<?xml version="1.0" encoding="UTF-8"?><rss
version="2.0"	xmlns:content="http://purl.org/rss/1.0/modules/content/"	xmlns:wfw="http://wellformedweb.org/CommentAPI/"	xmlns:dc="http://purl.org/dc/elements/1.1/"	xmlns:atom="http://www.w3.org/2005/Atom"	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"	xmlns:slash="http://purl.org/rss/1.0/modules/slash/">	<channel><title>Laimoon.com</title><link>https://courses.laimoon.com/sitemap/rss</link>	    <description>Courses in Dubai, Abu Dhabi, Sharjah Diplomas, Degrees &amp; Doctorates - Laimoon Course Guide</description>	    <language>en-us</language>	    	    	    						<item><title><![CDATA[CISM -  Certified Information Security Manager   - NLP Tech , UAE ]]></title><link>https://courses.laimoon.com/course/cism-nlptech/online</link>				  <description>				  <![CDATA[<p>Advance your career in information security management with our Certified Information Security Manager (CISM) training programs at NLPTECH Training Center. Our courses are designed to provide you with the expertise needed to excel in the CISM certification, focusing on key areas such as information security governance, risk management, incident response, and program development. You will gain a deep understanding of security management practices and strategies to protect organizational assets and ensure compliance with regulations. Through practical exercises, case studies, and expert instruction, you'll be equipped with the skills necessary to manage and oversee an enterprise&rsquo;s information security program effectively.<br><br>Timing flexible<br>Location Bur Dubai<br><strong>Enroll in this course and get another course for FREE!</strong><br>&nbsp;</p><p>Cost: 3500 AED</p><p>Duration: Upto 6 Months</p>					]]>				  </description>				  <pubDate>Sun, 08 Sep 2024 17:55:38 +04</pubDate>				</item> 								<item><title><![CDATA[        - Saad Allah Management Training & Consultancy , UAE, Dubai ]]></title><link>https://courses.laimoon.com/course/-----saad-allah-management-training-consultancy/online</link>				  <description>				  <![CDATA[						<strong>Program Name: Training Diploma in Cybersecurity, </strong><br
/><br
/><strong>Diploma message:</strong><br
/>&nbsp;<br
/>Preparing graduates in the field of cybersecurity equipped with specialized practical knowledge and practical skills, motivated for lifelong learning and the ability to keep pace with the requirements of the times.<br
/>&nbsp;<br
/><strong>Diploma description:</strong><br
/>&nbsp;<br
/>This applied training diploma is suitable for trainees who are looking to acquire the required practical skills and specialized knowledge in all aspects of cybersecurity, as the program will focus on information, security procedures and processes used in all types of business environments. The program aims&nbsp;to qualify the trainee to obtain accredited international professional certificates.<br
/>&nbsp;<br
/>This program provides trainees with the following capabilities:<ul><li>Demonstrate knowledge of concepts, terminology, principles, methods and methods of information security and cyberspace.</li><li>&nbsp;Familiarity with a wide range of technologies, available tools and practical methods in information security and cyberspace.</li><li>Identifying users&#39; needs in the field of developing information systems and building secure computer networks.</li><li>Demonstrate knowledge of mathematical principles and algorithms for cryptographic operations and the protection of systems</li><li>and information.</li><li>Defining a set of solutions for modern and advanced methods of intruding and attacking data and computer networks.</li><li>Assess gaps and weaknesses in information systems and computer networks.</li><li>Determine the time and cost of handling damages resulting from any attack on an information or institutional system.</li><li>Evaluate appropriate tools and techniques to address damages resulting from security breaches.</li><li>Determine the policies, procedures and plans necessary to manage and ensure the security of institutions.</li><li>Apply different protocols for the confidentiality of information and networks.</li><li>Apply the principles of design, development and management in creating computer networks.</li><li>Use of different network protocols.</li><li>Building secure information systems and computer networks.</li><li>Prepare and present technical reports in a coherent and structured manner, both verbally and in writing.</li><li>Using best practices and standards in the field of information and network protection.</li><li>Dealing with various types of breaches and accidents on computer networks and information systems.</li><li>Discovering vulnerabilities and sources of attack and penetration by monitoring the performance of computer networks</li><li>and information systems.</li><li>Use and development of encryption and information security software.</li></ul>&nbsp;<br
/><strong>Fields of work and market needs:</strong><br
/>Studies have shown that the local market needs, as well as the regional market, by searching&nbsp;for available job opportunities through employment sites. The figures confirmed that the local and regional market needs employees who have the ability to analyze, design, develop, operate, manage, monitor and examine safe systems and software in public and private institutions and companies.<br
/>&nbsp;<br
/>The Applied Training Diploma in Cybersecurity program increases the opportunities available to its affiliates in the local, regional and international labor markets, as it provides the skills and practical experience necessary for the labor market, by offering many diverse topics in information security and cyberspace.<br
/>The diploma program allows those wishing to join it to acquire the necessary skills to design a secure environment, use tools that help protect, audit, investigate, and discover cybercrimes, and how to develop appropriate solutions for protection. The program will also provide participants with the necessary skills to apply advanced principles and concepts related to the development and management of secure information systems in government and private sector organizations.<br
/><br
/><br
/>There are a large number of jobs that a graduate of this training diploma can compete for, including:<ul><li>Information Technology Security Officer</li><li>Network and Information Security</li><li>Technician Wireless Network Security</li><li>Technician Cybercrime Analysis&nbsp;</li><li>Technician Security Systems Analysis&nbsp;</li><li>Technician and Information Quality Assurance Technician&nbsp;</li><li>Software Security Audit</li><li>Technician Information Security&nbsp;</li><li>Technician Penetration Testing&nbsp;</li><li>Technician Forensic Analysis</li><li>Electronic Security Technician</li><li>A technician specializing in electronic incidents and threats</li><li>Technician in developing safe programs</li><li>Member of the Information Technology Project</li><li>Cybercrime Technician</li><li>Technician in computer forensics.</li></ul>&nbsp;<br
/><strong>Target group:</strong><ul><li>high school students or those who were not lucky enough to pass the general secondary exam.</li><li>Graduates of engineering and information technology disciplines interested in studying cybersecurity and working in the same field</li><li>Everyone who has the desire to study cybersecurity and work in this field</li></ul><br
/><strong>Diploma content and study plan:</strong><br
/>The number of theoretical and practical hours per semester is 225 teaching hours, 45 study hours for each course in the plan Therefore, the total number of theoretical and practical hours during the three semesters of the diploma is 450 hours covered over 9 months.<br
/>a&nbsp;Courses to be taught by the participant in the diploma:<br
/>&nbsp;<ul><li>English Skills</li><li>IT Fundamentals Information</li><li>System Security Programming with Python Networking and data security fundamentals&nbsp;</li><li>Ethical Hacking and Testing Operational security of the structure&nbsp;</li><li>Operational Security for Critical Infrastructure&nbsp;</li><li>Advanced Hacking Techniques&nbsp;</li><li>Conducting Penetration and Security Tests&nbsp;</li><li>Managed Security Operations Center Analyst</li><li>Security operation center analyst</li><li>Cybersecurity</li><li>Management</li><li>Threat</li><li>Intelligence &amp; Incident Response</li></ul><br
/>&nbsp;<p>Cost: 6000 AED</p><p>Duration: 2 Weeks</p>					]]>				  </description>				  <pubDate>Fri, 04 Nov 2022 12:06:26 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Security Manager  - LEORON Professional Development Institute , Dubai,Azerbaijan,Georgia,Kazakhstan,Oman,Saudi Arabia ]]></title><link>https://courses.laimoon.com/course/certified-information-security-manager-cism-leoron-professional-development-institute/online</link>				  <description>				  <![CDATA[						This CISM exam preparation seminar provides an overview and key points of all domains of the CISM exam. We offer the CISM exam preparation seminar in association with the ISACA Local ;<br
/>CISM Prep seminar covers four information security management areas, each further defined through Tasks &amp; Knowledge ;<br
/>These areas and statements were approved by the CISM Certification Committee and represent a job practice analysis of the work performed by information security managers as validated by prominent industry leaders, subject matter experts and industry practitioners.<p>Cost: 5670 USD</p><p>Duration: 4 Days</p>					]]>				  </description>				  <pubDate>Mon, 24 Feb 2020 15:47:10 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Security Manager (CISM)  - Duke Training Centre , UAE, Abu Dhabi,Abu Dhabi ]]></title><link>https://courses.laimoon.com/course/part-time-certified-information-security-manager-cism-duke-training-centre/online</link>				  <description>				  <![CDATA[						Duke&rsquo;s Certified Information Security Manager (CISM) is a high-end certification provided by ISACA. ISACA is an international professional association focused on IT governance. CISM is a course that focuses on the knowledge of developing and managing an enterprise information system. CISM is all about Information and its security. The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise&rsquo;s information security.<br
/>CISM is internationally recognized and one of the highest paid jobs. For becoming CISM certified you need to pass the test by ISACA that&rsquo;s taken three times every year. More information about the CISM certification and exam can be found on the ISACA website.<p>Cost: 4999 AED</p><p>Duration: Upto 35 Hours</p>					]]>				  </description>				  <pubDate>Thu, 13 Feb 2020 19:55:10 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Security Manager (CISM)  - Delphi Star Training Centre , UAE, Dubai,Dubai,Abu Dhabi,Muscat,Saudi Arabia,United Arab Emirates,Riyadh,Oman,Jeddah,Bahrain,Egypt,Ethiopia,Kenya,Kuwait ]]></title><link>https://courses.laimoon.com/course/part-time-certified-information-security-manager-cism-delphi/online</link>				  <description>				  <![CDATA[						The ISACA governed Certified Information Security Manager (CISM) certification is the most sought-after certification in the Information Security arena. Established in 2002, the CISM is a management-focused globally renowned credential for professionals who create, build and administer enterprise security programs. This certification is a professional certification sponsored by the reputed Information Systems Audit and Control Association (ISACA).<br
/>The CISM certification training is intended towards professionals working in managerial, consulting or related views in IT operations or compliance. Several CISM Certified Professionals today are functioning in the capacities of IT Directors, Audit Directors, CIOs, CISOs, CEOs, CFOs and other leadership positions showcasing a good demand as well as career advancement potential of the credential.<br
/><br
/><strong>CISM Course Structure:</strong><ul><li>Area 1&mdash;Information Security Governance (24%)</li><li>Area 2&mdash;Information Risk Management (30%)</li><li>Area 3&mdash;Information Security Program Development and Management (27%)</li><li>Area 4&mdash;Information Security Incident Management (19%)</li></ul><p>Cost: 2799 AED</p><p>Duration: 20 To 40 Hours</p>					]]>				  </description>				  <pubDate>Tue, 22 Oct 2019 16:37:21 +04</pubDate>				</item> 								<item><title><![CDATA[CCNAX  - Learners Point Training Institute , UAE, Dubai,Dubai,Bahrain,Kuwait,Oman,Qatar,Saudi Arabia,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/ccnax-learners-point-training-institute/online</link>				  <description>				  <![CDATA[						CCNA is the one-exam entry level certification also known as &lsquo;Cisco Certified Network Associate Routing &amp; ; This course tests a candidate&#39;s knowledge and skills required to install, operate, and troubleshoot a small-to-medium size enterprise branch network.<br
/><br
/>Course Objectives<ul><li>To provide CCNAX preparation to students pursuing a Cisco certification. The training follows official outlined guides and course material provided by Cisco and is taught by trainers from within the profession</li></ul><strong>Course Modules</strong><br
/><br
/>Network Fundamentals<ul><li>Explain the role and function of network components</li><li>Describe the characteristics of network topology architectures</li><li>Compare physical interface and cabling types</li><li>Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)</li><li>Compare TCP to UDP</li><li>Configure and verify IPv4 addressing and subnetting</li><li>Describe the need for private IPv4 addressing</li><li>Configure and verify IPv6 addressing and prefix</li><li>Compare IPv6 address types</li><li>Verify IP parameters for Client OS (Windows, Mac OS, Linux)</li><li>Describe wireless principles</li><li>Explain virtualization fundamentals (virtual machines)</li><li>Describe switching concepts</li></ul><strong>Network Access</strong><ul><li>Configure and verify VLANs (normal range) spanning multiple switches</li><li>Configure and verify Interswitch connectivity</li><li>Course outline</li><li>Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)</li><li>Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)</li><li>Describe the need for and basic operations of Rapid PVST+</li><li>Spanning Tree Protocol and identify basic operations</li><li>Compare Cisco Wireless Architectures and AP modes</li><li>Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG)</li><li>Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)</li><li>Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings</li></ul><strong>IP Connectivity</strong><ul><li>Interpret the components of the routing table</li><li>Determine how a router makes a forwarding decision by default</li><li>Configure and verify IPv4 and IPv6 static routing</li><li>Configure and verify single area OSPFv2</li><li>Describe the purpose of the first-hop redundancy protocol</li></ul><strong>IP Services</strong><ul><li>Configure and verify inside source NAT using static and pools</li><li>Configure and verify NTP operating in a client and server mode</li><li>Explain the role of DHCP and DNS within the network</li><li>Explain the function of SNMP in network operations</li><li>Describe the use of Syslog features including facilities and levels</li><li>Configure and verify the DHCP client and relay</li><li>Explain the forwarding per-hop behaviour (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping</li><li>Configure network devices for remote access using SSH</li><li>Describe the capabilities and function of TFTP/FTP in the network</li></ul><strong>Security Fundamentals</strong><ul><li>Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)</li><li>Describe security program elements (user awareness, training, and physical access control)</li><li>Configure device access control using local passwords</li><li>Describe security password policy elements, such as management, complexity, and password alternatives (multi-factor authentication, certificates, and biometrics)</li></ul><p>Cost: 8500 AED</p><p>Discount: 55% Off for Laimoon Users!</p><p>Duration: Upto 40 Hours</p>					]]>				  </description>				  <pubDate>Sun, 19 May 2019 12:44:47 +04</pubDate>				</item> 								<item><title><![CDATA[CISM  - Duke Training Centre , United Arab Emirates, Abu Dhabi,Abu Dhabi ]]></title><link>https://courses.laimoon.com/course/upto-thirty-hours-cism-duke-training-centre/online</link>				  <description>				  <![CDATA[						<strong>Summary&nbsp;</strong><br><br>Certified Information Security Manager (CISM) is a high-end certification provided by ISACA. ISACA is an international professional association focused on IT governance. CISM is a course that focuses on the knowledge of developing and managing an enterprise information system. CISM is all about Information and its security. The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise's information ;<br><br>CISM is internationally recognized and one of the highest paid jobs. For becoming CISM certified you need to pass the test by ISACA that's taken three times every year. More information about the CISM certification and exam can be found on the ISACA ;<br><br><strong>Course Outline&nbsp;</strong><br><br>Introduction<br> Certified Information Security Manager (CISM) Course Intro<br> Certified Information Security Manager (CISM) Exam Module<br><br>Module 01 - Information Security Governance<br> An Introduction to Information Security Governance<br> The Role of Information Security within an Organization<br> Confidentiality, Integrity and Availability: The C-I-A Triad<br> Information Security Governance<br> Secure Network Design Concepts<br> Securing the Local Area Network (LAN)<br> Access Control Models<br> Cryptography<br> Hybrid Cryptography in SSL/TLS<br> Digital Certificates<br> Information Security Governance and the Law<br> Export/Import Restrictions<br><br>Module 02 - Risk Management<br> An Overview of Risk Management<br> Risk Related Definitions<br> The NIST 800-30 of Risk Assessment<br> Additional Risk Terms<br><br>Module 03 - Security Architecture<br> An Overview of Information Security Program Management<br> Security Models<br> Evaluation Criteria<br> Additional Evaluation Criteria<br> Technical Project Management<br><br>Module 04 - Information Security Management<br> An Overview of Information Security Management<br> Service Level Agreements<br> Configuration Management and Change Control<br> Monitoring and Auditing<br><br>Module 05 - Incident Response and Business Continuity<br> An Overview of Incident Response and Business Continuity<br> Intrusion Detection Systems<br> Security Incident Response<br> Business Continuity and Disaster Recovery<br> Business Continuity Sub-Plans<br> Recovery Strategies<br><br>For more information please contact&nbsp;<br><strong>Duke Training Centre, Abu Dhabi &amp;&nbsp;Musaffah.</strong><br>&nbsp;<p>Cost: 5000 AED</p><p>Duration: Upto 30 Hours</p>					]]>				  </description>				  <pubDate>Tue, 28 Nov 2017 14:12:32 +04</pubDate>				</item> 								<item><title><![CDATA[Certified Information Security Manager (CISM)  - Vedant Training , Dubai, UAE, Abu Dhabi, Online ]]></title><link>https://courses.laimoon.com/course/certified-information-security-manager-cism-3/online</link>				  <description>				  <![CDATA[<p>CISM means higher earning potential and career advancement. Recent independent studies consistently rank CISM as one of the highest paying and sought after IT certifications.<br><strong>Demonstrate your information security management expertise. </strong></p><ul><li>The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages designs, and oversees and assesses an enterprise's information security&nbsp;</li></ul><p><strong>Information Security Governance </strong></p><ul><li>Information Risk Management and Compliance&nbsp;</li><li>Information Security Program Development and Management&nbsp;</li><li>Information Security Incident Management</li></ul><p>Cost: 2900 AED</p><p>Duration: 4 Days</p>					]]>				  </description>				  <pubDate>Tue, 05 Apr 2016 13:01:56 +04</pubDate>				</item> 					</channel></rss>