CipherTrust Manager Training Course
The CipherTrust Data Security Platform is a comprehensive suite of data-centric security products and solutions that offers powerful tools to unify data discovery, protection, and control into a single solution. CipherTrust Manager serves as the central management hub for handling key lifecycle tasks across the CipherTrust Data Security Platform.
This instructor-led, live training (available online or onsite) is designed for IT professionals seeking to understand how to utilize the CipherTrust Solution suite.
Upon completion of this training, participants will be able to:
- Comprehend the CipherTrust Solution and its core functions.
- Assess device architecture and usage schemes.
- Manage the CipherTrust product suite.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to make arrangements.
Course Outline
Introduction
- Overview of CipherTrust Manager and its basic functions
- CipherTrust initialization and IP configuration
Understanding CipherTrust ProtectDB (CDP), ProtectFile, and ProtectApp
- Using ProtectDB (CDP)
- Using ProtectApp
Using CipherTrust Tokenization Server (CTS)
- Overview of CTS solution
- Using tokenization
Using CipherTrust Transparent Encryption (CTE)
- Overview of CTE solution
- Using CTE solution
CipherTrust Cloud Key Manager (CCKM)
- Overview of CCKM solution
- Using CCKM solution
CipherTrust Key Management Interoperability Protocol (KMIP)
- Using KMIP solution
Summary and Next Steps
Requirements
- Familiarity with security protocols and practices
- Experience with system administration and configuration
Audience
- IT professionals
- Security administrators
Open Training Courses require 5+ participants.
CipherTrust Manager Training Course - Booking
CipherTrust Manager Training Course - Enquiry
CipherTrust Manager - Consultancy Enquiry
Testimonials (3)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
The way to receive the information from the trainer
Mohamed Romdhani - Shams Power
Course - CISM - Certified Information Security Manager
Upcoming Courses
Related Courses
AI and IT Audit
14 HoursThis instructor-led, live training in Greece (online or onsite) is designed for intermediate-level IT auditors seeking to effectively incorporate AI tools into their audit practices.
By the end of this training, participants will be able to:
- Grasp the core concepts of artificial intelligence and how it is applied in the context of IT auditing.
- Utilize AI technologies such as machine learning, NLP, and RPA to improve audit efficiency, accuracy, and scope.
- Perform risk assessments using AI tools, enabling continuous monitoring and proactive risk management.
- Integrate AI into audit planning, execution, and reporting, enhancing the overall effectiveness of IT audits.
Micro Focus ArcSight ESM Advanced
35 HoursThis instructor-led, live training in Greece (online or onsite) is tailored for advanced-level security analysts seeking to enhance their skills in utilizing advanced Micro Focus ArcSight ESM capabilities. The goal is to improve an organization's ability to detect, respond to, and mitigate cyber threats with greater precision and speed.
Upon completion of this training, participants will be able to:
- Optimize Micro Focus ArcSight ESM to strengthen monitoring and threat detection functionalities.
- Create and manage advanced ArcSight variables to refine event streams for more accurate analysis.
- Develop and implement ArcSight lists and rules to facilitate effective event correlation and alerting.
- Apply advanced correlation techniques to identify complex threat patterns while minimizing false positives.
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III serves as a global regulatory framework addressing bank capital adequacy, stress testing, and market liquidity risk. Initially established by the Basel Committee on Banking Supervision in 2010–2011, the implementation timeline for the Accord was extended to March 31, 2019. This framework reinforces bank capital requirements by enhancing liquidity positions and reducing leverage.
Unlike its predecessors, Basel I and II, Basel III mandates distinct reserve levels for various deposit types and borrowing structures, functioning alongside rather than replacing those earlier standards.
Navigating this complex and evolving regulatory landscape can be challenging. Our course and training programs are designed to help you anticipate and manage these changes and their implications for your institution. As an accredited training partner of the Basel Certification Institute, we guarantee that our training materials and content remain current, high-quality, and effective.
Objectives:
- Prepare participants for the Certified Basel Professional Examination.
- Define practical strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within banking organizations.
Target Audience:
- Board members with risk-related responsibilities
- Chief Risk Officers (CROs) and Heads of Risk Management
- Members of the Risk Management team
- Compliance, legal, and IT support staff
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- Introduction to Basel norms and amendments to the Basel Accord (III)
- Regulations governing market, credit, counterparty, and liquidity risk
- Stress testing methodologies for various risk measures, including formulation and execution of stress tests
- Anticipated effects of Basel III on the international banking industry, with practical application demonstrations
- Rationale for the new Basel norms
- Key components of the Basel III norms
- Objectives of the Basel III norms
- Timeline of Basel III implementation
CCTV Security
14 HoursThis instructor-led, live training in Greece (online or onsite) is designed for security managers seeking to acquire basic to intermediate-level skills in CCTV security surveillance and management.
By the end of this training, participants will be able to:
- Familiarize themselves with types of CCTV systems and understand their benefits and features.
- Understand cabling and CCTV systems setup requirements.
- Install, configure, and manage CCTV systems.
Certified Fraud Examiner (CFE) Preparation
70 HoursThis instructor-led, live training in Greece (online or onsite) is designed for advanced-level professionals seeking a thorough understanding of fraud examination concepts and preparation for the Certified Fraud Examiner (CFE) exam.
Upon completion of this training, participants will be able to:
- Acquire in-depth knowledge of fraud examination principles and processes.
- Identify, investigate, and prevent various forms of financial fraud.
- Comprehend the legal framework surrounding fraud, including its legal elements, applicable laws, and regulations.
- Develop practical skills for conducting fraud investigations, such as evidence collection, interviewing techniques, and data analysis.
- Design and implement effective fraud prevention and deterrence programs within organizations.
- Build the confidence and expertise necessary to pass the Certified Fraud Examiner (CFE) exam successfully.
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This intensive four-day event serves as comprehensive preparation for the CGEIT exam, designed to equip you with the expertise needed to pass this challenging certification on your first attempt. The CGEIT qualification is a globally recognised benchmark of excellence in IT governance, awarded by ISACA. It is tailored for professionals tasked with managing IT governance or holding significant advisory and assurance responsibilities in this domain.
Attaining CGEIT status enhances your professional visibility in the marketplace and amplifies your influence at the executive level.
Objectives:
This seminar aims to prepare delegates for the CGEIT examination by building upon their existing knowledge and understanding, ensuring they are fully prepared to meet the standards defined by ISACA for successful exam completion.
Target Audience:
The course is intended for IT and business professionals who possess substantial experience in IT governance and are preparing to sit for the CGEIT examination.
CISM - Certified Information Security Manager
28 HoursDescription:
Please note that this updated CISM exam content outline applies to examinations commencing from 1 June 2022.
CISM® stands as the most distinguished and rigorous qualification for Information Security Managers worldwide. This credential offers you the opportunity to join an elite peer network, empowering you to continuously learn and adapt to the evolving opportunities and challenges within Information Security Management.
Our CISM training methodology ensures comprehensive coverage of the content across the four CISM domains, with a clear emphasis on building strong conceptual foundations and mastering ISACA-published CISM exam questions. This course provides intensive training and robust exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination.
Our instructors advise all participants to review the ISACA-published CISM QA&E (Questions, Answers, and Explanations) as part of their exam preparation. The QA&E is invaluable for helping participants understand the style of ISACA questions, the approach to solving them, and aids in the rapid assimilation of CISM concepts during live classroom sessions.
All our trainers possess extensive experience in delivering CISM training, ensuring you are thoroughly prepared for the CISM examination.
Goal:
The primary objective is to pass your CISM examination on the first attempt.
Objectives:
- Apply the acquired knowledge practically to benefit your organisation
- Establish and maintain an information security governance framework to achieve your organization's goals and objectives
- Manage information risk to an acceptable level to meet business and compliance requirements
- Establish and maintain information security architectures (people, process, technology)
- Integrate information security requirements into the contracts and activities of third parties and suppliers
- Plan, establish, and manage the capability to detect, investigate, respond to, and recover from information security incidents to minimise business impact
Target Audience:
- Security professionals with 3-5 years of frontline experience
- Information security managers or individuals with management responsibilities
- Information security staff and assurance providers requiring an in-depth understanding of information security management, including: CISOs, CIOs, CSOs, privacy officers, risk managers, security auditors, compliance personnel, BCP/DR personnel, and executive and operational managers responsible for assurance functions
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in Greece (online or on-site) is designed for compliance professionals in the payment services sector who wish to create, implement, and enforce a robust compliance program within their organizations.
Upon completion of this training, participants will be equipped to:
- Comprehend the regulatory requirements imposed by government authorities on payment service providers.
- Develop internal policies and procedures necessary to meet regulatory obligations.
- Establish a compliance program that aligns with applicable laws.
- Ensure that all corporate processes and procedures adhere to the established compliance framework.
- Safeguard the business's reputation while mitigating the risk of legal disputes.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursThis instructor-led, live training in Greece (online or onsite) is designed for intermediate-level cybersecurity professionals seeking to enhance their understanding of GRC frameworks and apply them to secure and compliant business operations.
By the end of this training, participants will be able to:
- Understand the key components of cybersecurity governance, risk, and compliance.
- Conduct risk assessments and develop risk mitigation strategies.
- Implement compliance measures and manage regulatory requirements.
- Develop and enforce security policies and procedures.
Accessibility by Design (Compliance with EU ACT)
21 HoursThis course offers an expert overview of the newly enacted Accessibility Law, empowering developers with the practical skills needed to design, develop, and sustain fully accessible applications. Beginning with a contextual discussion on the significance and implications of the law, the curriculum swiftly transitions into practical coding exercises, tools, and testing methodologies to guarantee compliance and inclusivity for users with disabilities.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse Objective:
The goal is to equip participants with a solid understanding of GRC processes and capabilities, along with the practical skills needed to integrate governance, performance management, risk management, internal control, and compliance activities.
Course Summary:
- Essential GRC terminology and definitions
- Core principles of GRC
- Key components, practices, and activities
- The interplay between GRC and related disciplines
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Greece (online or onsite) is designed for developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Compliance and the Management of Compliance Risk
21 HoursAudience
This course is designed for all staff members who need a practical grasp of Compliance and effective Risk Management.
Course Format
The training utilizes a blended learning approach comprising:
- Guided discussions
- Presentation slides
- Case study analyses
- Real-world scenarios
Course Objectives
Upon completion, participants will be able to:
Gain a comprehensive understanding of essential Compliance aspects, alongside national and international initiatives focused on managing related risks.
Articulate how organizations and their teams can implement an effective Compliance Risk Management Framework.
Clarify the duties of the Compliance Officer and the Money Laundering Reporting Officer, and understand how these roles fit within the broader business structure.
Recognize key risk areas in Financial Crime, specifically within international operations, offshore centers, and interactions with high-net-worth clients.
Open Source Software (OSS) Management
14 HoursOpen Source Software (OSS) Management involves the comprehensive oversight of the lifecycle of open-source components within an organization, ensuring their secure, compliant, and efficient utilization.
This instructor-led, live training session (available online or onsite) is designed for intermediate-level IT professionals seeking to implement best practices for managing open-source software in enterprise and government sectors.
Upon completion of this training, participants will be equipped to:
- Develop effective OSS policies and governance frameworks.
- Utilize SBOM and SCA tools to identify, track, and manage open-source dependencies.
- Mitigate risks related to licensing and security vulnerabilities.
- Streamline the adoption of OSS while maximizing innovation and cost savings.
Course Format
- Interactive lectures and discussions.
- Case studies and scenario-based exercises.
- Hands-on demonstrations with OSS management tools.
Course Customization Options
- This course can be customized to align with specific organizational OSS policies and toolchains. Please contact us to arrange.
PCI-DSS Practitioner
14 HoursThis instructor-led, live Payment Card Industry Professional training in Greece (online or onsite) offers a professional qualification for industry practitioners aiming to demonstrate their expertise and understanding of the PCI Data Security Standard (PCI DSS).
Upon completing this training, participants will be equipped to:
- Comprehend the payment process and the PCI standards established to safeguard it.
- Recognize the roles and responsibilities of entities operating within the payment industry.
- Gain a thorough insight into and understanding of the 12 PCI DSS requirements.
- Showcase knowledge of PCI DSS and its application to organizations involved in the transaction lifecycle.