CipherTrust Manager Training Course
The CipherTrust Data Security Platform is a comprehensive suite of data-centric security products and solutions, offering powerful tools to consolidate data discovery, protection, and control into a single unified solution. CipherTrust Manager serves as the central hub for managing key lifecycle tasks across the CipherTrust Data Security Platform.
This instructor-led, live training, available online or on-site, is designed for IT professionals looking to gain a thorough understanding of the CipherTrust Solution suite.
Upon completion of this training, participants will be able to:
- Grasp the core concepts and basic functions of the CipherTrust Solution.
- Assess device architecture and utilization strategies.
- Effectively manage the CipherTrust product suite.
Format of the Course
- Interactive lectures and discussions.
- Extensive exercises and practical sessions.
- Hands-on implementation in a live laboratory environment.
Course Customization Options
- To request customized training for this course, please contact us to make arrangements.
Course Outline
Introduction
- Overview of CipherTrust Manager and its basic functions.
- CipherTrust initialization and IP configuration.
Understanding CipherTrust ProtectDB (CDP), ProtectFile, and ProtectApp
- Using ProtectDB (CDP).
- Using ProtectApp.
Using CipherTrust Tokenization Server (CTS)
- Overview of the CTS solution.
- Using tokenization.
Using CipherTrust Transparent Encryption (CTE)
- Overview of the CTE solution.
- Using the CTE solution.
CipherTrust Cloud Key Manager (CCKM)
- Overview of the CCKM solution.
- Using the CCKM solution.
CipherTrust Key Management Interoperability Protocol (KMIP)
- Using the KMIP solution.
Summary and Next Steps
Requirements
- Familiarity with security protocols and practices.
- Experience in system administration and configuration.
Audience
- IT professionals.
- Security administrators.
Open Training Courses require 5+ participants.
CipherTrust Manager Training Course - Booking
CipherTrust Manager Training Course - Enquiry
CipherTrust Manager - Consultancy Enquiry
Testimonials (3)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
The way to receive the information from the trainer
Mohamed Romdhani - Shams Power
Course - CISM - Certified Information Security Manager
Upcoming Courses
Related Courses
AI and IT Audit
14 HoursThis instructor-led, live training in Italy (online or onsite) is designed for intermediate-level IT auditors who wish to effectively incorporate AI tools into their audit practices.
By the end of this training, participants will be able to:
- Understand the core concepts of artificial intelligence and how it is applied in the context of IT auditing.
- Utilize AI technologies such as machine learning, NLP, and RPA to improve audit efficiency, accuracy, and scope.
- Perform risk assessments using AI tools, enabling continuous monitoring and proactive risk management.
- Integrate AI into audit planning, execution, and reporting, enhancing the overall effectiveness of IT audits.
Micro Focus ArcSight ESM Advanced
35 HoursThis instructor-led, live training session Italy (online or onsite) is designed for advanced security analysts eager to enhance their proficiency in using sophisticated Micro Focus ArcSight ESM features. The objective is to improve an organization's capability to detect, respond to, and mitigate cyber threats with greater precision and speed.
By the conclusion of this training, participants will be able to:
- Optimize Micro Focus ArcSight ESM usage to strengthen monitoring and threat detection.
- Construct and manage advanced ArcSight variables to refine event streams for more accurate analysis.
- Develop and implement ArcSight lists and rules for efficient event correlation and alerting.
- Apply advanced correlation techniques to detect complex threat patterns and reduce false positives.
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III represents a global regulatory framework focused on bank capital adequacy, stress testing, and market liquidity risk. Originally established by the Basel Committee on Banking Supervision in 2010–2011, the implementation timeline for the Accord was extended to March 31, 2019. Basel III enhances bank capital requirements by boosting liquidity levels while reducing leverage. Unlike its predecessors, Basel I and II, which are not fully superseded but rather complemented, Basel III mandates distinct reserve levels for various deposit types and borrowing structures.
Navigating this intricate and evolving regulatory landscape can be challenging. Our course and training programs are designed to help you anticipate changes and understand their impact on your institution. As an accredited training partner of the Basel Certification Institute, we guarantee that our educational materials and training quality remain current and highly effective.
Objectives:
- Prepare participants for the Certified Basel Professional Examination.
- Develop practical strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within banking organizations.
Target Audience:
- Board members with risk oversight responsibilities
- Chief Risk Officers (CROs) and Heads of Risk Management
- Members of the Risk Management team
- Staff in Compliance, Legal, and IT support functions
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- Introduction to Basel norms and amendments to the Basel Accord (III)
- Regulations concerning market, credit, counterparty, and liquidity risk
- Stress testing methodologies for various risk measures, including formulation and delivery
- Analysis of Basel III’s likely effects on the international banking industry, with practical application demonstrations
- Justification for the adoption of new Basel norms
- Key features of the Basel III Norms
- Objectives of The Basel III Norms
- Implementation timeline for Basel III
CCTV Security
14 HoursThis instructor-led, live training in Italy (online or onsite) targets security managers looking to develop foundational to intermediate skills in CCTV security surveillance and management.
Upon completing this training, participants will be able to:
- Identify various types of CCTV systems and understand their benefits and features.
- Grasp the cabling and setup requirements for CCTV systems.
- Install, configure, and manage CCTV systems effectively.
Certified Fraud Examiner (CFE) Preparation
70 HoursThis instructor-led, live training in Italy (available online or on-site) is designed for advanced professionals seeking a comprehensive understanding of fraud examination concepts and preparation for the Certified Fraud Examiner (CFE) exam.
By the end of this training, participants will be able to:
- Gain comprehensive knowledge of fraud examination principles and the fraud examination process.
- Learn to identify, investigate, and prevent various types of financial fraud schemes.
- Understand the legal environment related to fraud, including the legal elements of fraud, relevant laws, and regulations.
- Acquire practical skills in conducting fraud investigations, including evidence collection, interviewing techniques, and data analysis.
- Learn to design and implement effective fraud prevention and deterrence programs within organizations.
- Gain confidence and knowledge to successfully pass the Certified Fraud Examiner (CFE) exam.
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This four-day event (CGEIT training) serves as the definitive preparation for the exam period, designed to ensure you pass the challenging CGEIT exam on your first attempt.
The CGEIT qualification is an internationally recognized symbol of excellence in IT governance, awarded by ISACA. It is tailored for professionals responsible for managing IT governance or holding significant advisory or assurance responsibilities for IT governance.
Achieving CGEIT status will provide you with broader recognition in the marketplace, as well as increased influence at the executive level.
Objectives:
This seminar has been designed to prepare Delegates for the CGEIT examination by enabling them to supplement their existing knowledge and understanding to be better prepared to pass the exam, as defined by ISACA.
Target Audience:
Our training course is for IT and business professionals, with significant IT governance experience who are undertaking the CGEIT exam.
CISM - Certified Information Security Manager
28 HoursDescription:
Note: Please note that this updated CISM exam content outline applies to exams commencing 1 June 2022.
CISM® stands as the most prestigious and rigorous qualification for Information Security Managers worldwide today. This credential offers you a pathway to join an exclusive peer network capable of continuously learning and adapting to the expanding opportunities and challenges within Information Security Management.
Our CISM training methodology delivers comprehensive coverage of the content across the four CISM domains, with a distinct emphasis on building core concepts and solving ISACA-released CISM exam questions. The course serves as an intensive training program and rigorous exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination.
Our instructors encourage all participants to review the ISACA-released CISM QA&E (Questions, Answers, and Explanations) as part of their exam preparation. The QA&E is particularly effective in helping participants understand the style of ISACA questions, the approach required to solve them, and aids in the rapid assimilation of CISM concepts during live classroom sessions.
All our trainers possess extensive experience in delivering CISM training. We will thoroughly prepare you for the CISM examination.
Goal:
The primary objective is to help you pass your CISM examination on the first attempt.
Objectives:
- Apply gained knowledge in a practical manner that benefits your organisation.
- Establish and maintain an Information security governance framework to achieve your organization's goals and objectives.
- Manage Information risk to an acceptable level to meet business and compliance requirements.
- Establish and maintain information security architectures (people, process, technology).
- Integrate information security requirements into the contracts and activities of third parties and suppliers.
- Plan, establish, and manage the capability to detect, investigate, respond to, and recover from information security incidents to minimize business impact.
Target Audience:
- Security professionals with 3-5 years of front-line experience.
- Information security managers or individuals with management responsibilities.
- Information security staff and information security assurance providers who require an in-depth understanding of information security management, including: CISO’s, CIO’s, CSO’s, privacy officers, risk managers, security auditors, compliance personnel, BCP/DR personnel, and executive and operational managers responsible for assurance functions.
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in Italy (online or onsite) is designed for compliance professionals in the payment services sector who aim to establish, execute, and enforce an effective compliance program within their organizations.
Upon completion of this training, participants will be able to:
- Grasp the regulatory requirements imposed by government authorities on payment service providers.
- Develop internal policies and procedures necessary to meet government regulations.
- Implement a compliance program that aligns with applicable laws.
- Ensure that all corporate processes and procedures adhere to the compliance program.
- Protect the business's reputation and shield it from legal liabilities.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursThis instructor-led live training in Italy (online or on-site) targets intermediate-level cybersecurity professionals aiming to enhance their understanding of GRC frameworks and apply them to secure and compliant business operations.
By the end of this training, participants will be able to:
- Comprehend the core elements of cybersecurity governance, risk, and compliance.
- Perform risk assessments and formulate strategies for risk mitigation.
- Execute compliance measures and oversee regulatory obligations.
- Create and enforce security policies and procedures.
Accessibility by Design (Compliance with EU ACT)
21 HoursThis course offers an expert-level introduction to the newly enacted Accessibility Law, equipping developers with the practical skills necessary to design, develop, and maintain fully accessible applications. Beginning with a contextual discussion on the significance and implications of the law, the curriculum swiftly transitions into hands-on coding practices, tools, and testing techniques to ensure both compliance and inclusivity for users with disabilities.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse Objective:
Equipping participants with a solid grasp of GRC processes and capabilities, along with the necessary skills to effectively integrate governance, performance management, risk management, internal control, and compliance activities.
Course Summary:
- Key terms and definitions in GRC
- Core principles of GRC
- Essential components, practices, and activities
- The connection between GRC and related disciplines
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Italy (available online or onsite) is designed for developers and administrators who aim to create software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Compliance and the Management of Compliance Risk
21 HoursTarget Audience
This course is designed for all staff members who need a practical grasp of Compliance and effective Risk Management.
Course Format
The training utilizes a blended learning methodology that includes:
- Guided discussions
- Slide-based presentations
- Case studies
- Real-world examples
Learning Objectives
Upon completion, participants will be equipped to:
Gain a robust understanding of key Compliance aspects, alongside national and international initiatives focused on managing related risks.
Articulate how organizations and their teams can implement an effective Compliance Risk Management Framework.
Clarify the roles and responsibilities of the Compliance Officer and the Money Laundering Reporting Officer, and comprehend how these functions integrate into the business structure.
Pinpoint critical risk areas within Financial Crime, especially regarding international operations, offshore centers, and high-net-worth clients.
Open Source Software (OSS) Management
14 HoursOpen Source Software (OSS) Management involves the comprehensive oversight of open-source components throughout their lifecycle within an organization, guaranteeing secure, compliant, and efficient utilization.
Delivered as an instructor-led, live training session (available online or onsite), this program is designed for intermediate IT professionals aiming to implement best practices for managing open-source software in enterprise and government settings.
Upon completion of this training, participants will be equipped to:
- Develop effective OSS policies and governance structures.
- Utilize SBOM and SCA tools to identify, track, and manage open-source dependencies.
- Address risks related to licensing compliance and security vulnerabilities.
- Optimize OSS adoption to maximize innovation and cost efficiency.
Course Format
- Interactive lectures and discussions.
- Case studies and scenario-based exercises.
- Hands-on demonstrations featuring OSS management tools.
Customization Options
- This course can be customized to align with your organization’s specific OSS policies and toolchains. Please contact us to arrange.
PCI-DSS Practitioner
14 HoursThis instructor-led, live training for Payment Card Industry Professionals in Italy (online or onsite) offers a professional qualification for practitioners seeking to demonstrate their expertise and understanding of the PCI Data Security Standard (PCI DSS).
Upon completion of this training, participants will be able to:
- Comprehend the payment process and the PCI standards established to safeguard it.
- Understand the roles and responsibilities of entities within the payment industry.
- Gain deep insight into, and a clear understanding of, the 12 PCI DSS requirements.
- Demonstrate knowledge of PCI DSS and its application to organizations involved in the transaction process.