CipherTrust Manager Training Course
The CipherTrust Data Security Platform is a comprehensive suite of data-centric security products and solutions designed to provide robust tools for unifying data discovery, protection, and control within a single solution. CipherTrust Manager serves as the central hub for managing key lifecycle tasks across the CipherTrust Data Security Platform.
This instructor-led, live training (available online or on-site) is designed for IT professionals who wish to gain a deep understanding of how to utilize the CipherTrust Solution suite.
Upon completion of this training, participants will be able to:
- Grasp the fundamentals of the CipherTrust Solution and its core functions.
- Evaluate device architecture and usage models.
- Effectively manage the CipherTrust product suite.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical applications.
- Hands-on implementation in a live-lab environment.
Customization Options
- To request customized training for this course, please contact us to make arrangements.
Course Outline
Introduction
- Overview of CipherTrust Manager and its basic functions
- CipherTrust initialization and IP configuration
Understanding CipherTrust ProtectDB (CDP), ProtectFile, and ProtectApp
- Using ProtectDB (CDP)
- Using ProtectApp
Using CipherTrust Tokenization Server (CTS)
- Overview of CTS solution
- Using tokenization
Using CipherTrust Transparent Encryption (CTE)
- Overview of CTE solution
- Using CTE solution
CipherTrust Cloud Key Manager (CCKM)
- Overview of CCKM solution
- Using CCKM solution
CipherTrust Key Management Interoperability Protocol (KMIP)
- Using KMIP solution
Summary and Next Steps
Requirements
- Familiarity with security protocols and best practices.
- Experience in system administration and configuration.
Audience
- IT professionals.
- Security administrators.
Open Training Courses require 5+ participants.
CipherTrust Manager Training Course - Booking
CipherTrust Manager Training Course - Enquiry
CipherTrust Manager - Consultancy Enquiry
Testimonials (2)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
The way to receive the information from the trainer
Mohamed Romdhani - Shams Power
Course - CISM - Certified Information Security Manager
Upcoming Courses
Related Courses
AI and IT Audit
14 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at intermediate-level IT auditors who wish to effectively incorporate AI tools in their audit practices.
By the end of this training, participants will be able to:
- Grasp the core concepts of artificial intelligence and how it is applied in the context of IT auditing.
- Utilize AI technologies such as machine learning, NLP, and RPA to improve audit efficiency, accuracy, and scope.
- Perform risk assessments using AI tools, enabling continuous monitoring and proactive risk management.
- Integrate AI into audit planning, execution, and reporting, enhancing the overall effectiveness of IT audits.
Micro Focus ArcSight ESM Advanced
35 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at advanced-level security analysts who wish to elevate their skills in utilizing advanced Micro Focus ArcSight ESM content to improve an organization's ability to detect, respond, and mitigate cyber threats with greater precision and speed.
By the end of this training, participants will be able to:
- Optimize the use of Micro Focus ArcSight ESM to enhance monitoring and threat detection capabilities.
- Construct and manage advanced ArcSight variables to refine event streams for more precise analysis.
- Develop and implement ArcSight lists and rules for effective event correlation and alerting.
- Apply advanced correlation techniques to identify complex threat patterns and reduce false positives.
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III represents a global regulatory framework focused on bank capital adequacy, stress testing, and market liquidity risk. Initially established by the Basel Committee on Banking Supervision in 2010–11, the implementation timeline for these amendments was extended until March 31, 2019. The framework enhances bank capital requirements by boosting liquidity and reducing leverage.
Unlike Basel I and II, Basel III mandates distinct reserve levels for various deposit types and borrowings. Rather than replacing its predecessors, it functions alongside Basel I and Basel II to create a more comprehensive regulatory environment.
Navigating this complex and evolving landscape can be challenging. Our course and training are designed to help you anticipate changes and understand their impact on your institution. As an accredited training partner of the Basel Certification Institute, we guarantee that our materials and training quality are current and highly effective.
Objectives:
- Prepare participants for the Certified Basel Professional Examination.
- Equip attendees with practical strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within banking organizations.
Target Audience:
- Board members with risk management responsibilities
- Chief Risk Officers (CROs) and Heads of Risk Management
- Members of Risk Management teams
- Compliance, legal, and IT support staff
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- Introduction to Basel norms and amendments to the Basel Accord (III)
- Regulations covering market, credit, counterparty, and liquidity risk
- Stress testing for various risk measures, including formulation and delivery methods
- Potential effects of Basel III on the international banking industry, with practical application demonstrations
- Need for the new Basel norms
- Overview of the Basel III norms
- Objectives of the Basel III norms
- Timeline for Basel III implementation
CCTV Security
14 HoursThis instructor-led, live training in Romania (online or onsite) is designed for security managers who wish to develop basic to intermediate-level skills in CCTV security surveillance and management.
By the end of this training, participants will be able to:
- Identify various types of CCTV systems and understand their benefits and features.
- Grasp the requirements for cabling and setting up CCTV systems.
- Install, configure, and manage CCTV systems effectively.
Certified Fraud Examiner (CFE) Preparation
70 HoursThis instructor-led, live training in Romania (online or onsite) is designed for advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
Upon completing this training, participants will be able to:
- Acquire comprehensive knowledge of fraud examination principles and processes.
- Identify, investigate, and prevent various forms of financial fraud.
- Understand the legal framework surrounding fraud, including its legal elements, applicable laws, and regulations.
- Develop practical skills for conducting fraud investigations, such as evidence collection, interviewing techniques, and data analysis.
- Design and implement effective fraud prevention and deterrence programs within organizations.
- Gain the confidence and knowledge necessary to successfully pass the Certified Fraud Examiner (CFE) exam.
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This intensive four-day training event (CGEIT preparation) serves as the ideal groundwork for exam day, designed to maximize your chances of passing the challenging CGEIT certification on your first try.
The CGEIT designation is an internationally acclaimed symbol of excellence in IT governance, awarded by ISACA. It is specifically tailored for professionals tasked with managing IT governance or those holding significant advisory or assurance roles within the field.
Earning CGEIT status will broaden your professional recognition in the job market and enhance your influence at the executive level.
Objectives:
This seminar is structured to prepare delegates for the CGEIT examination by helping them expand their existing knowledge and understanding, ensuring they are well-equipped to pass the exam as outlined by ISACA.
Target Audience:
The course is intended for IT and business professionals with substantial experience in IT governance who are preparing to sit for the CGEIT exam.
CISM - Certified Information Security Manager
28 HoursDescription:
Disclaimer: Please be advised that this updated CISM exam content outline is applicable to exams starting 1 June 2022.
CISM® represents the most prestigious and rigorous certification for Information Security Managers worldwide. This credential offers you the opportunity to join an elite network of peers who continuously learn and adapt to the evolving opportunities and challenges in Information Security Management.
Our CISM training methodology provides comprehensive coverage of the four CISM domains, with a clear focus on building foundational concepts and solving CISM exam questions released by ISACA. This course serves as intensive training and rigorous exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination.
Our instructors encourage all attendees to review the ISACA-released CISM QA&E (Questions, Answers, and Explanations) as part of their exam preparation. The QA&E is invaluable in helping candidates understand the style of ISACA questions, the approach to solving them, and facilitates rapid retention of CISM concepts during live classroom sessions.
All our trainers possess extensive experience in delivering CISM training. We will thoroughly prepare you for the CISM examination.
Goal:
The ultimate goal is to pass your CISM examination on the first attempt.
Objectives:
- Apply the knowledge gained in a practical manner that benefits your organisation
- Establish and maintain an information security governance framework to achieve your organization's goals and objectives
- Manage information risk to an acceptable level to meet business and compliance requirements
- Establish and maintain information security architectures (people, process, technology)
- Integrate information security requirements into the contracts and activities of third parties/ suppliers
- Plan, establish, and manage the capability to detect, investigate, respond to, and recover from information security incidents to minimize business impact
Target Audience:
- Security professionals with 3-5 years of front-line experience
- Information security managers or those with management responsibilities
- Information security staff and assurance providers who require an in-depth understanding of information security management, including: CISOs, CIOs, CSOs, privacy officers, risk managers, security auditors, compliance personnel, BCP/DR personnel, executive and operational managers responsible for assurance functions
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in Romania (online or onsite) is designed for compliance professionals in the payment sector who aim to develop, implement, and enforce a robust compliance program within their organizations.
Upon completion of this training, participants will be equipped to:
- Comprehend the regulations established by government regulators for payment service providers.
- Develop the internal policies and procedures necessary to meet regulatory requirements.
- Establish a compliance program that aligns with applicable laws.
- Ensure that all corporate processes and procedures adhere to the compliance framework.
- Safeguard the company’s reputation while protecting it from legal liabilities.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursThis instructor-led live training in Romania (online or onsite) targets intermediate-level cybersecurity professionals who aim to enhance their grasp of GRC frameworks and apply them to ensure secure and compliant business operations.
By the conclusion of this training, participants will be able to:
- Comprehend the fundamental elements of cybersecurity governance, risk, and compliance.
- Perform risk assessments and formulate effective risk mitigation strategies.
- Execute compliance measures and handle regulatory obligations.
- Create and enforce security policies and procedures.
Accessibility by Design (Compliance with EU ACT)
21 HoursThis course offers an expert overview of the newly enacted Accessibility Law, providing developers with the practical skills needed to design, develop, and maintain fully accessible applications. Beginning with a contextual discussion on the law's importance and implications, the course rapidly transitions to hands-on coding practices, tools, and testing techniques to ensure compliance and inclusivity for users with disabilities.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse Objective:
This course aims to equip participants with a solid grasp of GRC processes and capabilities, along with the necessary skills to effectively integrate governance, performance management, risk management, internal control, and compliance initiatives.
Course Overview:
- Key GRC terminology and definitions
- Foundational principles of GRC
- Core components, best practices, and activities
- The relationship between GRC and related disciplines
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
PECB ISO/IEC 27001 Lead Implementer
35 HoursThe landscape of information security threats and attacks is constantly evolving and becoming more sophisticated. The most effective defense strategy involves the proper implementation and management of information security controls and industry best practices. Furthermore, robust information security is a critical expectation and requirement for customers, legislators, and other stakeholders.
This training course is designed to equip participants with the skills needed to implement an Information Security Management System (ISMS) in accordance with ISO/IEC 27001. It aims to provide a thorough understanding of ISMS best practices and establish a framework for its ongoing management and enhancement.
Upon completing the training course, participants are eligible to sit for the exam. Successful candidates may apply for the “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which validates their ability and practical knowledge to implement an ISMS aligned with ISO/IEC 27001 requirements.
Who Can Attend?
- Project managers and consultants involved in or concerned with the implementation of an ISMS
- Expert advisors aiming to master the implementation of an ISMS
- Individuals responsible for ensuring conformity to information security requirements within an organization
- Members of an ISMS implementation team
General information
- Certification fees are included in the exam price
- Training material containing over 450 pages of information and practical examples will be distributed
- A participation certificate awarding 31 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months free of charge
Educational approach
- This training course contains essay-type exercises, multiple-choice quizzes, examples, and best practices used in the implementation of an ISMS.
- The participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises.
- The exercises are based on a case study.
- The structure of the quizzes is similar to that of the certification exam.
Learning objectives
This training course will help you:
- Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
- Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Understand the operation of an information security management system and its processes based on ISO/IEC 27001
- Learn how to interpret and implement the requirements of ISO/IEC 27001 in the specific context of an organization
- Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
Open Source Software (OSS) Management
14 HoursOpen Source Software (OSS) Management refers to the systematic oversight of the entire lifecycle of open-source components within an organization, ensuring their secure, compliant, and efficient utilization.
Delivered as an instructor-led, live training session (available online or onsite), this program targets intermediate-level IT professionals seeking to implement best practices for managing open-source software in enterprise and government settings.
Upon completion of this training, participants will be able to:
- Formulate effective OSS policies and establish robust governance frameworks.
- Utilize SBOM and SCA tools to identify, track, and manage open-source dependencies.
- Reduce risks linked to licensing issues and security vulnerabilities.
- Accelerate OSS adoption while maximizing innovation and achieving cost savings.
Course Format
- Interactive lectures and discussions.
- Case studies and scenario-based exercises.
- Practical demonstrations using OSS management tools.
Customization Options
- This course can be customized to align with specific organizational OSS policies and toolchains. Please contact us to arrange.
PCI-DSS Practitioner
14 HoursThis instructor-led, live Payment Card Industry Professional training in Romania (online or onsite) offers a personal certification for industry professionals who want to showcase their expertise and comprehension of the PCI Data Security Standard (PCI DSS).
Upon completion of this training, participants will be able to:
- Grasp the payment process and the PCI standards established to safeguard it.
- Comprehend the roles and responsibilities of entities within the payment industry.
- Gain deep insight into and understanding of the 12 PCI DSS requirements.
- Demonstrate knowledge of PCI DSS and its application to organizations involved in the transaction process.