and practical skills, motivated for lifelong learning and the ability to keep pace with the requirements of the times.<br
/>&nbsp;<br
/><strong>Diploma description:</strong><br
/>&nbsp;<br
/>This applied training diploma is suitable for trainees who are looking to acquire the required practical skills and specialized knowledge in all aspects of cybersecurity, as the program will focus on information, security procedures and processes used in all types of business environments. The program aims&nbsp;to qualify the trainee to obtain accredited international professional certificates.<br
/>&nbsp;<br
/>This program provides trainees with the following capabilities:<ul><li>Demonstrate knowledge of concepts, terminology, principles, methods and methods of information security and cyberspace.</li><li>&nbsp;Familiarity with a wide range of technologies, available tools and practical methods in information security and cyberspace.</li><li>Identifying users&#39; needs in the field of developing information systems and building secure computer networks.</li><li>Demonstrate knowledge of mathematical principles and algorithms for cryptographic operations and the protection of systems</li><li>and information.</li><li>Defining a set of solutions for modern and advanced methods of intruding and attacking data and computer networks.</li><li>Assess gaps and weaknesses in information systems and computer networks.</li><li>Determine the time and cost of handling damages resulting from any attack on an information or institutional system.</li><li>Evaluate appropriate tools and techniques to address damages resulting from security breaches.</li><li>Determine the policies, procedures and plans necessary to manage and ensure the security of institutions.</li><li>Apply different protocols for the confidentiality of information and networks.</li><li>Apply the principles of design, development and management in creating computer networks.</li><li>Use of different network protocols.</li><li>Building secure information systems and computer networks.</li><li>Prepare and present technical reports in a coherent and structured manner, both verbally and in writing.</li><li>Using best practices and standards in the field of information and network protection.</li><li>Dealing with various types of breaches and accidents on computer networks and information systems.</li><li>Discovering vulnerabilities and sources of attack and penetration by monitoring the performance of computer networks</li><li>and information systems.</li><li>Use and development of encryption and information security software.</li></ul>&nbsp;<br
/><strong>Fields of work and market needs:</strong><br
/>Studies have shown that the local market needs, as well as the regional market, by searching&nbsp;for available job opportunities through employment sites. The figures confirmed that the local and regional market needs employees who have the ability to analyze, design, develop, operate, manage, monitor and examine safe systems and software in public and private institutions and companies.<br
/>&nbsp;<br
/>The Applied Training Diploma in Cybersecurity program increases the opportunities available to its affiliates in the local, regional and international labor markets, as it provides the skills and practical experience necessary for the labor market, by offering many diverse topics in information security and cyberspace.<br
/>The diploma program allows those wishing to join it to acquire the necessary skills to design a secure environment, use tools that help protect, audit, investigate, and discover cybercrimes, and how to develop appropriate solutions for protection. The program will also provide participants with the necessary skills to apply advanced principles and concepts related to the development and management of secure information systems in government and private sector organizations.<br
/><br
/><br
/>There are a large number of jobs that a graduate of this training diploma can compete for, including:<ul><li>Information Technology Security Officer</li><li>Network and Information Security</li><li>Technician Wireless Network Security</li><li>Technician Cybercrime Analysis&nbsp;</li><li>Technician Security Systems Analysis&nbsp;</li><li>Technician and Information Quality Assurance Technician&nbsp;</li><li>Software Security Audit</li><li>Technician Information Security&nbsp;</li><li>Technician Penetration Testing&nbsp;</li><li>Technician Forensic Analysis</li><li>Electronic Security Technician</li><li>A technician specializing in electronic incidents and threats</li><li>Technician in developing safe programs</li><li>Member of the Information Technology Project</li><li>Cybercrime Technician</li><li>Technician in computer forensics.</li></ul>&nbsp;<br
/><strong>Target group:</strong><ul><li>high school students or those who were not lucky enough to pass the general secondary exam.</li><li>Graduates of engineering and information technology disciplines interested in studying cybersecurity and working in the same field</li><li>Everyone who has the desire to study cybersecurity and work in this field</li></ul><br
/><strong>Diploma content and study plan:</strong><br
/>The number of theoretical and practical hours per semester is 225 teaching hours, 45 study hours for each course in the plan Therefore, the total number of theoretical and practical hours during the three semesters of the diploma is 450 hours covered over 9 months.<br
/>a&nbsp;Courses to be taught by the participant in the diploma:<br
/>&nbsp;<ul><li>English Skills</li><li>IT Fundamentals Information</li><li>System Security Programming with Python Networking and data security fundamentals&nbsp;</li><li>Ethical Hacking and Testing Operational security of the structure&nbsp;</li><li>Operational Security for Critical Infrastructure&nbsp;</li><li>Advanced Hacking Techniques&nbsp;</li><li>Conducting Penetration and Security Tests&nbsp;</li><li>Managed Security Operations Center Analyst</li><li>Security operation center analyst</li><li>Cybersecurity</li><li>Management</li><li>Threat</li><li>Intelligence &amp; Incident Response</li></ul><br
/>&nbsp;<p>Cost: 6000 AED</p><p>Duration: 2 Weeks</p>					]]>				  </description>				  <pubDate>Fri, 04 Nov 2022 12:06:26 +04</pubDate>				</item> 								<item><title><![CDATA[CISSP Certification   - Learners Point Training Institute , UAE, Dubai,Dubai ]]></title><link>https://courses.laimoon.com/course/part-time-cissp-certification-learners-point-training-institute-1/online</link>				  <description>				  <![CDATA[						<strong>OVERVIEW:</strong>&nbsp;Certified Information Systems Security Professional (CISSP) certification is recognized across the globe as a validation of expertise for professionals working in Information Technology Security. CISSP courses in Dubai develop the expertise of said professionals in defining IT architecture. This CISSP training online enhances one&rsquo;s skills in designing, creating, and maintaining secure business environments using globally approved information security standards. Additionally, this CISSP course also prepares professionals to effectively develop, implement, and evaluate cybersecurity technologies and tools.<br
/><br
/><strong>CAREER OPPORTUNITIES:<br
/><br
/>Market Trends:</strong> In today&rsquo;s age of information, networks have become increasingly interconnected, making cyberattacks and their prevention more challenging. Cybercrimes have increased by 600% in 2020, throwing light on the need for information security experts. The global cybersecurity market has been valued at USD  billion in 2020, growing at a CAGR of  McKinsey &amp; Company found that only 16% of executives believe their organizations are well prepared to deal with cyber risks, showing the huge dearth of information security management. Needless to say, any professional with a CISSP certification has a promising career ahead of them.<br
/><br
/><strong>Salary Trends: </strong>Cybercrimes have become prevalent in this age of information technology, making cybersecurity jobs one of the most lucrative careers with hefty salaries. According to Burning Glass, 59% of all cybersecurity positions require at least one certification, among which the CISSP certification is most sought after. Due to the high demand for CISSP-certified professionals in the job market, they command a premium on their salaries. In the UAE, the average salary for professionals with CISSP certification is AED 308,000 per annum.<br
/><br
/><strong>Demand and Opportunities: </strong>The internet is now an integral part of any organization, so security against data breaches is an extremely crucial issue. The Bureau of Labor Statistics reports that employment of Information Security Analysts is increasing at a rate of 33%, which is much higher than any other occupation. The cost of cybercrime is estimated to amount to $6 trillion, leading to the creation of  million cybersecurity jobs. That is why professionals with a CISSP certification and expertise in IT security are in high demand.<br
/><br
/><strong>COURSE OUTLINE:</strong><br
/><br
/>Security and Risk Management<ul><li>Security Governance Principles</li><li>Compliance</li><li>Professional Ethics</li><li>Security Documentation</li><li>Risk Management</li><li>Threat Modeling</li><li>Business Continuity Plan Fundamentals</li><li>Acquisition Strategy and Practice</li><li>Personnel Security Policies</li><li>Security Awareness and Training</li></ul>Asset Security<ul><li>Asset Classification</li><li>Privacy Protection</li><li>Asset Retention</li><li>Data Security Controls</li><li>Secure Data Handling</li></ul>Security Engineering<ul><li>Security in the Engineering Lifecycle</li><li>System Component Security</li><li>Security Models</li><li>Controls and Countermeasures in Enterprise Security</li><li>Information System Security Capabilities</li><li>Design and Architecture Vulnerability Mitigation</li><li>Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems</li><li>Cryptography Concepts</li><li>Cryptography Techniques</li><li>The site and Facility Design for Physical Security</li><li>Physical Security Implementation in Sites and Facilities</li></ul>Communications and Network Security<ul><li>Network Protocol Security</li><li>Network Components Security</li><li>Communication Channel Security</li><li>Network Attack Mitigation</li></ul>Identity and Access Management<ul><li>Physical and Logical Access Control</li><li>Identification, Authentication, and Authorization</li><li>Identity as a Service</li><li>Authorization Mechanisms</li><li>Access Control Attack Mitigation</li></ul>Security Assessment and Testing<ul><li>System Security Control Testing</li><li>Software Security Control Testing</li><li>Security Process Data Collection</li><li>Audits</li></ul>Security Operations<ul><li>Security Operations Concepts</li><li>Physical Security</li><li>Personnel Security</li><li>Logging and Monitoring</li><li>Preventative Measures</li><li>Resource Provisioning and Protection</li><li>Patch and Vulnerability Management</li><li>Change Management</li><li>Incident Response</li><li>Investigations</li><li>Disaster Recovery Planning</li><li>Disaster Recovery Strategies</li><li>Disaster Recovery Implementation</li></ul><strong>KEY TAKEAWAYS:</strong><br
/><br
/>Successful completion of our CISSP course will equip candidates for:<ul><li>Handling data assets, principles, and threats in the context of data security</li><li>Comprehending the core concepts of network security and communication</li><li>Supervising the IT security in a corporate environment</li><li>Combating security risks by identifying and nullifying them</li><li>Recognizing and mitigating network-based attacks</li></ul><strong>ACCREDITATION:</strong><br
/><br
/>Our CISSP course in Dubai is accredited by ISO 9001: 2015 and the Knowledge and Human Development Authority (KHDA).<br
/><br
/><strong>ALUMNI: </strong>Academy graduates of our CISSP course in Dubai are successfully placed in some of the top-notch companies like Jumeirah, Aramex, Airarabia, Damac, Emaar, etc. They are entrepreneurs, career changers, and lifelong learners.<br
/><br
/><strong>WHY LEARNER&rsquo;S POINT:</strong><br
/><br
/>As the leading provider of IT courses in Dubai, we at Learners Point help professionals master the skills required for clearing the CISSP exam.<br
/>The USPs our specialized CISSP certification training offers you are as follows:<ul><li>While the group sessions we offer contributes to team bonding, our CISSP training also provides an individual learning experience for enhancing the quality of the training program</li><li>We take into consideration real-world scenarios faced by industries and offer respectively calculated training through our CISSP certification training</li><li>Our CISSP training is designed to sharpen the efficiency of professionals so they can settle into required or desired roles with ease</li><li>One of the most remarkable features of our CISSP certification training is that it consists of assignments related to the actual work environment to give participants a taste of the hands-on experience required for the corporate industry</li><li>Aside from theoretical knowledge, our CISSP training also focuses on case studies to train prospective professionals for practical exposure</li></ul><p>Cost: 4000 AED</p><p>Duration: 40 Hours</p>					]]>				  </description>				  <pubDate>Mon, 03 Jan 2022 13:35:19 +04</pubDate>				</item> 								<item><title><![CDATA[CISSP Certification  - Learners Point Training Institute , UAE, Dubai,Dubai,Bahrain,Oman,Qatar,Saudi Arabia,United Arab Emirates,Kuwait ]]></title><link>https://courses.laimoon.com/course/part-time-cissp-certification-learners-point-training-institute/online</link>				  <description>				  <![CDATA[						<strong>OVERVIEW: </strong>The Certified Information Systems Security Professional CISSP certification is recognized around the world as a mark of expertise for professionals working in Information Technology Security. The CISSP certification training in Dubai develops the expertise of professionals in defining IT architecture. This CISSP training enhances professionals&#39; skills in designing, creating, and maintaining secure business environments using globally approved information security standards.<br
/><br
/><strong>CAREER OPPORTUNITIES:<br
/><br
/>Market Trends:</strong> In today&#39;s information age, networks have become increasingly interconnected, making cyberattacks and their prevention more challenging. In 2020, cyber crimes have increased by 600% boosting the need for information security experts. The global cybersecurity market has been valued at USD billion in 2020, growing at a CAGR of McKinsey &amp; Company found that only 16% of executives believe their organizations are well prepared to deal with cyber risks, showing the huge dearth of information security management. As this data indicates, professionals with CISSP certification in Dubai have numerous career options.<br
/><br
/><strong>Salary Trends:</strong> Cybercrimes have become prevalent in this age of information technology, making cybersecurity jobs one of the most lucrative careers with hefty salaries. According to Burning Glass, 59% of all cybersecurity positions require at least one certification, among which the CISSP certification is most sought after. Due to the high demand for CISSP - certified professionals in the job market, they command a premium on their salaries. In the UAE, the average salary for professionals with CISSP certification is AED 308,000 per annum.<br
/><br
/><strong>Demand and Opportunities: </strong>The Internet and computers are now an integral part of any organization, so security against data breaches is an extremely crucial issue, which drives the demand for IT security professionals. The Bureau of Labor Statistics reports that employment of Information Security Analysts is increasing at a rate of 33%, which is much higher than all other occupations. In 2021, the cost of cybercrime is expected to amount to $6 trillion, leading to the creation of million cybersecurity jobs. From the data above it can be observed that there is a massive demand for cybersecurity professionals with CISSP certification in Dubai.<br
/><br
/><strong>COURSE OUTLINE:</strong><br
/><br
/>Security and Risk Management<ul><li>Security Governance Principles</li><li>Compliance</li><li>Professional Ethics</li><li>Security Documentation</li><li>Risk Management</li><li>Threat Modeling</li><li>Business Continuity Plan Fundamentals</li><li>Acquisition Strategy and Practice</li><li>Personnel Security Policies</li><li>Security Awareness and Training</li></ul>Asset Security<ul><li>Asset Classification</li><li>Privacy Protection</li><li>Asset Retention</li><li>Data Security Controls</li><li>Secure Data Handling</li></ul>Security Engineering<ul><li>Security in the Engineering Lifecycle</li><li>System Component Security</li><li>Security Models</li><li>Controls and Countermeasures in Enterprise Security</li><li>Information System Security Capabilities</li><li>Design and Architecture Vulnerability Mitigation</li><li>Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems</li><li>Cryptography Concepts</li><li>Cryptography Techniques</li><li>The site and Facility Design for Physical Security</li><li>Physical Security Implementation in Sites and Facilities</li></ul>Communications and Network Security<ul><li>Network Protocol Security</li><li>Network Components Security</li><li>Communication Channel Security</li><li>Network Attack Mitigation</li></ul>Identity and Access Management<ul><li>Physical and Logical Access Control</li><li>Identification, Authentication, and Authorization</li><li>Identity as a Service</li><li>Authorization Mechanisms</li><li>Access Control Attack Mitigation</li></ul>Security Assessment and Testing<ul><li>System Security Control Testing</li><li>Software Security Control Testing</li><li>Security Process Data Collection</li><li>Audits</li></ul>Security Operations<ul><li>Security Operations Concepts</li><li>Physical Security</li><li>Personnel Security</li><li>Logging and Monitoring</li><li>Preventative Measures</li><li>Resource Provisioning and Protection</li><li>Patch and Vulnerability Management</li><li>Change Management</li><li>Incident Response</li><li>Investigations</li><li>Disaster Recovery Planning</li><li>Disaster Recovery Strategies</li><li>Disaster Recovery Implementation</li></ul><strong>KEY TAKEAWAYS:</strong><br
/><br
/>Successful completion of our CISSP course in Dubai will enable candidates to:<ul><li>Understand the fundamentals of communication and network security</li><li>Reduce security risks by recognizing and mitigating them</li><li>Identify network-based attacks</li><li>Manage threats, data assets, and principles pertaining to data security</li><li>Oversee the information technology security in a corporate setting</li></ul><strong>ACCREDITATION:</strong><br
/><br
/>Our CISSP training in Dubai is accredited by ISO 9001: 2015 and the Knowledge and Human Development Authority (KHDA).<br
/><br
/><strong>ALUMNI:</strong> Our academy graduates are successfully placed in some of the top-notch companies in Dubai like Jumeirah, Aramex, Airarabia, Damac, Emaar, etc. They are entrepreneurs, career changers, and lifelong learners.<br
/><br
/><strong>WHY LEARNER&rsquo;S POINT:</strong><br
/><br
/>Being the leading providers of the CISSP course in Dubai, we have substantial experience in delivering relevant skills and knowledge to prepare for CISSP certification in Dubai.<br
/>Our CISSP certification course offers the following advantages:<ul><li>Our CISSP training is designed based on real-world scenarios, formulating and evaluating practical requirements</li><li>Our CISSP courses strive to provide a reality check and insight into the requirements of a challenging role and how to fulfill it</li><li>We also provide live interactive sessions and hands-on experience through assignments associated with the actual work environment</li><li>To enhance the learning experience of our students we provide organized group sessions and integrated training modules</li><li>Our discrete approach to career guidance enables our students to get successfully placed in renowned organizations</li></ul><p>Cost: 7500 AED</p><p>Discount: 50% Off for Laimoon Users!</p><p>Duration: 34 Hours</p>					]]>				  </description>				  <pubDate>Mon, 08 Nov 2021 14:47:16 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information System Auditor (CISA)  - Learners Point Training Institute , UAE, Dubai,Dubai,Bahrain,Kuwait,Qatar,Saudi Arabia,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/part-time-certified-information-system-auditor-cisa-learners-point-training-institute/online</link>				  <description>				  <![CDATA[						<strong>OVERVIEW: </strong>The Certified Information System Auditor (CISA) certification is a globally recognized credential in information security audit control and assurance. The Certified Information Systems Auditor CISA course in Dubai equips professionals with the necessary skills to govern and control IT enterprises and perform effective security audits on any organization.<br
/><br
/><strong>CAREER OPPORTUNITIES:<br
/><br
/>Market Trends:</strong> Companies have become dependent on cybersecurity solutions to monitor, detect, report, and counter cyber threats to keep their data secure. projects that the global cybersecurity market size will reach USD Billion by 2026, with a CAGR of Information Security Analysts was ranked 4th among the best technology jobs. With the growth of cybercrime in today&#39;s digital age, professionals with CISA certification in Dubai have greater job prospects.<br
/><br
/><strong>Salary Trends:</strong> Businesses are becoming more dependent on the internet and digital platforms, which encourages recruiters to seek CISA - certified professionals. The high demand for information security professionals has placed a premium on their remuneration. Over the next five years, Information Cyber Security Analysts salaries are expected to rise 28 %. In the UAE, the average salary of Information Security Analysts with CISA certification in Dubai is AED 264,000 per annum.<br
/><br
/><strong>Demand and Opportunities: </strong>Digital transformation has led to mobile working and the use of cloud - based services, increasing the attack surface and driving up the need for cybersecurity professionals. From 2019 to 2029, the Bureau of Labor Statistics projects that employment for information security analysts will grow by The information security jobs will see approximately 40,900 jobs available in the forecast period. In light of the statistics, it is evident that there is high demand for professionals with CISA certification in Dubai.<br
/><br
/><strong>COURSE OUTLINE:</strong><br
/><br
/>Information Systems and Auditing Process<ul><li>Planning</li><li>Execution</li><li>Governance and Management of IT</li></ul>IT Governance<ul><li>IT Management</li><li>Information Systems Acquisition, Development, and Implementation</li></ul>Information Systems Acquisition and Development<ul><li>Information Systems Implementation</li><li>Information Systems Operations and Business Resilience</li></ul>Information Systems Operations<ul><li>Business Resilience</li><li>Protection of Information Assets</li></ul>Information Asset Security and Control<ul><li>Security Event Management</li><li>Protection of Logical Assets</li></ul>Roles and Responsibilities - RACI<ul><li>Asset Management</li><li>Taxonomy - Information Classification</li><li>Risk Management</li><li>Policies, Procedures, Standards, Guidelines, Baselines</li></ul><strong>KEY TAKEAWAYS:</strong><br
/><br
/>Upon completion of our CISA training in Dubai, the candidate will be able to:<ul><li>Assess vulnerabilities and report on compliance and institutional controls</li><li>Identify information security guidelines, standards, and best practices</li><li>Learn to manage and control enterprise IT environments</li><li>Acquire, develop, test, and implement information systems</li><li>Understand the five CISA domains</li></ul><strong>ACCREDITATION:</strong><br
/><br
/>Our CISA courses in Dubai are accredited by ISO 9001: 2015 and the Knowledge and Human Development Authority (KHDA).<br
/><br
/><strong>ALUMNI:</strong> Our academy graduates of CISA courses UAE are successfully placed in some of the top - notch companies in Dubai like Jumeirah, Aramex, Airarabia, Damac, Emaar, etc. They are entrepreneurs, career changers, and lifelong learners.<br
/><br
/><strong>WHY LEARNER&rsquo;S POINT:</strong><br
/><br
/>Being the leading providers of the CISA training Dubai, we have substantial experience in teaching relevant skills and knowledge.<br
/>Our CISA courses Dubai offer the following advantages:<ul><li>Our CISA training Dubai is designed based on real - world scenarios, formulating and evaluating practical requirements</li><li>Our CISA courses Dubai strive to provide a reality check and insight into the requirements of a challenging role and how to fulfill it</li><li>We also provide live interactive sessions and hands - on experience through assignments associated with the actual work environment</li><li>To enhance the learning experience of our students we provide organized group sessions and integrated training modules</li><li>Our discrete approach to career guidance enables our students to get successfully placed in renowned organizations</li></ul><p>Cost: 9000 AED</p><p>Discount: 55% Off for Laimoon Users!</p><p>Duration: 40 Hours</p>					]]>				  </description>				  <pubDate>Mon, 01 Nov 2021 11:39:57 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Ethical Hacker CEH V11  - Learners Point Training Institute , UAE, Dubai,Dubai,Bahrain,Egypt,Iraq,Jordan,Kuwait,Oman,Saudi Arabia,United Arab Emirates,Yemen,Qatar ]]></title><link>https://courses.laimoon.com/course/part-time-certified-ethical-hacker-ceh-v11-learners-point-training-institute/online</link>				  <description>				  <![CDATA[						<strong>OVERVIEW: </strong>The Certified Ethical Hacker course provides professionals with the skills required to master the techniques hackers exploit to hack into networks and defend against them. The Certified Ethical Hacker CEH training Dubai trains professionals on the utilization of advanced methodologies to protect corporate infrastructure from data breaches, such as reverse engineering and creating virus codes.<br
/><br
/><strong>CAREER OPPORTUNITIES:<br
/><br
/>Market Trends:</strong> Due to the proliferation of cybercrime in recent years, the demand for cybersecurity professionals and ethical hackers has grown significantly. The 2020 IBM Cost of a Data Breach Report indicates that the average cost of a data breach is approximately $ million. By 2029, the Bureau of Labor Statistics predicts the rate of employment of Ethical Hackers to rise by 31%. The unprecedented rise in cybercrimes and data breaches has prompted significant growth in job opportunities for professionals with CEH certification in Dubai.<br
/><br
/><strong>Salary Trends: </strong>As the IT security industry sets its feet in the UAE, recruiters are also placing a premium on professionals with CEH certification in Dubai and providing competitive salaries. It was found that professionals with Ethical Hacker certification earn 44% higher salaries than non - certified professionals. Professionals with CEH certification in Dubai in the United Arab Emirates typically earn a monthly income of 16,700 AED, which can rise to 25,200 AED depending on the level of experience.<br
/><br
/><strong>Demand and Opportunities: </strong>The digital revolution has led to the emergence of new concerns about security and privacy, which in turn has led to a rise in the demand for CEH certified professionals. There has been an unexpected growth of 75% in the industry for ethical hackers, a much higher rate than the rest of the occupations. Employers, who are increasingly threatened by data breaches and hacking, are highly motivated to hire qualified ethical hackers to secure their business&#39;s private data, thus fueling the demand for ethical hackers.<br
/><br
/><strong>COURSE OUTLINE:</strong><ul><li>Introduction to Ethical Hacking</li><li>Footprinting and Reconnaissance</li><li>Social Engineering</li><li>Denial-of-Service</li><li>Session Hijacking</li><li>Evading IDS, Firewalls, and Honeypots</li><li>Hacking Web Servers</li><li>Hacking Web Applications</li><li>SQL Injection</li><li>Scanning Networks</li><li>Enumeration</li><li>Vulnerability Analysis</li><li>System Hacking</li><li>Malware Threats</li><li>Sniffing</li><li>Hacking Wireless Networks</li><li>Hacking Mobile Platforms</li><li>IoT and OT Hacking</li><li>Cloud Computing</li><li>Cryptography</li></ul><strong>KEY TAKEAWAYS:</strong><br
/><br
/>Successful completion of our CEH V11 training enables candidates to:<ul><li>Become familiar with concepts of ethical hacking, information security, and security controls</li><li>Scan networks, hosts, and ports with various scanning tools</li><li>List enumeration techniques such as enumerating NFS shares, and querying DNS caches, and describe the countermeasures</li><li>Identify firewalls and intrusion detection systems, their functions, and strategies for protecting against intrusion</li><li>Learn offensive techniques for obtaining, escalating, and maintaining access to the victim while covering the tracks</li></ul><strong>ACCREDITATION:</strong><br
/><br
/>Our Certified Ethical Hacker course is accredited by ISO 9001: 2015 and the Knowledge and Human Development Authority (KHDA).<br
/><br
/><strong>ALUMNI: </strong>Our academy graduates of Ethical Hacking training Dubai are successfully placed in some of the top-notch companies in Dubai like Jumeirah, Aramex, Airarabia, Damac, Emaar, etc. They are entrepreneurs, career changers, and lifelong learners.<br
/><br
/><strong>WHY LEARNER&rsquo;S POINT:</strong><br
/><br
/>Being the leading providers of the Certified Ethical Hacker CEH course in Dubai, we have substantial experience in teaching relevant skills and knowledge.<br
/>Our CEH V11 training course offers the following benefits:<ul><li>Our Certified Ethical Hacker course is designed based on real-world scenarios, formulating and evaluating practical requirements</li><li>Our CEH courses in Dubai strive to provide a reality check and insight into the requirements of a challenging role and how to fulfill it</li><li>Certified Ethical Hacker course provides live interactive sessions and hands-on experience through assignments associated with the actual work environment</li><li>To enhance the learning experience of our students we provide organized group sessions and integrated training modules in our CEH training Dubai</li><li>Our discrete approach to career guidance enables our students to get successfully placed in a renowned organization</li></ul><p>Cost: 12000 AED</p><p>Discount: 50% Off for Laimoon Users!</p><p>Duration: 40 Hours</p>					]]>				  </description>				  <pubDate>Fri, 15 Oct 2021 07:05:06 +04</pubDate>				</item> 								<item><title><![CDATA[Cisco CCNA 200-301   - Al Manal Training Center , Abu Dhabi ]]></title><link>https://courses.laimoon.com/course/cisco-ccna-200-301-al-manal-training-center-1/online</link>				  <description>				  <![CDATA[						I. Introduction to Networks  Exploring the network, configuring a network operating system  Application layer, transport layer  Network protocols and communications  Network layer  IP addressing, subnetting IP networks  Network access  Ethernet II. Routing and Switching Essentials  Routing concepts  Static routing, dynamic routing  Switched networks  Switch configuration  VLANS  Access control lists  DHCP  NAT III. Scaling Networks  LAN design  Scaling VLANs  Spanning tree protocols  Etherchannel and HSRP  Dynamic routing  EIGRP  Single-area OSPF  Multi-area OSPF IV. Connecting Networks  WAN concepts  Point-to-Point connections  Branch connections  Access control lists  Network security and monitoring<p>Cost: 1800 AED</p><p>Duration: Upto 35 Hours</p>					]]>				  </description>				  <pubDate>Fri, 23 Apr 2021 19:07:02 +04</pubDate>				</item> 								<item><title><![CDATA[CCNA - Security  - Learnovate Training Center , Dubai,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/ccna-security-learnovate-training-center/online</link>				  <description>				  <![CDATA[						<strong>CCNA Training in Learnovate 7days in the week</strong><br
/>Learnovate Training Center provides CCNA courses in Dubai and also CCNA Certification in Dubai. Cisco Certified Network Associate&nbsp;(CCNA) Routing and Switching certified program for entry-level network engineers that helps maximize your investment in foundational networking knowledge and increase the value of your employer&rsquo;s network. &nbsp;CCNA certification trains a networking professional&rsquo;s ability to install and configure Cisco switches and routers in multiprotocol internetworks using LAN and WAN interfaces. Stay Tuned with us so we can provide more info about CCNA Course training in Dubai and CCNA course fees in Dubai at learnovate center are very affordable. Call Now for CCNA training in Dubai&nbsp;<br
/><strong>Note</strong>: We can provide Visa Processing and Accommodation to all international students as well.<br
/><br
/><br
/><strong>Contents of CCNA Certification in Dubai</strong><br
/>All candidates who want to start their carrier in the networking field.<br
/>Candidates who are already in the Networking field and want to certify them with the latest version.<br
/>Candidates whose certificates expire and wants to renew their certification<br
/><strong>CCNA COURSE DURATION</strong><br
/>Group &ndash; 25 hours, 30 hours&nbsp;<br
/>Private &ndash; 20 Hours,<br
/>Weekdays and weekends available<br
/><strong>CCNAX (Cisco Certified Network Associate)<br
/>Networking Essential</strong><br
/>Network and Types of Network<br
/>Characteristics of a Network<br
/>Typologies Concepts<br
/>Network Hardware Components<br
/>Common Threats, OSI Reference Model &amp; TCP-IP Stack<br
/>Transport Layer, TCP-UDP Headers<br
/>3 Way handshake, Windowing, Packet delivery and Ethernet Frame<br
/>Data Link Layer<br
/>Network Cabling<br
/>Patching<br
/><strong>IP Address &amp; Ports<br
/>Switching</strong><br
/>How Switch Works, Bootup Process &amp; Features<br
/>Switch Basic Configuration<br
/>Port Security<br
/>Introduction &amp; Configuration of VLAN and Trunk<br
/>Vlan Trucking Protocol, VTP Pruning<br
/>Inter Vlan Routing (Router on a Stick)<br
/>Inter Vlan Routing (Multilayer Switch)<br
/>Introduction to STP Spanning Tree Protocol<br
/>Implementing Rapid Spanning Tree Protocol<br
/><strong>Switch Troubleshooting</strong><br
/>Troubleshooting VLAN<br
/>Upgrade/Downgrade ios<br
/>Backup of ios &amp; Configuration Through TFTP Server<br
/>Reset Password of Cisco Switches<br
/><strong>Routing</strong><br
/>How Routers Works, Bootup Process &amp; Features<br
/>IPV4 Subnetting<br
/>Static Routing &amp; Default-Route<br
/>VLSM (Variable Length Subnet mask)<br
/>RIP Routing Protocol<br
/>RIP Loops and Prevention<br
/>Route Aggregation OR Supernetting<br
/>Introduction to OSPF Routing Protocol<br
/>Configuration of OSPF, Areas and ABR<br
/>Troubleshooting OSPF<br
/>IPV6<br
/>IPV6 &amp; OSPFV3<br
/>Introduction and Configuration of EIGRP Routing Protocol<br
/>EIGRP and OSPF<br
/>BGP Routing Protocol<br
/><strong>Router Troubleshooting</strong><br
/>Upgrade/Downgrade ios<br
/>Backup of ios &amp; Configuration Through TFTP Server<br
/>Reset Password of Cisco Routers<br
/><strong>WAN Infrastructure</strong><br
/>WAN Introduction<br
/>Default HDLC Encapsulation (Cisco Proprietary)<br
/>Introduction &amp; Configuring PPP<br
/>Introduction of MPLS<br
/>Introduction &amp; Configuration GRE Tunnel<br
/>Introduction of DMVPN<br
/><strong>Access Control List</strong><br
/>Introduction Type of Access Control List<br
/>Configuring of Standard ACL<br
/>Configuring of Extended ACL<br
/>Configuring of Name &amp; Numbered ACL<br
/>IPV4 Services ACL &amp; QoS<br
/><strong>Wireless</strong><br
/>Fundamentals of Wireless LAN<br
/>Analyzing Cisco Wireless Architecture<br
/>Securing wireless Network, EAP, 802 1x, PEAP, EAP-TLS<br
/>Setting Cisco wireless Network, Cisco<br
/><strong>Network Address Translation (NAT)<br
/>EtherChannel<br
/>FHRP, HSRP, GLBP, VRRP<br
/>Basics of NMS &amp; Network Management Protocol<br
/>SNMP Version3 and NetFlow<br
/>VTP, VLAN, STP, Stacking, Chassis Aggregation, VSS<br
/>Quality of Services (QoS)<br
/>HSRP And IPV4 Revision<br
/>SNMP, IP SLA, SPAN, Cloud Computing<br
/>SLAAC (Stateless Address Auto Configuration)<br
/>Software Defined Network<br
/>Cisco IOS licenses and Recently introduces Cisco Universal Operating System</strong><br
/><br
/><strong>CCENT/CCNA &ndash; ICND 1</strong><ul><li>Part I: Networking Fundamentals</li><li>Part II: LAN Switching</li><li>Part III: IP Routing</li><li>Part IV: Wide-Area Networks</li><li>Part V: Final Preparation</li></ul><br
/><strong>CCNA &ndash; ICND 2</strong><ul><li>Part I: LAN Switching</li><li>Part II: IP Routing</li><li>Part III: Routing Protocols Configuration and Troubleshooting</li><li>Part IV: Wide-Area Networks</li><li>Part V: Scaling the IP Address Space</li></ul><p>Cost: 2000 AED</p><p>Discount: 15% Off for Laimoon Users!</p><p>Duration: 30 To 40 Hours</p>					]]>				  </description>				  <pubDate>Mon, 22 Mar 2021 14:05:55 +04</pubDate>				</item> 								<item><title><![CDATA[CCTV Cameras and Surveillance  - Learnovate Training Center , Dubai,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/graphic-design-photoshop-illustrator-in-design-learnovate-training-center/online</link>				  <description>				  <![CDATA[						<strong>CCTV Training in Learnovate 7 days in the week</strong><br
/><br
/>Learnovate offers CCTV courses in Dubai. Now a day everyone wants security around them. if you are looking for the best institute for CCTV Courses in Dubai then it&#39;s the right place for you. Learnovate Training Center Provides you with the best training in CCTV we have the best expert and qualified staff.<br
/><br
/>Don&rsquo;t go anywhere register now for the course and learn about CCTV cameras in Dubai. Learnovate is the best among the CCTV companies in Dubai that offer CCTV operator training and gives you more skills about it. after that, you will be able to get a good job in the CCTV security company. To learn CCTV course in Dubai Call Us.<br
/><br
/><strong>Course Content</strong><br
/><br
/>CCTV Design Tool introduction<br
/>Different Category of cabling<br
/>Video Signal of CCTV<br
/>CCTV setup<br
/>Configure IP of the CCTV<br
/>CCTV troubleshot<br
/>Modeling a CCTV system<br
/>Efficient construction of a CCTV method<br
/><br
/><strong>Who wants this course?</strong><br
/><br
/>All candidates who want to progress in their career in the CCTV field and want to learn about CCTV Installation in Dubai.<br
/>Individuals who are looking to get a job in the CCTV field.<br
/><br
/>Candidates who are already in the CCTV field and want to certify them with the latest version.<br
/><br
/>Those who are working as IT professionals at the immediate level in networking-related areas benefit a lot from our certification programs.<br
/><br
/><strong>Course Duration</strong><br
/><br
/>Group &ndash;&nbsp; 40 hours&nbsp;<br
/>Private &ndash; 20 Hours<br
/>Get CCTV training in Dubai, on Weekdays and weekends. We are available.<p>Cost: 2000 AED</p><p>Discount: 15% Off for Laimoon Users!</p><p>Duration: 20 To 30 Hours</p>					]]>				  </description>				  <pubDate>Sun, 21 Mar 2021 14:15:51 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Security Manager  - LEORON Professional Development Institute , Dubai,Azerbaijan,Georgia,Kazakhstan,Oman,Saudi Arabia ]]></title><link>https://courses.laimoon.com/course/certified-information-security-manager-cism-leoron-professional-development-institute/online</link>				  <description>				  <![CDATA[						This CISM exam preparation seminar provides an overview and key points of all domains of the CISM exam. We offer the CISM exam preparation seminar in association with the ISACA Local ;<br
/>CISM Prep seminar covers four information security management areas, each further defined through Tasks &amp; Knowledge ;<br
/>These areas and statements were approved by the CISM Certification Committee and represent a job practice analysis of the work performed by information security managers as validated by prominent industry leaders, subject matter experts and industry practitioners.<p>Cost: 5670 USD</p><p>Duration: 4 Days</p>					]]>				  </description>				  <pubDate>Mon, 24 Feb 2020 15:47:10 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Security Manager (CISM)  - Duke Training Centre , UAE, Abu Dhabi,Abu Dhabi ]]></title><link>https://courses.laimoon.com/course/part-time-certified-information-security-manager-cism-duke-training-centre/online</link>				  <description>				  <![CDATA[						Duke&rsquo;s Certified Information Security Manager (CISM) is a high-end certification provided by ISACA. ISACA is an international professional association focused on IT governance. CISM is a course that focuses on the knowledge of developing and managing an enterprise information system. CISM is all about Information and its security. The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise&rsquo;s information security.<br
/>CISM is internationally recognized and one of the highest paid jobs. For becoming CISM certified you need to pass the test by ISACA that&rsquo;s taken three times every year. More information about the CISM certification and exam can be found on the ISACA website.<p>Cost: 4999 AED</p><p>Duration: Upto 35 Hours</p>					]]>				  </description>				  <pubDate>Thu, 13 Feb 2020 19:55:10 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information System Auditor (CISA)  - Duke Training Centre , Abu Dhabi,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/part-time-certified-information-system-auditor-cisa-duke-training-centre/online</link>				  <description>				  <![CDATA[<p>Certified Information Systems Auditor (CISA) certification is an internationally recognized certification by ISACA for those who audit, monitor, control and assess IT and business systems. This CISA training in Abu Dhabi validates that you have the required expertise to help diagnose and assess vulnerabilities in any organization's Information System. It showcases your audit experience, knowledge and skillset to assess an information system's security, efficiency and effectiveness.</p><p>Organizations today rely upon CISA experts who know how to secure systems, diagnose and report on the security practices, adequacy of system controls to assure data integrity and the system's compliance with applicable policies, laws, standards and regulations.</p><p>Cost: 4999 AED</p><p>Duration: Upto 35 Hours</p>					]]>				  </description>				  <pubDate>Thu, 13 Feb 2020 19:37:09 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Security Manager (CISM)  - Delphi Star Training Centre , UAE, Dubai,Dubai,Abu Dhabi,Muscat,Saudi Arabia,United Arab Emirates,Riyadh,Oman,Jeddah,Bahrain,Egypt,Ethiopia,Kenya,Kuwait ]]></title><link>https://courses.laimoon.com/course/part-time-certified-information-security-manager-cism-delphi/online</link>				  <description>				  <![CDATA[						The ISACA governed Certified Information Security Manager (CISM) certification is the most sought-after certification in the Information Security arena. Established in 2002, the CISM is a management-focused globally renowned credential for professionals who create, build and administer enterprise security programs. This certification is a professional certification sponsored by the reputed Information Systems Audit and Control Association (ISACA).<br
/>The CISM certification training is intended towards professionals working in managerial, consulting or related views in IT operations or compliance. Several CISM Certified Professionals today are functioning in the capacities of IT Directors, Audit Directors, CIOs, CISOs, CEOs, CFOs and other leadership positions showcasing a good demand as well as career advancement potential of the credential.<br
/><br
/><strong>CISM Course Structure:</strong><ul><li>Area 1&mdash;Information Security Governance (24%)</li><li>Area 2&mdash;Information Risk Management (30%)</li><li>Area 3&mdash;Information Security Program Development and Management (27%)</li><li>Area 4&mdash;Information Security Incident Management (19%)</li></ul><p>Cost: 2799 AED</p><p>Duration: 20 To 40 Hours</p>					]]>				  </description>				  <pubDate>Tue, 22 Oct 2019 16:37:21 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Systems Security Professional (CISSP)  - Delphi Star Training Centre , UAE, Dubai,Dubai,Abu Dhabi,Muscat,Saudi Arabia,United Arab Emirates,Riyadh,Jeddah,Bahrain,Egypt,Ethiopia,Kenya,Kuwait,Oman,Sudan ]]></title><link>https://courses.laimoon.com/course/part-time-certified-information-systems-security-professional-cissp-delphi/online</link>				  <description>				  <![CDATA[						This course assists a learner in preparing, studying, and passing the Certified Information Systems Security Professional (CISSP) Cybersecurity Examination. The exam covers Eight domains of cybersecurity knowledge, including access control systems and methodology, network and telecommunications security, security management and practices, applications and systems development security, cryptography, security and architecture models, operations security, business continuity and disaster recovery planning, law, investigation, and ethics, as well as physical security.<br
/><br
/>The CISSP certification is essential for security professionals to be successful in their careers. Many employers value the CISSP for its designation as a standard for security professionals. While the investments in time and money are substantial, the career rewards can be respected as professionals with the CISSP are in need.<br
/><br
/><em>There will be 20 million job vacancies in cybersecurity by 2020.</em><br
/><br
/><strong>Become a cybersecurity professional this millennial!</strong><p>Cost: 3299 AED</p><p>Discount: 20% Off for Laimoon Users!</p><p>Duration: 30 To 50 Hours</p>					]]>				  </description>				  <pubDate>Tue, 22 Oct 2019 16:31:26 +04</pubDate>				</item> 								<item><title><![CDATA[ITIL (Information Technology Infrastructure Library)  - Delphi Star Training Centre , UAE, Dubai,Dubai,Abu Dhabi,Muscat,United Arab Emirates,Saudi Arabia,Riyadh,Jeddah,Oman ]]></title><link>https://courses.laimoon.com/course/part-time-itil-information-technology-infrastructure-libraby-delphi/online</link>				  <description>				  <![CDATA[<p><strong>ITIL Foundation Course:</strong><br>The&nbsp;Information Technology Infrastructure Library, popularly known as&nbsp;ITIL&nbsp;Certification is a framework based on industry best practices to apply IT Service Management Business Processes to IT Management.<br>Management of IT Services is all about long-term oversight. It's critical for firms that want to deliver products successfully to plan out and oversee each stage of a service's life-cycle. ITIL Foundation training gives students a knowledge base for each Service Area as they help their firms plan out projects from beginning to end.<br>For Network Administrators and other IT professionals, being able to implement ITIL could lead to more central and valued roles within their current Organizations. The way to gain those skills may be through the ITIL Foundation Certification program in Dubai.</p><p>Cost: 1200 AED</p><p>Duration: Upto 3 Days</p>					]]>				  </description>				  <pubDate>Thu, 26 Sep 2019 14:52:30 +04</pubDate>				</item> 								<item><title><![CDATA[CCNAX  - Learners Point Training Institute , UAE, Dubai,Dubai,Bahrain,Kuwait,Oman,Qatar,Saudi Arabia,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/ccnax-learners-point-training-institute/online</link>				  <description>				  <![CDATA[						CCNA is the one-exam entry level certification also known as &lsquo;Cisco Certified Network Associate Routing &amp; ; This course tests a candidate&#39;s knowledge and skills required to install, operate, and troubleshoot a small-to-medium size enterprise branch network.<br
/><br
/>Course Objectives<ul><li>To provide CCNAX preparation to students pursuing a Cisco certification. The training follows official outlined guides and course material provided by Cisco and is taught by trainers from within the profession</li></ul><strong>Course Modules</strong><br
/><br
/>Network Fundamentals<ul><li>Explain the role and function of network components</li><li>Describe the characteristics of network topology architectures</li><li>Compare physical interface and cabling types</li><li>Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)</li><li>Compare TCP to UDP</li><li>Configure and verify IPv4 addressing and subnetting</li><li>Describe the need for private IPv4 addressing</li><li>Configure and verify IPv6 addressing and prefix</li><li>Compare IPv6 address types</li><li>Verify IP parameters for Client OS (Windows, Mac OS, Linux)</li><li>Describe wireless principles</li><li>Explain virtualization fundamentals (virtual machines)</li><li>Describe switching concepts</li></ul><strong>Network Access</strong><ul><li>Configure and verify VLANs (normal range) spanning multiple switches</li><li>Configure and verify Interswitch connectivity</li><li>Course outline</li><li>Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)</li><li>Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)</li><li>Describe the need for and basic operations of Rapid PVST+</li><li>Spanning Tree Protocol and identify basic operations</li><li>Compare Cisco Wireless Architectures and AP modes</li><li>Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG)</li><li>Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)</li><li>Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings</li></ul><strong>IP Connectivity</strong><ul><li>Interpret the components of the routing table</li><li>Determine how a router makes a forwarding decision by default</li><li>Configure and verify IPv4 and IPv6 static routing</li><li>Configure and verify single area OSPFv2</li><li>Describe the purpose of the first-hop redundancy protocol</li></ul><strong>IP Services</strong><ul><li>Configure and verify inside source NAT using static and pools</li><li>Configure and verify NTP operating in a client and server mode</li><li>Explain the role of DHCP and DNS within the network</li><li>Explain the function of SNMP in network operations</li><li>Describe the use of Syslog features including facilities and levels</li><li>Configure and verify the DHCP client and relay</li><li>Explain the forwarding per-hop behaviour (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping</li><li>Configure network devices for remote access using SSH</li><li>Describe the capabilities and function of TFTP/FTP in the network</li></ul><strong>Security Fundamentals</strong><ul><li>Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)</li><li>Describe security program elements (user awareness, training, and physical access control)</li><li>Configure device access control using local passwords</li><li>Describe security password policy elements, such as management, complexity, and password alternatives (multi-factor authentication, certificates, and biometrics)</li></ul><p>Cost: 8500 AED</p><p>Discount: 55% Off for Laimoon Users!</p><p>Duration: Upto 40 Hours</p>					]]>				  </description>				  <pubDate>Sun, 19 May 2019 12:44:47 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Ethical Hacker (CEH)  - Al Manal Training Center , United Arab Emirates, Abu Dhabi,Abu Dhabi ]]></title><link>https://courses.laimoon.com/course/certified-ethical-hacker-ceh-al-manal-training-center-1/online</link>				  <description>				  <![CDATA[						Certified Ethical Hacker (CEH) Course Outline:<br><br>Introduction to Ethical Hacking<br>Foot-printing and Reconnaissance<br>Scanning Networks<br>Enumeration<br>Vulnerability Analysis<br>System Hacking<br>Malware Threats<br>Sniffing<br>Social Engineering<br>Denial-of-Service<br>Session Hijacking<br>Evading IDS, Firewalls, and Honeypots<br>Hacking Web Servers<br>Hacking Web Applications<br>SQL Injection<br>Hacking Wireless Networks<br>Hacking Mobile Platforms<br>IoT Hacking<br>Cloud Computing<br>Cryptography<br><br>Certified Ethical Hacker (CEH) Course Outline<br>Introduction to Ethical Hacking<br>Foot-printing and Reconnaissance<br>Scanning Networks<br>Enumeration<br>Vulnerability Analysis<br>System Hacking<br>Malware Threats<br>Sniffing<br>Social Engineering<br>Denial-of-Service<br>Session Hijacking<br>Evading IDS, Firewalls, and Honeypots<br>Hacking Web Servers<br>Hacking Web Applications<br>SQL Injection<br>Hacking Wireless Networks<br>Hacking Mobile Platforms<br>IoT Hacking<br>Cloud Computing<br>Cryptography<br><br>Who Should do a Certified Ethical Hacker (CEH) Training in Abu Dhabi - UAE<br>Network Security Engineers<br>cyber security engineers<br>Network Admin<br><br>Certified Ethical Hacker (CEH) Course&nbsp;Benefits:<br>This course will help you enhance your knowledge of risks and susceptibilities<br>You will learn how to think like hackers<br>You will see a significant salary boost<br>You will be able to progress your security career<br>You will easily learn to leverage the real hacking tools<p>Cost: 5999 AED</p><p>Duration: Upto 35 Hours</p>					]]>				  </description>				  <pubDate>Thu, 07 Mar 2019 18:29:19 +04</pubDate>				</item> 								<item><title><![CDATA[Information Security Management  - Convertas , Dubai,Kuala Lumpur, Istanbul,Malaysia,Turkey,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/five-days-information-security-management-convertas/online</link>				  <description>				  <![CDATA[						<strong>Day One:<br>Information Security Management - An Overview</strong><br>&nbsp;IT Risk Management<br>&nbsp;Categorizing Physical and Electronic Risk<br>&nbsp;IT and Networks<br>&nbsp;Computer Systems Design<br>&nbsp;Legal and Regulatory Considerations<br>&nbsp;Information, Business and Risk - Case Study<br>&nbsp;<br><strong>Day Two:<br>Information Security Management</strong><br>&nbsp;Ensuring Information Security<br>&nbsp;Confidentiality<br>&nbsp;Integrity<br>&nbsp;Availability<br>&nbsp;Authenticity<br>&nbsp;Non Repudiation of Data<br>&nbsp;Ethical hacking and Industrial Espionage<br>&nbsp;Where to design and place effective computer and management controls<br>&nbsp;<br><strong>Day Three:<br>Information Management - International Standards</strong><br>&nbsp;Code or Practice for Information Security Management - ISO 17799 / ISO27002<br>&nbsp;Best Practice and Implementing Guidance and Controls For ISO27002<br>&nbsp;Information Security Management Overview<br>&nbsp;Risk Assessment and Controls<br>&nbsp;Security Policy Documentation<br>&nbsp;Organizing Information Security Management<br>&nbsp;IT Asset Management<br>&nbsp;Personnel and Human Resources<br>&nbsp;<br><strong>Day Four:<br>Information Management ISO27002</strong><br>&nbsp;Best Practice and Implementing Guidance and Controls For ISO27002<br>&nbsp;Physical and Environmental Security<br>&nbsp;Operations Management and Communications<br>&nbsp;Access Control<br>&nbsp;Information Systems (Design, Development, Maintenance)<br>&nbsp;Incident Management<br>&nbsp;Business Continuity<br>&nbsp;Regulatory Compliance<br>&nbsp;Best Practice and Implementation Guidance for BS ISO/IEC 38500:2008<br>&nbsp;Case Study<br>&nbsp;<br><strong>Day Five:<br>Implementing Effective Information Security Management Frameworks</strong><br>&nbsp;Successful steps for IT Security Management<br>&nbsp;Audit and Compliance for IT Resources<br>&nbsp;Business Process Engineering<br>&nbsp;Case Study<br>&nbsp;<br>&nbsp;<p>Cost: 3995 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Sun, 09 Dec 2018 11:27:53 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information System Auditor (CISA)  - Delphi Star Training Centre , UAE, Sharjah ]]></title><link>https://courses.laimoon.com/course/four-days-part-time-certified-information-system-auditor-cisa-delphi/online</link>				  <description>				  <![CDATA[						CISA&nbsp;Certification is a globally acknowledged certification for IS Audit Control, Assurance and Security Professionals. It is sponsored by the&nbsp;ISACA&nbsp;(Information Systems Audit and Control Association). A&nbsp;CISACertificate helps in demonstrating the followings -<br
/><br
/>Audit Experience<br
/>Skills and Knowledge<br
/>Ability to Manage Vulnerabilities<br
/>Capability to Ensure Compliance, and<br
/>Competence to Institute Controls within Organization<ul><li>The&nbsp;CISA&nbsp;Course is focused on providing an improved understanding of IS Security Audit Processes and better awareness on how to protect Information Systems.</li></ul>&nbsp;<ul><li>Completing the CISA Certification&nbsp;ensures that the IT Professional has the necessary Knowledge and Experience for adequately Controlling, Monitoring and Assessing an Enterprise&#39;s IT and Business ;The CISA online course proves that the Professional can perform reviews while adhering to Global Standards, Practices and Guidelines.</li></ul>&nbsp;<ul><li>The CISA (Certified Information Security Auditor) helps IT Security and Audit Professionals to quantify and market their Experience.</li><li>CISA course demonstrates the level of knowledge acquired and maintained to meet Dynamic Challenges and increases their value in the Organization resulting in higher earnings and Career Growth.</li><li>Being CISA Certified not only gives individuals a competitive edge but also helps them to become part of the Elite Peer Network.</li></ul><p>Cost: 2199 AED</p><p>Discount: 31% Off for Laimoon Users!</p><p>Duration: 28 To 40 Hours</p>					]]>				  </description>				  <pubDate>Thu, 20 Sep 2018 23:09:12 +04</pubDate>				</item> 								<item><title><![CDATA[CISM  - Duke Training Centre , United Arab Emirates, Abu Dhabi,Abu Dhabi ]]></title><link>https://courses.laimoon.com/course/upto-thirty-hours-cism-duke-training-centre/online</link>				  <description>				  <![CDATA[						<strong>Summary&nbsp;</strong><br><br>Certified Information Security Manager (CISM) is a high-end certification provided by ISACA. ISACA is an international professional association focused on IT governance. CISM is a course that focuses on the knowledge of developing and managing an enterprise information system. CISM is all about Information and its security. The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise's information ;<br><br>CISM is internationally recognized and one of the highest paid jobs. For becoming CISM certified you need to pass the test by ISACA that's taken three times every year. More information about the CISM certification and exam can be found on the ISACA ;<br><br><strong>Course Outline&nbsp;</strong><br><br>Introduction<br> Certified Information Security Manager (CISM) Course Intro<br> Certified Information Security Manager (CISM) Exam Module<br><br>Module 01 - Information Security Governance<br> An Introduction to Information Security Governance<br> The Role of Information Security within an Organization<br> Confidentiality, Integrity and Availability: The C-I-A Triad<br> Information Security Governance<br> Secure Network Design Concepts<br> Securing the Local Area Network (LAN)<br> Access Control Models<br> Cryptography<br> Hybrid Cryptography in SSL/TLS<br> Digital Certificates<br> Information Security Governance and the Law<br> Export/Import Restrictions<br><br>Module 02 - Risk Management<br> An Overview of Risk Management<br> Risk Related Definitions<br> The NIST 800-30 of Risk Assessment<br> Additional Risk Terms<br><br>Module 03 - Security Architecture<br> An Overview of Information Security Program Management<br> Security Models<br> Evaluation Criteria<br> Additional Evaluation Criteria<br> Technical Project Management<br><br>Module 04 - Information Security Management<br> An Overview of Information Security Management<br> Service Level Agreements<br> Configuration Management and Change Control<br> Monitoring and Auditing<br><br>Module 05 - Incident Response and Business Continuity<br> An Overview of Incident Response and Business Continuity<br> Intrusion Detection Systems<br> Security Incident Response<br> Business Continuity and Disaster Recovery<br> Business Continuity Sub-Plans<br> Recovery Strategies<br><br>For more information please contact&nbsp;<br><strong>Duke Training Centre, Abu Dhabi &amp;&nbsp;Musaffah.</strong><br>&nbsp;<p>Cost: 5000 AED</p><p>Duration: Upto 30 Hours</p>					]]>				  </description>				  <pubDate>Tue, 28 Nov 2017 14:12:32 +04</pubDate>				</item> 								<item><title><![CDATA[Designing and Deploying Microsoft Exchange Server 2016 (Course 20345-2A)  - Etisalat Academy , Dubai ]]></title><link>https://courses.laimoon.com/course/designing-and-deploying-microsoft-exchange-server-2016-course-20345-2a/online</link>				  <description>				  <![CDATA[<p>This course provides experienced Exchange Server administrators with the knowledge to design and implement an Exchange Server 2016 messaging environment. Students will learn how to design and configure advanced components in an Exchange Server 2016 deployment such as site resiliency, advanced security, compliance, archiving, and discovery solutions. In addition, students will learn about coexistence with other Exchange organizations or Exchange Online, and migration from previous versions of Exchange Server. The course will provide guidelines, best practices, and considerations that will help students optimize their Exchange Server deployment.</p><p><strong>Audience profile</strong></p><p>This course is intended for IT professionals who are experienced messaging administrators, messaging architects, or consultants. This course is designed for professionals in an enterprise environment who are responsible for designing and deploying Exchange Server 2016 solutions, including environments that contain previous versions of Exchange Server or Exchange Online. Students are expected to have experience with Exchange Server 2016 or previous versions of Exchange Server.</p><p>This course is also intended as preparation material for IT professionals who are looking to take the 70-345: Designing and Deploying Microsoft Exchange Server 2016 exam as part of the requirement for the MCSE: Microsoft Exchange Server 2016 certification.n.</p><p><strong>At course completion</strong></p><p><ul><li>After completing this course, students will be able to:<br></li><li>Plan for Exchange Server deployments.<br></li><li>Plan and deploy Exchange Server 2016 Mailbox services.<br></li><li>Plan and deploy message transport.<br></li><li>Plan and deploy client access.<br></li><li>Design and implement high availability.<br></li><li>Maintain Exchange Server 2016.<br></li><li>Design messaging security.<br></li><li>Design and implement message retention.<br></li><li>Design messaging compliance.<br></li><li>Design and implement messaging coexistence.<br></li><li>Upgrade to Exchange Server 2016.<br></li><li>Plan a hybrid Exchange Server deployment.<br></li></ul></p><br><p><strong>Prerequisites:&nbsp;</strong></p><br><p>Before attending this course, students must have:</p><p><ul><li>A+ certification or equivalent knowledge.<br></li><li>Network+ certification or equivalent knowledge.<br></li><li>Completed Course 2028A, Basic Administration of Microsoft Windows 2000, or have equivalent knowledge of administrative tasks.<br></li></ul></p><br><p>In addition to professional experience, students who attend this training should already have the following technical knowledge:</p><br><p><ul><li>Attended course 20345-1A: Administering Exchange Server 2016, or have equivalent knowledge.<br></li><li>Minimum two years of experience working with any version of Exchange Server.<br></li><li>Minimum of six months of experience working with Exchange Server 2013 or Exchange Server 2016.<br></li><li>Minimum of two years of experience administering the Windows Server 2012 R2.<br></li><li>Minimum two years of experience working with Active Directory Domain Services (AD DS).<br></li><li>Minimum of two years of experience working with name resolution, including Domain Name System (DNS).<br></li><li>Experience working with certificates, including public key infrastructure (PKI) certificates.<br></li><li>Experience working with Windows Powershell."<br></li></ul></p><p>Cost: 4500 AED</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Sun, 26 Feb 2017 12:14:35 +04</pubDate>				</item> 								<item><title><![CDATA[EC-Council-Certified Network Defender (CND)  - Etisalat Academy , Dubai ]]></title><link>https://courses.laimoon.com/course/ec-council-certified-network-defender-cnd/online</link>				  <description>				  <![CDATA[<p>Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.</p><p>The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.&nbsp;</p><p><strong>Who Should Attend?&nbsp;</strong></p><p>Network Administrators, Network security Administrators, Network Security Engineer, Network Defense Technicians, CND Analyst, Security Analyst and Security Operator, Anyone who involves in network operations&nbsp;</p><p><strong>Exam Information</strong>:&nbsp;</p><p>The CND certification exam will be conducted on the last day of training. Students need to pass the online ECC exam 312-38 to receive the CND certification. "</p><br><p>Cost: 6000 AED</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Thu, 23 Feb 2017 16:09:56 +04</pubDate>				</item> 								<item><title><![CDATA[CCNP  - NLP Tech , Dubai ]]></title><link>https://courses.laimoon.com/course/ccnp-6/online</link>				  <description>				  <![CDATA[<p>Cisco Certified Network Professional (CCNP &nbsp;) validates the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks and work collaboratively with specialists on advanced security, voice, wireless and video solutions.</p><p>The CCNP certification is appropriate for those with at least one year of networking experience who are ready to advance their skills and work independently on complex network solutions. Those who achieve CCNP have demonstrated the skills required in enterprise roles such as network technician, support engineer, systems engineer or network engineer.</p><p><strong>Target Audience:</strong></p><p></p><ul><li>Networking Professionals and Internetworking Professionals&nbsp;<br></li></ul><p></p><p><strong>Prerequisites:</strong></p><p></p><ul><li>Valid CCNA certification or any CCIE Certification can act as a pre-requisite.&nbsp;<br></li></ul><p></p><p><strong>Course Outline:</strong></p><p></p><ul><li>CCNP - Route (Implementing Cisco IP Routing)&nbsp;<br></li><li>Exam# 642-902 ROUTE<br></li></ul><p></p>&nbsp;<p>Cost: 2995 AED</p><p>Duration: 30 Hours</p>					]]>				  </description>				  <pubDate>Sat, 13 Aug 2016 11:50:05 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Security Manager (CISM)  - Vedant Training , Dubai, UAE, Abu Dhabi, Online ]]></title><link>https://courses.laimoon.com/course/certified-information-security-manager-cism-3/online</link>				  <description>				  <![CDATA[<p>CISM means higher earning potential and career advancement. Recent independent studies consistently rank CISM as one of the highest paying and sought after IT certifications.<br><strong>Demonstrate your information security management expertise. </strong></p><ul><li>The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages designs, and oversees and assesses an enterprise's information security&nbsp;</li></ul><p><strong>Information Security Governance </strong></p><ul><li>Information Risk Management and Compliance&nbsp;</li><li>Information Security Program Development and Management&nbsp;</li><li>Information Security Incident Management</li></ul><p>Cost: 2900 AED</p><p>Duration: 4 Days</p>					]]>				  </description>				  <pubDate>Tue, 05 Apr 2016 13:01:56 +04</pubDate>				</item> 								<item><title><![CDATA[ ISMS Auditor - ISO 27001:2013  - Sanbook Quality Consultancy , Dubai, Abu Dhabi ]]></title><link>https://courses.laimoon.com/course/irca-approved-information-security-management-systems-isms-auditor-iso-27001/online</link>				  <description>				  <![CDATA[						Auditing is crucial to the success of any management system. This five-day intensive course trains ISMS auditors to lead, plan, manage and implement an Audit Plan. It also empowers them to give practical help and information to those who are working towards certification and also provides the knowledge and skill required to carry out 2nd party auditing (suppliers and subcontractors).<br
/><strong>Course Structure: </strong><br
/>A combination of tutorials, syndicate exercises and role play, including the following topics:<ul><li>ISMS;&nbsp;</li><li>ISMS standards;&nbsp;</li><li>Management system audit;&nbsp;&nbsp;</li><li>Explain the role of an auditor to plan, conduct, report and follow up an Information Security MS audit in accordance with ISO 19011 (and ISO 17021 where appropriate).&nbsp;</li></ul><strong>How will I benefit ? </strong><br
/>Effective auditing helps to ensure that the measures you put in place to protect your organization and your customers are properly managed and achieve the desired result.<br
/><strong><em>Sanbook quality consultancy will be issued certificate to all attendees on successful completion of the course. </em></strong><p>Cost: 1500 AED</p><p>Duration: Upto 2 Days</p>					]]>				  </description>				  <pubDate>Thu, 25 Feb 2016 14:52:17 +04</pubDate>				</item> 								<item><title><![CDATA[Hardware & Networking  - Jurassic Institute of Management and Technology  , Bur Dubai, Dubai and King Faisal Road, Sharjah ]]></title><link>https://courses.laimoon.com/course/hardware--networking/online</link>				  <description>				  <![CDATA[						<strong>Course Overview:</strong><br
/><br
/>Join the <strong>Hardware &amp; Networking</strong> course at <strong>Aptech Computer Training</strong>, available at our<strong> Dubai &amp; Sharjah</strong> branches. This comprehensive course provides a deep dive into the world of Computer Hardware &amp; Practical Networking. Designed to equip learners with the essential skills needed to assemble, configure, maintain, and troubleshoot hardware systems, as well as build, secure, and manage networks.<br
/><br
/>The course covers a wide range of topics, including computer fundamentals, storage devices, assembling PCs, BIOS/CMOS configuration, operating systems, microprocessors, power supply systems, and motherboard functionalities. Additionally, practical networking concepts are thoroughly addressed, such as network protocols, IP addressing, network security, setting up workgroups, domains, and wireless networks.<br
/><br
/>Through hands-on training, participants will gain practical expertise in installing, configuring, and maintaining computer hardware and networking systems. Whether you are a beginner aspiring to enter the IT field or a professional looking to expand your skills, this course offers a structured learning path to achieve your goals.<br
/><br
/>At the end of this course, participants will be awarded a <strong>KHDA</strong>-certified certificate, validating their expertise and enhancing their career prospects.<br
/><br
/><strong>Who Can Enroll?</strong><ul><li>Aspiring IT professionals.</li><li>Networking enthusiasts.</li><li>System administrators.</li><li>Anyone looking to start a career in IT hardware and networking.</li></ul><strong>Course Outcomes:</strong><ol><li>Proficiency in computer hardware assembly and maintenance.</li><li>Ability to install, configure, and manage networks.</li><li>Skills to implement security measures and troubleshoot networking issues.</li><li>Expertise in setting up and managing domain networks.</li></ol><strong>Course Outline:</strong><br
/><br
/><strong>Module I: Computer Hardware</strong><br
/><strong>Chapter 1:</strong> Computer Fundamentals (Definition, Characteristics, Hardware, Software, Firmware, System Components)<br
/><strong>Chapter 2:</strong> Primary Storage Devices (RAM - Static &amp; Dynamic, DRAM, SDRAM, DDR2, DDR3, DDR4, ROM)<br
/><strong>Chapter 3:</strong> Secondary Storage Devices (HDD, SSD, Optical Drives, Flash Memory, SATA, IDE, Master-Slave Configuration)<br
/><strong>Chapter 4:</strong> Assembling a PC (Processor, Cooling Fan, RAM, Motherboard, Power Supply, Disk Drives, OS Installation, Partitioning, Formatting)<br
/><strong>Chapter 5:</strong> BIOS &amp; CMOS (BIOS, POST, Setup Program, Boot Process, CMOS Battery, Flashing BIOS)<br
/><strong>Chapter 6:</strong> Operating Systems (Installing Windows, Dual-Boot, Device Drivers, Disk Management, Backup &amp; Restore, Virus Prevention)<br
/><strong>Chapter 7: </strong>Switching Mode Power Supply (Power Supply Components, Testing, UPS)<br
/><strong>Chapter 8:</strong> Microprocessors (Specifications, Clock Speed, Cache Memory, Hyper-Threading, Intel &amp; AMD Processors)<br
/><strong>Chapter 9:</strong> Motherboards (Form Factors, Processor Sockets, Expansion Slots, IDE/SATA Connectors, Power Connectors)<br
/><br
/><strong>Module II: Practical Networking</strong><br
/><strong>Chapter 1:</strong> Basic Network Concepts (NIC, Cables, Switches, Routers, Workgroups, Domains, Clients &amp; Servers)<br
/><strong>Chapter 2:</strong> Installing &amp; Configuring OS for Networking (Installing Windows, NIC Configuration)<br
/><strong>Chapter 3:</strong> Workgroup Network Management (IP Configuration, PING, File Sharing)<br
/><strong>Chapter 4:</strong> Network Protocols &amp; IP Addressing (Static &amp; Dynamic IP, Subnetting, DNS, IPconfig)<br
/><strong>Chapter 5:</strong> Securing Resources (NTFS Permissions, User &amp; Group Management, Sharing Permissions)<br
/><strong>Chapter 6:</strong> Network Printer Setup (Local &amp; Network Printer Installation, Printer Permissions)<br
/><strong>Chapter 7:</strong> Domain Networks (Active Directory, Domain Controller, User Management)<br
/><strong>Chapter 8:</strong> Network Cabling &amp; Crimping (Cabling Techniques, Cable Testing)<br
/><strong>Chapter 9:</strong> Wireless Networking (Wi-Fi, Bluetooth, WiMax)<br
/><br
/><strong>Career Opportunities:</strong><ul><li>Hardware Technician</li><li>Network Administrator</li><li>IT Support Specialist</li><li>Network Engineer</li><li>System Administrator</li></ul><strong>Why Choose Us?</strong><br
/><br
/><strong>Expert Instructors:</strong> Learn from professionals with practical knowledge in hardware and networking.<br
/><strong>Hands-On Training:</strong> Real-world scenarios and lab exercises to enhance your skills.<br
/><strong>KHDA-Certified Certificate:</strong> A valuable credential to enhance your career opportunities.<br
/><strong>Comprehensive Curriculum:</strong> Covering hardware fundamentals to networking concepts.<br
/><strong>Flexible Learning Options:</strong> Available offline.<br
/>&nbsp;<p>Cost: 1000 AED</p><p>Discount: 10% Off for Laimoon Users!</p><p>Duration: Upto 1 Month</p>					]]>				  </description>				  <pubDate>Thu, 23 Jan 2014 11:21:18 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Systems Security Professional (CISSP)  - Vedant Trainings , Dubai,Abu Dhabi ]]></title><link>https://courses.laimoon.com/course/certified-information-systems-security-professional-cissp/online</link>				  <description>				  <![CDATA[						This course trains students in all areas of the security Common Body of Knowledge.<br><strong>They will learn:</strong><ul><li>Access Control</li><li>Telecommunications and Network Security</li><li>Information Security Governance and Risk Management</li><li>Software Development Security</li><li>Cryptography</li><li>Security Architecture and Design</li><li>Operations Security</li><li>Business Continuity and Disaster Recovery Planning</li><li>Legal, Regulations, Investigations and Compliance</li><li>Physical (Environmental) Security, and more.</li></ul>There are four processes a candidate must successfully complete to become a certified CISSP. To sit for an exam, a candidate must assert that he or she possesses a minimum of five years of professional experience in the information security field or four years of experience plus a college degree. Professional experience has to be in two or more of these 10 (ISC)&sup2; CISSP domains listed above.<br><strong>Who Should Attend?</strong><br>Students who wish to pass the CISSP certification exam will benefit from this class.<br><strong>Benefits of Attendance</strong><br>Upon completion of this course, students will be able to:<ul><li>Confidently meet the challenge of CISSP certification exam</li></ul><strong>Prerequisites</strong><br>There are no prerequisites for this course, although having taken other security courses is extremely helpful.<p>Cost: 2950 AED</p><p>Duration: Upto 4 Days</p>					]]>				  </description>				  <pubDate>Thu, 25 Apr 2013 11:16:35 +04</pubDate>				</item> 								<item><title><![CDATA[Security+  - Vedant Trainings , Dubai and Abu Dhabi ]]></title><link>https://courses.laimoon.com/course/security/online</link>				  <description>				  <![CDATA[<p
style="text-align: justify;"><strong>Course Overview<br
/></strong>This course will prepare students to pass the current CompTIA Security+ SY0-301 certification exam. After taking this course, students will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field. Comes with CertBlaster exam prep software (download).</p><p
style="text-align: justify;"><strong>Who Should Attend?</strong><br
/>This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as NetWare, Macintosh, UNIX/Linux, and OS/2, who wants to: further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.<br
/><br
/><strong>Benefits of Attendance</strong><br
/>Upon completion of this course, students will be able to:<br
/>&bull; Identify security threats.<br
/>&bull; Harden internal systems and services.<br
/>&bull; Harden internetwork devices and services.<br
/>&bull; Secure network communications.<br
/>&bull; Manage a PKI.<br
/>&bull; Manage certificates.<br
/>&bull; Enforce an organizational security policy.<br
/>&bull; Monitor the security infrastructure.</p><p
style="text-align: justify;"><strong>Prerequisites</strong><br
/>Students should have CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including experience configuring and managing TCP/IP. Although not required, students might find it helpful to obtain foundational information from introductory operating system administration courses.</p><p>Cost: 2900 AED</p><p>Discount: Register now for a 10% discount</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Thu, 25 Apr 2013 11:16:35 +04</pubDate>				</item> 					</channel></rss>
<!-- Apr 27, 2026 22:46:35 -->