Cloud Computing Foundation: Who Should Attend

The course is designed for:

Cloud Computing Foundation: Course Overview

Cloud computing offers a new way to gain on-demand, elastic capabilities, avoiding the need for significant capital investment whilst promoting a culture of innovation through a ‘fail-fast’ paradigm.

Clients benefit from a pay-as-you-go model, coupled with intuitive self-service capabilities providing unprecedented speed-to-market and clear cost transparencies with market leaders such as Microsoft, Amazon and Google.

Despite the prevalence and visibility around cloud computing, there is a still a perception of misinformation around cloud computing standards and terminology.

This 2-day course has been designed to ensure that participants get a solid and accurate understanding of the fundamentals of cloud computing.

The course also provides preparation for the Cloud Computing Foundation certificate exam.

 

Understanding CISSP Training and Certification

The shortage of information security skills is already impacting Australia’s private and public sectors. In this environment, demand often outweighs the supply of experienced candidates with well-regarded IT security qualifications. The CISSP (Certified Information Systems Security Professional) is a highly regarded qualification, and could take you to the next level in your IT security career.

What type of certification is CISSP?

The CISSP is a vendor-neutral certification granted by the non-profit International Information System Security Certification Consortium, or (ISC)2. It’s a globally recognised qualification with over 115,000 members in over 164 countries. Over 2,000 members hold an (ISC)2 qualification in Australia compared to over 75,000 in the US.

CISSP is the first information security credential to meet the high requirements of ISO/IEC Standard 17024. It’s designed to demonstrate deep technical knowledge and managerial skill in designing, engineering, implementing, and managing information security programs.

Who should obtain CISSP?

CISSP is designed for those with professional experience in information security, usually with five years or more of experience on the job. Security consultants, security managers, and IT directors or chief information officers are ideal candidates for the CISSP. CISSP can also be advantageous for security auditors, security architects, and security analysts. Security system engineers, directors and security, and network architects are some other roles suitable for the CISSP certification.

Benefits of CISSP

The CISSP is the gold standard in security certification. It has a strong global membership and is a highly valued credential. Holding a CISSP demonstrates to employers you’re an experienced, qualified security professional. Given the strong demand for information security professionals, a CISSP can be highly attractive to prospective employers.

Subject areas

The CISSP covers the eight Common Body of Knowledge (CBK) domains.

Requirements for certification

The requirements for CISSP certification include work experience, a six-hour exam, and endorsement from a current (ISC)2 certified professional.

1. Work experience

You need to have at least five years of accumulated full-time work experience in at least two of the CBK domains. The work experience must be paid work, and a four-year university degree (or equivalent) can substitute for one year of the five required years.

If you don’t have the requisite work experience, you can still sit the exam. If you pass, you’ll become an Associate of (ISC)2 until you have sufficient work experience for the CISSP certification.

2. Exam

The CISSP exam runs for six hours and features 250 multiple choice and Drag & Drop and Hotspot questions. You’ll need to obtain 700 out of 1,000 points to pass the exam. You’ll need to complete the exam agreement and commit to the (ISC)2 Code of Ethics before you take the exam. You can find out more about the exam by reviewing the exam outline.

3. Endorsement

When you pass the exam, you can obtain endorsement for your application. You’ll need to complete the endorsement form and have it signed by an (ISC)2 certified professional who’s currently a member, within nine months of your exam date. The (ISC)2 can act as your endorser if you can’t find someone to endorse your application.

Validity and renewal

Certification is effective for three years, so you’ll need to recertify every three years. Recertification requirements include 40 continuing professional education credits per year (or 120 credits for the three years). You’ll also need to pay the annual fee and continue to abide by the (ISC)2 Code of Ethics.

Obtaining qualifications for a successful IT security career

The CISSP is one of the most highly regarded credentials for experienced IT security professionals. By holding a CISSP, you demonstrate you have current, deep knowledge necessary for design through implementation of security IT systems.

Given the rigorous exam, taking a comprehensive training course can help you succeed in obtaining your CISSP certification. ALC Training is a world-class training provider specialising in information security. To find out more about our intensive CISSP training course, contact us today for more information.

Managing your digital supply chain: IT4IT™ Foundation: Sidebar Content

Managing your digital supply chain: IT4IT™ Foundation: Exams and Stuff

Prerequisites

It is assumed that participants have experience in business and IT operations.

Examination

IT4IT exams are administered by Pearson Vue on behalf of The Open Group.  You will be provided with an exam voucher at the conclusion of the course.  It is up to you then to book the exam with Pearson Vue.  Full guidelines will be provided at the course.  Note that the exam must be taken within 12 months of the course start date.

Travelling Participants:

Good News! The Open Group has just announced the availability of Pearson VUE OnVUE Online Proctoring.

With Online Proctoring, candidates who would need to travel, can now save money and time by taking their Certification Exams at home or at the office. For more information please click here. 

Managing your digital supply chain: IT4IT™ Foundation: Dates and Fees

Fees per person
Course fee includes:

Managing your digital supply chain: IT4IT™ Foundation: Course Contents

1.   IT4IT Overview
2.   IT4IT Core Concepts
3.   Value Stream Analysis
4.   Strategy to Portfolio Value Stream
5.   Requirement to Deploy Value Stream
6.  Request to Fulfill Value Stream
7.  Detect to Correct Value Stream
8.   IT4IT Exam Prep

Managing your digital supply chain: IT4IT™ Foundation: Who Should Attend

This course is intended for organisations or individuals who need to understand the full spectrum of IT and how to manage it. The course is suitable for any professionals involved in the business, development and operations of IT. Typical attendance is drawn from:

Managing your digital supply chain: IT4IT™ Foundation: Course Overview

How do you manage your digital supply chain?

Tickets, releases, changes, monitoring, portfolios, architectures? IT is required to manage a complex pipeline, and it’s not getting any simpler. An integrated approach has never been more critical.

The IT4IT Reference Architecture is a new standard defined by The Open Group. In the age of digital transformation, an integrated approach for managing the business of IT is critical. The IT4IT standard offers a truly open, consortium-based, architectural reference model for modern digital and IT management.

In a world where ITIL is no longer enough, IT4IT promises to be a game changer for the future of IT operations. IT4IT focuses on the entire range of functions, data, and tools you need to manage the business of IT, including IT asset management (ITAM) and IT operations management (ITOM) tools. It is vendor independent and supports both agile and lean methodologies.

The IT4IT standard in fact forms the perfect complement to ITIL and should be part of any IT infrastructure strategy where the goal is end-to-end automation.

IT4IT Foundation (Level 1) Course

ALC’s IT4IT Foundation is a two-day Instructor-led course designed to enable participants to develop the skills and knowledge required to develop IT operating models and architectures using the IT4IT Body of Knowledge.

Participants will be well prepared to sit the official Open Group IT4IT Level 1 Foundation certificate exam which can be taken at any authorised Open Group exam location.

Managing your digital supply chain: IT4IT™ Foundation: Learning Outcomes

In this course you will find out how IT4IT:

CCBA Certification Preparation v3.0: Sidebar Content

CCBA Certification Preparation v3.0: Exams and Stuff

Pre-Requisites