vinsys
Vinsys International
Vinsys IT Services
HomeCorporateIndividualGalleryOur PresenceAbout UsCareerPrivacy PolicyTerms and ConditionsBe An Instructor
{"courseDuratoin":null,"subCategory":"Cybersecurity Certification Training","courseRating":4,"courseSummary":"The Certified Information Systems Auditor (CISA) assignment is an all inclusive known affirmation for Information Systems review control, confirmation and security experts. This Certified Information Systems Auditor (CISA) course exhibits your review involvement, aptitudes and learning, and further approves your capacities to survey vulnerabilities, cover consistence and foundation controls inside the venture. You'll likewise pick up ability in the obtaining, advancement, testing, and usage of data frameworks and take in the rules, benchmarks and best practices of securing them.","pageId":"cisa-certification-training","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"CISA Certification Training Program","courseImage":"certified-information-systems-auditor-(cisa).png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4,"courseStartsOn":"","pageURL":"/technology-training/cisa-certification-training","id":null,"batchType":"WeekEnd","isFavourite":null}
Cybersecurity Certification Training
4
The Certified Information Systems Auditor (CISA) assignment is an all inclusive known affirmation for Information Systems review control, confirmation and security experts. This Certified Information Systems Auditor (CISA) course exhibits your review involvement, aptitudes and learning, and further approves your capacities to survey vulnerabilities, cover consistence and foundation controls inside the venture. You'll likewise pick up ability in the obtaining, advancement, testing, and usage of data frameworks and take in the rules, benchmarks and best practices of securing them.
cisa-certification-training
10000
2000
Technology Training
Online
technology-training

CISA Certification Training Program

CISA Certification Training Program

certified-information-systems-auditor-(cisa).png
true
images/
ALL
4
WeekEnd
[{"reviewUser":{"firstName":"Ernest","lastName":"Williams","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"I had newly become an Audit Manager and had very less knowledge of the subject and wanted to upgrade my skills. Hence I took the CISA Certification Training program offered by Vinsys. The course has really helped me. It has improved my performance and efficiency.","course":"Business Communication","id":null,"ratingCount":5,"title":"Estimator"},{"reviewUser":{"firstName":"Shyamal","lastName":"Saxena","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"I was an Audit Manager in an IT section. I wanted to upgrade my skills and knowledge. Hence I chose for Vinsys\u2019 CISA Certification Training Program as it was my trusted source. Thanks to them my performance and work efficiency has increased thrice fold. ","course":"Business Communication","id":null,"ratingCount":4,"title":"Estimator"},{"reviewUser":{"firstName":"Amol","lastName":"Randhav","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"I was a Consultant in a reputed firm. I decided that my skills needed to be upgraded and enrolled for the CISA Certification Training Program offered by Vinsys. Thus I was able to get my Certification with ease and was finally able to put my 100% in work.","course":"Business Communication","id":null,"ratingCount":3,"title":"Estimator"}]
{"reviewUser":{"firstName":"Ernest","lastName":"Williams","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"I had newly become an Audit Manager and had very less knowledge of the subject and wanted to upgrade my skills. Hence I took the CISA Certification Training program offered by Vinsys. The course has really helped me. It has improved my performance and efficiency.","course":"Business Communication","id":null,"ratingCount":5,"title":"Estimator"}
{"firstName":"Ernest","lastName":"Williams","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1}
Ernest
Williams
/reviewer.png
/images
1
I had newly become an Audit Manager and had very less knowledge of the subject and wanted to upgrade my skills. Hence I took the CISA Certification Training program offered by Vinsys. The course has really helped me. It has improved my performance and efficiency.
Business Communication
5
Estimator
{"reviewUser":{"firstName":"Shyamal","lastName":"Saxena","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"I was an Audit Manager in an IT section. I wanted to upgrade my skills and knowledge. Hence I chose for Vinsys\u2019 CISA Certification Training Program as it was my trusted source. Thanks to them my performance and work efficiency has increased thrice fold. ","course":"Business Communication","id":null,"ratingCount":4,"title":"Estimator"}
{"firstName":"Shyamal","lastName":"Saxena","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1}
Shyamal
Saxena
/reviewer.png
/images
1
I was an Audit Manager in an IT section. I wanted to upgrade my skills and knowledge. Hence I chose for Vinsys? CISA Certification Training Program as it was my trusted source. Thanks to them my performance and work efficiency has increased thrice fold.
Business Communication
4
Estimator
{"reviewUser":{"firstName":"Amol","lastName":"Randhav","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"I was a Consultant in a reputed firm. I decided that my skills needed to be upgraded and enrolled for the CISA Certification Training Program offered by Vinsys. Thus I was able to get my Certification with ease and was finally able to put my 100% in work.","course":"Business Communication","id":null,"ratingCount":3,"title":"Estimator"}
{"firstName":"Amol","lastName":"Randhav","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1}
Amol
Randhav
/reviewer.png
/images
1
I was a Consultant in a reputed firm. I decided that my skills needed to be upgraded and enrolled for the CISA Certification Training Program offered by Vinsys. Thus I was able to get my Certification with ease and was finally able to put my 100% in work.
Business Communication
3
Estimator
0
[{"tabName":"What will you learn?","tabNumber":1,"content":{"ParamDetails":{"features":[{"heading":"After the completion of the Program, the participants would be able to:","_id":1,"listContent":[{"feature":"Identify and assess vulnerabilities and report on compliance and institutional controls","_id":1},{"feature":"Understand IS audit and assurance guidelines, standards, and best practices.","_id":2},{"feature":"Understand and learn how to govern and control enterprise IT environments","_id":3},{"feature":"Understand the acquisition, development, testing, and implementation of information systems.","_id":3},{"feature":"Demonstrate working knowledge of the five domains of CISA, as prescribed by ISACA.","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISA certification exam by ISACA.","_id":3}]}],"description":"","_id":2},"_id":2}},{"tabName":"Audience","tabNumber":2,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT Directors/Managers responsible for Information Security","_id":2},{"feature":"Security Auditors/Architects","_id":3},{"feature":"Security Systems Engineers","_id":3},{"feature":"Chief Information Security Officers","_id":3},{"feature":"Network Architects","_id":3},{"feature":"Professionals responsible for maintaining conformance with ISMS requirements","_id":3},{"feature":"ISMS members ","_id":3}]}],"description":"","_id":2},"_id":2}},{"tabName":"Eligibility Criteria","tabNumber":3,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals should have five or more years of experience in IS audit, control, assurance, or security. ","_id":1},{"feature":"Waivers are available for a maximum of three years.","_id":2}]}],"description":"","_id":2},"_id":2}},{"tabName":"Course Topics","tabNumber":4,"content":{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"Domain 1\u2014 The Process of Auditing Information Systems ","_id":36},{"feature":"Domain 2\u2014 Governance and Management of IT ","_id":37},{"feature":"Domain 3\u2014 Information Systems Acquisition, Development and Implementation","_id":37},{"feature":"Domain 4\u2014 Information Systems Operations, Maintenance and Service Management","_id":37},{"feature":"Domain 5\u2014 Protection of Information Assets","_id":37}]}],"description":"","_id":4},"_id":4}},{"tabName":"Key Features","tabNumber":5,"content":{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"The Certified Information Systems Auditor (CISA) program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]}],"description":"","_id":4},"_id":4}},{"tabName":"Course Advisor","tabNumber":6,"content":{"advisiorName":"Mr. Sandeep Sehgal, CISSP, ISO 27001 LI, PMP, ITIL v3 Foundation & IBM Certified Sr PM","advisiorDescription":"","imageName":"/sandeep-sehgal.png","imageUrl":"/images","width":"100","disabled":true,"_id":1,"designation":"Senior SME \u2013 IT Security Management Frameworks","achivements":[{"achivement":"Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.","_id":1},{"achivement":"He has unmatched industry experience on domains such as ISMS, ITSM, IT Security Project Management, Ethical Hacking","_id":1},{"achivement":"He has trained over 1600 corporate team members/students on CISSP, CSSLP and Project Management","_id":1}],"class":"button","version":"2.0","height":"10"}},{"tabName":"FAQ's","tabNumber":7,"content":{"ParamDetails":{"features":[{"heading":"What is CISA?","_id":4,"listContent":[{"feature":"Certified Information Systems Auditor (CISA) is a certification issued by ISACA for the people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the CISA Exam?","_id":4,"listContent":[{"feature":"Possess a minimum of five years of direct full-time IS Audit, control, assurance and security work experience. Waiver is available for a maximum of three years.","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration usually is 4 days. Few customized programs could be 5 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]},{"heading":"Where can one give the CISA examination?","_id":4,"listContent":[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]}],"description":null,"_id":4},"_id":7}}]
{"tabName":"What will you learn?","tabNumber":1,"content":{"ParamDetails":{"features":[{"heading":"After the completion of the Program, the participants would be able to:","_id":1,"listContent":[{"feature":"Identify and assess vulnerabilities and report on compliance and institutional controls","_id":1},{"feature":"Understand IS audit and assurance guidelines, standards, and best practices.","_id":2},{"feature":"Understand and learn how to govern and control enterprise IT environments","_id":3},{"feature":"Understand the acquisition, development, testing, and implementation of information systems.","_id":3},{"feature":"Demonstrate working knowledge of the five domains of CISA, as prescribed by ISACA.","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISA certification exam by ISACA.","_id":3}]}],"description":"","_id":2},"_id":2}}
What will you learn?
1
{"ParamDetails":{"features":[{"heading":"After the completion of the Program, the participants would be able to:","_id":1,"listContent":[{"feature":"Identify and assess vulnerabilities and report on compliance and institutional controls","_id":1},{"feature":"Understand IS audit and assurance guidelines, standards, and best practices.","_id":2},{"feature":"Understand and learn how to govern and control enterprise IT environments","_id":3},{"feature":"Understand the acquisition, development, testing, and implementation of information systems.","_id":3},{"feature":"Demonstrate working knowledge of the five domains of CISA, as prescribed by ISACA.","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISA certification exam by ISACA.","_id":3}]}],"description":"","_id":2},"_id":2}
{"features":[{"heading":"After the completion of the Program, the participants would be able to:","_id":1,"listContent":[{"feature":"Identify and assess vulnerabilities and report on compliance and institutional controls","_id":1},{"feature":"Understand IS audit and assurance guidelines, standards, and best practices.","_id":2},{"feature":"Understand and learn how to govern and control enterprise IT environments","_id":3},{"feature":"Understand the acquisition, development, testing, and implementation of information systems.","_id":3},{"feature":"Demonstrate working knowledge of the five domains of CISA, as prescribed by ISACA.","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISA certification exam by ISACA.","_id":3}]}],"description":"","_id":2}
[{"heading":"After the completion of the Program, the participants would be able to:","_id":1,"listContent":[{"feature":"Identify and assess vulnerabilities and report on compliance and institutional controls","_id":1},{"feature":"Understand IS audit and assurance guidelines, standards, and best practices.","_id":2},{"feature":"Understand and learn how to govern and control enterprise IT environments","_id":3},{"feature":"Understand the acquisition, development, testing, and implementation of information systems.","_id":3},{"feature":"Demonstrate working knowledge of the five domains of CISA, as prescribed by ISACA.","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISA certification exam by ISACA.","_id":3}]}]
{"heading":"After the completion of the Program, the participants would be able to:","_id":1,"listContent":[{"feature":"Identify and assess vulnerabilities and report on compliance and institutional controls","_id":1},{"feature":"Understand IS audit and assurance guidelines, standards, and best practices.","_id":2},{"feature":"Understand and learn how to govern and control enterprise IT environments","_id":3},{"feature":"Understand the acquisition, development, testing, and implementation of information systems.","_id":3},{"feature":"Demonstrate working knowledge of the five domains of CISA, as prescribed by ISACA.","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISA certification exam by ISACA.","_id":3}]}

After the completion of the Program, the participants would be able to:

1
[{"feature":"Identify and assess vulnerabilities and report on compliance and institutional controls","_id":1},{"feature":"Understand IS audit and assurance guidelines, standards, and best practices.","_id":2},{"feature":"Understand and learn how to govern and control enterprise IT environments","_id":3},{"feature":"Understand the acquisition, development, testing, and implementation of information systems.","_id":3},{"feature":"Demonstrate working knowledge of the five domains of CISA, as prescribed by ISACA.","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISA certification exam by ISACA.","_id":3}]
{"feature":"Identify and assess vulnerabilities and report on compliance and institutional controls","_id":1}
Identify and assess vulnerabilities and report on compliance and institutional controls
1
{"feature":"Understand IS audit and assurance guidelines, standards, and best practices.","_id":2}
Understand IS audit and assurance guidelines, standards, and best practices.
2
{"feature":"Understand and learn how to govern and control enterprise IT environments","_id":3}
Understand and learn how to govern and control enterprise IT environments
3
{"feature":"Understand the acquisition, development, testing, and implementation of information systems.","_id":3}
Understand the acquisition, development, testing, and implementation of information systems.
3
{"feature":"Demonstrate working knowledge of the five domains of CISA, as prescribed by ISACA.","_id":3}
Demonstrate working knowledge of the five domains of CISA, as prescribed by ISACA.
3
{"feature":"Gain the relevant knowledge and skills required to pass the CISA certification exam by ISACA.","_id":3}
Gain the relevant knowledge and skills required to pass the CISA certification exam by ISACA.
3
2
2
{"tabName":"Audience","tabNumber":2,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT Directors/Managers responsible for Information Security","_id":2},{"feature":"Security Auditors/Architects","_id":3},{"feature":"Security Systems Engineers","_id":3},{"feature":"Chief Information Security Officers","_id":3},{"feature":"Network Architects","_id":3},{"feature":"Professionals responsible for maintaining conformance with ISMS requirements","_id":3},{"feature":"ISMS members ","_id":3}]}],"description":"","_id":2},"_id":2}}
Audience
2
{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT Directors/Managers responsible for Information Security","_id":2},{"feature":"Security Auditors/Architects","_id":3},{"feature":"Security Systems Engineers","_id":3},{"feature":"Chief Information Security Officers","_id":3},{"feature":"Network Architects","_id":3},{"feature":"Professionals responsible for maintaining conformance with ISMS requirements","_id":3},{"feature":"ISMS members ","_id":3}]}],"description":"","_id":2},"_id":2}
{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT Directors/Managers responsible for Information Security","_id":2},{"feature":"Security Auditors/Architects","_id":3},{"feature":"Security Systems Engineers","_id":3},{"feature":"Chief Information Security Officers","_id":3},{"feature":"Network Architects","_id":3},{"feature":"Professionals responsible for maintaining conformance with ISMS requirements","_id":3},{"feature":"ISMS members ","_id":3}]}],"description":"","_id":2}
[{"heading":"","_id":1,"listContent":[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT Directors/Managers responsible for Information Security","_id":2},{"feature":"Security Auditors/Architects","_id":3},{"feature":"Security Systems Engineers","_id":3},{"feature":"Chief Information Security Officers","_id":3},{"feature":"Network Architects","_id":3},{"feature":"Professionals responsible for maintaining conformance with ISMS requirements","_id":3},{"feature":"ISMS members ","_id":3}]}]
{"heading":"","_id":1,"listContent":[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT Directors/Managers responsible for Information Security","_id":2},{"feature":"Security Auditors/Architects","_id":3},{"feature":"Security Systems Engineers","_id":3},{"feature":"Chief Information Security Officers","_id":3},{"feature":"Network Architects","_id":3},{"feature":"Professionals responsible for maintaining conformance with ISMS requirements","_id":3},{"feature":"ISMS members ","_id":3}]}

1
[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT Directors/Managers responsible for Information Security","_id":2},{"feature":"Security Auditors/Architects","_id":3},{"feature":"Security Systems Engineers","_id":3},{"feature":"Chief Information Security Officers","_id":3},{"feature":"Network Architects","_id":3},{"feature":"Professionals responsible for maintaining conformance with ISMS requirements","_id":3},{"feature":"ISMS members ","_id":3}]
{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1}
Professionals, Security Consultants/Managers involved in Information Security Management
1
{"feature":"IT Directors/Managers responsible for Information Security","_id":2}
IT Directors/Managers responsible for Information Security
2
{"feature":"Security Auditors/Architects","_id":3}
Security Auditors/Architects
3
{"feature":"Security Systems Engineers","_id":3}
Security Systems Engineers
3
{"feature":"Chief Information Security Officers","_id":3}
Chief Information Security Officers
3
{"feature":"Network Architects","_id":3}
Network Architects
3
{"feature":"Professionals responsible for maintaining conformance with ISMS requirements","_id":3}
Professionals responsible for maintaining conformance with ISMS requirements
3
{"feature":"ISMS members ","_id":3}
ISMS members
3
2
2
{"tabName":"Eligibility Criteria","tabNumber":3,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals should have five or more years of experience in IS audit, control, assurance, or security. ","_id":1},{"feature":"Waivers are available for a maximum of three years.","_id":2}]}],"description":"","_id":2},"_id":2}}
Eligibility Criteria
3
{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals should have five or more years of experience in IS audit, control, assurance, or security. ","_id":1},{"feature":"Waivers are available for a maximum of three years.","_id":2}]}],"description":"","_id":2},"_id":2}
{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals should have five or more years of experience in IS audit, control, assurance, or security. ","_id":1},{"feature":"Waivers are available for a maximum of three years.","_id":2}]}],"description":"","_id":2}
[{"heading":"","_id":1,"listContent":[{"feature":"Professionals should have five or more years of experience in IS audit, control, assurance, or security. ","_id":1},{"feature":"Waivers are available for a maximum of three years.","_id":2}]}]
{"heading":"","_id":1,"listContent":[{"feature":"Professionals should have five or more years of experience in IS audit, control, assurance, or security. ","_id":1},{"feature":"Waivers are available for a maximum of three years.","_id":2}]}

1
[{"feature":"Professionals should have five or more years of experience in IS audit, control, assurance, or security. ","_id":1},{"feature":"Waivers are available for a maximum of three years.","_id":2}]
{"feature":"Professionals should have five or more years of experience in IS audit, control, assurance, or security. ","_id":1}
Professionals should have five or more years of experience in IS audit, control, assurance, or security.
1
{"feature":"Waivers are available for a maximum of three years.","_id":2}
Waivers are available for a maximum of three years.
2
2
2
{"tabName":"Course Topics","tabNumber":4,"content":{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"Domain 1\u2014 The Process of Auditing Information Systems ","_id":36},{"feature":"Domain 2\u2014 Governance and Management of IT ","_id":37},{"feature":"Domain 3\u2014 Information Systems Acquisition, Development and Implementation","_id":37},{"feature":"Domain 4\u2014 Information Systems Operations, Maintenance and Service Management","_id":37},{"feature":"Domain 5\u2014 Protection of Information Assets","_id":37}]}],"description":"","_id":4},"_id":4}}
Course Topics
4
{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"Domain 1\u2014 The Process of Auditing Information Systems ","_id":36},{"feature":"Domain 2\u2014 Governance and Management of IT ","_id":37},{"feature":"Domain 3\u2014 Information Systems Acquisition, Development and Implementation","_id":37},{"feature":"Domain 4\u2014 Information Systems Operations, Maintenance and Service Management","_id":37},{"feature":"Domain 5\u2014 Protection of Information Assets","_id":37}]}],"description":"","_id":4},"_id":4}
{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"Domain 1\u2014 The Process of Auditing Information Systems ","_id":36},{"feature":"Domain 2\u2014 Governance and Management of IT ","_id":37},{"feature":"Domain 3\u2014 Information Systems Acquisition, Development and Implementation","_id":37},{"feature":"Domain 4\u2014 Information Systems Operations, Maintenance and Service Management","_id":37},{"feature":"Domain 5\u2014 Protection of Information Assets","_id":37}]}],"description":"","_id":4}
[{"heading":null,"_id":4,"listContent":[{"feature":"Domain 1\u2014 The Process of Auditing Information Systems ","_id":36},{"feature":"Domain 2\u2014 Governance and Management of IT ","_id":37},{"feature":"Domain 3\u2014 Information Systems Acquisition, Development and Implementation","_id":37},{"feature":"Domain 4\u2014 Information Systems Operations, Maintenance and Service Management","_id":37},{"feature":"Domain 5\u2014 Protection of Information Assets","_id":37}]}]
{"heading":null,"_id":4,"listContent":[{"feature":"Domain 1\u2014 The Process of Auditing Information Systems ","_id":36},{"feature":"Domain 2\u2014 Governance and Management of IT ","_id":37},{"feature":"Domain 3\u2014 Information Systems Acquisition, Development and Implementation","_id":37},{"feature":"Domain 4\u2014 Information Systems Operations, Maintenance and Service Management","_id":37},{"feature":"Domain 5\u2014 Protection of Information Assets","_id":37}]}
4
[{"feature":"Domain 1\u2014 The Process of Auditing Information Systems ","_id":36},{"feature":"Domain 2\u2014 Governance and Management of IT ","_id":37},{"feature":"Domain 3\u2014 Information Systems Acquisition, Development and Implementation","_id":37},{"feature":"Domain 4\u2014 Information Systems Operations, Maintenance and Service Management","_id":37},{"feature":"Domain 5\u2014 Protection of Information Assets","_id":37}]
{"feature":"Domain 1\u2014 The Process of Auditing Information Systems ","_id":36}
Domain 1? The Process of Auditing Information Systems
36
{"feature":"Domain 2\u2014 Governance and Management of IT ","_id":37}
Domain 2? Governance and Management of IT
37
{"feature":"Domain 3\u2014 Information Systems Acquisition, Development and Implementation","_id":37}
Domain 3? Information Systems Acquisition, Development and Implementation
37
{"feature":"Domain 4\u2014 Information Systems Operations, Maintenance and Service Management","_id":37}
Domain 4? Information Systems Operations, Maintenance and Service Management
37
{"feature":"Domain 5\u2014 Protection of Information Assets","_id":37}
Domain 5? Protection of Information Assets
37
4
4
{"tabName":"Key Features","tabNumber":5,"content":{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"The Certified Information Systems Auditor (CISA) program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]}],"description":"","_id":4},"_id":4}}
Key Features
5
{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"The Certified Information Systems Auditor (CISA) program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]}],"description":"","_id":4},"_id":4}
{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"The Certified Information Systems Auditor (CISA) program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]}],"description":"","_id":4}
[{"heading":null,"_id":4,"listContent":[{"feature":"The Certified Information Systems Auditor (CISA) program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]}]
{"heading":null,"_id":4,"listContent":[{"feature":"The Certified Information Systems Auditor (CISA) program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]}
4
[{"feature":"The Certified Information Systems Auditor (CISA) program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]
{"feature":"The Certified Information Systems Auditor (CISA) program is conducted by experienced and certified faculties","_id":1}
The Certified Information Systems Auditor (CISA) program is conducted by experienced and certified faculties
1
{"feature":"Students are given official course material","_id":1}
Students are given official course material
1
{"feature":"Trainers experienced with foreign training delivery","_id":1}
Trainers experienced with foreign training delivery
1
{"feature":"Special guidance for CISSP application to ISC2","_id":1}
Special guidance for CISSP application to ISC2
1
{"feature":"Sample exam papers are solved for real life experience","_id":1}
Sample exam papers are solved for real life experience
1
4
4
{"tabName":"Course Advisor","tabNumber":6,"content":{"advisiorName":"Mr. Sandeep Sehgal, CISSP, ISO 27001 LI, PMP, ITIL v3 Foundation & IBM Certified Sr PM","advisiorDescription":"","imageName":"/sandeep-sehgal.png","imageUrl":"/images","width":"100","disabled":true,"_id":1,"designation":"Senior SME \u2013 IT Security Management Frameworks","achivements":[{"achivement":"Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.","_id":1},{"achivement":"He has unmatched industry experience on domains such as ISMS, ITSM, IT Security Project Management, Ethical Hacking","_id":1},{"achivement":"He has trained over 1600 corporate team members/students on CISSP, CSSLP and Project Management","_id":1}],"class":"button","version":"2.0","height":"10"}}
Course Advisor
6
{"advisiorName":"Mr. Sandeep Sehgal, CISSP, ISO 27001 LI, PMP, ITIL v3 Foundation & IBM Certified Sr PM","advisiorDescription":"","imageName":"/sandeep-sehgal.png","imageUrl":"/images","width":"100","disabled":true,"_id":1,"designation":"Senior SME \u2013 IT Security Management Frameworks","achivements":[{"achivement":"Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.","_id":1},{"achivement":"He has unmatched industry experience on domains such as ISMS, ITSM, IT Security Project Management, Ethical Hacking","_id":1},{"achivement":"He has trained over 1600 corporate team members/students on CISSP, CSSLP and Project Management","_id":1}],"class":"button","version":"2.0","height":"10"}

Mr. Sandeep Sehgal, CISSP, ISO 27001 LI, PMP, ITIL v3 Foundation & IBM Certified Sr PM

/sandeep-sehgal.png
/images
100
true
1
Senior SME ? IT Security Management Frameworks
[{"achivement":"Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.","_id":1},{"achivement":"He has unmatched industry experience on domains such as ISMS, ITSM, IT Security Project Management, Ethical Hacking","_id":1},{"achivement":"He has trained over 1600 corporate team members/students on CISSP, CSSLP and Project Management","_id":1}]
{"achivement":"Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.","_id":1}
Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.
1
{"achivement":"He has unmatched industry experience on domains such as ISMS, ITSM, IT Security Project Management, Ethical Hacking","_id":1}
He has unmatched industry experience on domains such as ISMS, ITSM, IT Security Project Management, Ethical Hacking
1
{"achivement":"He has trained over 1600 corporate team members/students on CISSP, CSSLP and Project Management","_id":1}
He has trained over 1600 corporate team members/students on CISSP, CSSLP and Project Management
1
button
2.0
10
{"tabName":"FAQ's","tabNumber":7,"content":{"ParamDetails":{"features":[{"heading":"What is CISA?","_id":4,"listContent":[{"feature":"Certified Information Systems Auditor (CISA) is a certification issued by ISACA for the people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the CISA Exam?","_id":4,"listContent":[{"feature":"Possess a minimum of five years of direct full-time IS Audit, control, assurance and security work experience. Waiver is available for a maximum of three years.","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration usually is 4 days. Few customized programs could be 5 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]},{"heading":"Where can one give the CISA examination?","_id":4,"listContent":[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]}],"description":null,"_id":4},"_id":7}}
FAQ's
7
{"ParamDetails":{"features":[{"heading":"What is CISA?","_id":4,"listContent":[{"feature":"Certified Information Systems Auditor (CISA) is a certification issued by ISACA for the people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the CISA Exam?","_id":4,"listContent":[{"feature":"Possess a minimum of five years of direct full-time IS Audit, control, assurance and security work experience. Waiver is available for a maximum of three years.","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration usually is 4 days. Few customized programs could be 5 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]},{"heading":"Where can one give the CISA examination?","_id":4,"listContent":[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]}],"description":null,"_id":4},"_id":7}
{"features":[{"heading":"What is CISA?","_id":4,"listContent":[{"feature":"Certified Information Systems Auditor (CISA) is a certification issued by ISACA for the people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the CISA Exam?","_id":4,"listContent":[{"feature":"Possess a minimum of five years of direct full-time IS Audit, control, assurance and security work experience. Waiver is available for a maximum of three years.","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration usually is 4 days. Few customized programs could be 5 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]},{"heading":"Where can one give the CISA examination?","_id":4,"listContent":[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]}],"description":null,"_id":4}
[{"heading":"What is CISA?","_id":4,"listContent":[{"feature":"Certified Information Systems Auditor (CISA) is a certification issued by ISACA for the people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the CISA Exam?","_id":4,"listContent":[{"feature":"Possess a minimum of five years of direct full-time IS Audit, control, assurance and security work experience. Waiver is available for a maximum of three years.","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration usually is 4 days. Few customized programs could be 5 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]},{"heading":"Where can one give the CISA examination?","_id":4,"listContent":[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]}]
{"heading":"What is CISA?","_id":4,"listContent":[{"feature":"Certified Information Systems Auditor (CISA) is a certification issued by ISACA for the people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected.","_id":62}]}

What is CISA?

4
[{"feature":"Certified Information Systems Auditor (CISA) is a certification issued by ISACA for the people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected.","_id":62}]
{"feature":"Certified Information Systems Auditor (CISA) is a certification issued by ISACA for the people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected.","_id":62}
Certified Information Systems Auditor (CISA) is a certification issued by ISACA for the people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected.
62
{"heading":"What is the Eligibility Criteria / Pre-requisites for the CISA Exam?","_id":4,"listContent":[{"feature":"Possess a minimum of five years of direct full-time IS Audit, control, assurance and security work experience. Waiver is available for a maximum of three years.","_id":62}]}

What is the Eligibility Criteria / Pre-requisites for the CISA Exam?

4
[{"feature":"Possess a minimum of five years of direct full-time IS Audit, control, assurance and security work experience. Waiver is available for a maximum of three years.","_id":62}]
{"feature":"Possess a minimum of five years of direct full-time IS Audit, control, assurance and security work experience. Waiver is available for a maximum of three years.","_id":62}
Possess a minimum of five years of direct full-time IS Audit, control, assurance and security work experience. Waiver is available for a maximum of three years.
62
{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration usually is 4 days. Few customized programs could be 5 days.","_id":62}]}

What is the duration of training?

4
[{"feature":"Training duration usually is 4 days. Few customized programs could be 5 days.","_id":62}]
{"feature":"Training duration usually is 4 days. Few customized programs could be 5 days.","_id":62}
Training duration usually is 4 days. Few customized programs could be 5 days.
62
{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]}

Do you provide certificates on successfully completing the course?

4
[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]
{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}
Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course.
62
{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]}

When are the classes conducted?

4
[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]
{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}
All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.
62
{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]}

What all is included in the course?

4
[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]
{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}
Along with facilitating training sessions, we provide required course material and practice questions for exam preparation
62
{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]}

Who conduct the training sessions?

4
[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]
{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}
Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.
62
{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]}

Why one should join Vinsys?

4
[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]
{"feature":"Certified Instructor","_id":62}
Certified Instructor
62
{"feature":"Practical Education","_id":62}
Practical Education
62
{"feature":"Experienced Industry Experts","_id":62}
Experienced Industry Experts
62
{"feature":"Approved course material","_id":62}
Approved course material
62
{"feature":"Quality Courseware","_id":62}
Quality Courseware
62
{"heading":"Where can one give the CISA examination?","_id":4,"listContent":[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]}

Where can one give the CISA examination?

4
[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]
{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}
All ISACA exams are conducted by ISACA. Please check latest candidate guide.
62
4
7
5af42b3368f8e31708fd89b9
{"courses":[{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"This comprehensive, fast-paced VMware NSX training course focuses on installing, configuring, and managing VMware NSX. This V6.2 program presents VMware NSX as a part of the software-defined data center. Professionals will learn how to use logical switching in VMware NSX to virtualize the switching environment. The VMware NSX Certification also details logical routing to enable you to dynamically route between different virtual environments. As a professional, you will learn how to use gateway services, firewall configurations, and security services to help secure and optimize your VMware NSX environment.","pageId":"vmware-nsx-install-configure-manage","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"VMware NSX: Install, Configure, Manage V6.2 Training Course","courseImage":"vmware.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.8,"courseStartsOn":"","pageURL":"/technology-training/vmware-nsx-install-configure-manage","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"Architecting on AWS course covers the basics of building IT framework on AWS. The course is intended to show arrangements designers how to improve the utilization of the AWS Cloud by understanding AWS administrations and how these administrations fit into cloud-based arrangements. Since building arrangements may vary contingent upon industry, kind of utilization's, and size of business, this architecting on AWS training accentuates AWS Cloud best practices and prescribed outline examples to enable understudies to thoroughly consider the procedure of architecting ideal IT arrangements on AWS. It additionally displays contextual investigations all through the course that feature how some AWS clients have outlined their frameworks and the techniques and administrations they executed. Chances to manufacture an assortment of foundations through a guided, hands-on approach are additionally given","pageId":"architecting-on-aws","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"Architecting on AWS","courseImage":"aws.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.8,"courseStartsOn":"","pageURL":"/technology-training/architecting-on-aws","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Business Analysis Certification Training","courseRating":4,"courseSummary":"This CBAP certification training program is intended to enable members to comprehend IIBA BABOK v3.0 Knowledge Areas, Business Analysis Techniques, Requirement Models, and Requirements Documentation designs. This course covers the part and duties of a Business Analyst in customary Waterfall and the most recent Agile-Scrum strategies. The CBAP certification training course likewise covers the approach and plan expected to show up for IIBA's CBAP confirmation exam. Members are likewise helped with topping off their Exam Eligibility Application. This Program satisfies the IIBA compulsory prerequisite of 35 contact hours which a CBAP hopeful must have, before applying for the CBAP Certification examination. This course is enlisted with the IIBA as Ace Business Analysis Training","pageId":"cbap-certification-training","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"CBAP Certification Training Program","courseImage":"dummy.jpg","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.2,"courseStartsOn":"","pageURL":"/technology-training/cbap-certification-training","id":null,"batchType":"WeekEnd","isFavourite":null}],"totalCount":null}
[{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"This comprehensive, fast-paced VMware NSX training course focuses on installing, configuring, and managing VMware NSX. This V6.2 program presents VMware NSX as a part of the software-defined data center. Professionals will learn how to use logical switching in VMware NSX to virtualize the switching environment. The VMware NSX Certification also details logical routing to enable you to dynamically route between different virtual environments. As a professional, you will learn how to use gateway services, firewall configurations, and security services to help secure and optimize your VMware NSX environment.","pageId":"vmware-nsx-install-configure-manage","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"VMware NSX: Install, Configure, Manage V6.2 Training Course","courseImage":"vmware.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.8,"courseStartsOn":"","pageURL":"/technology-training/vmware-nsx-install-configure-manage","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"Architecting on AWS course covers the basics of building IT framework on AWS. The course is intended to show arrangements designers how to improve the utilization of the AWS Cloud by understanding AWS administrations and how these administrations fit into cloud-based arrangements. Since building arrangements may vary contingent upon industry, kind of utilization's, and size of business, this architecting on AWS training accentuates AWS Cloud best practices and prescribed outline examples to enable understudies to thoroughly consider the procedure of architecting ideal IT arrangements on AWS. It additionally displays contextual investigations all through the course that feature how some AWS clients have outlined their frameworks and the techniques and administrations they executed. Chances to manufacture an assortment of foundations through a guided, hands-on approach are additionally given","pageId":"architecting-on-aws","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"Architecting on AWS","courseImage":"aws.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.8,"courseStartsOn":"","pageURL":"/technology-training/architecting-on-aws","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Business Analysis Certification Training","courseRating":4,"courseSummary":"This CBAP certification training program is intended to enable members to comprehend IIBA BABOK v3.0 Knowledge Areas, Business Analysis Techniques, Requirement Models, and Requirements Documentation designs. This course covers the part and duties of a Business Analyst in customary Waterfall and the most recent Agile-Scrum strategies. The CBAP certification training course likewise covers the approach and plan expected to show up for IIBA's CBAP confirmation exam. Members are likewise helped with topping off their Exam Eligibility Application. This Program satisfies the IIBA compulsory prerequisite of 35 contact hours which a CBAP hopeful must have, before applying for the CBAP Certification examination. This course is enlisted with the IIBA as Ace Business Analysis Training","pageId":"cbap-certification-training","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"CBAP Certification Training Program","courseImage":"dummy.jpg","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.2,"courseStartsOn":"","pageURL":"/technology-training/cbap-certification-training","id":null,"batchType":"WeekEnd","isFavourite":null}]
{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"This comprehensive, fast-paced VMware NSX training course focuses on installing, configuring, and managing VMware NSX. This V6.2 program presents VMware NSX as a part of the software-defined data center. Professionals will learn how to use logical switching in VMware NSX to virtualize the switching environment. The VMware NSX Certification also details logical routing to enable you to dynamically route between different virtual environments. As a professional, you will learn how to use gateway services, firewall configurations, and security services to help secure and optimize your VMware NSX environment.","pageId":"vmware-nsx-install-configure-manage","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"VMware NSX: Install, Configure, Manage V6.2 Training Course","courseImage":"vmware.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.8,"courseStartsOn":"","pageURL":"/technology-training/vmware-nsx-install-configure-manage","id":null,"batchType":"WeekEnd","isFavourite":null}
Technology Training
4
This comprehensive, fast-paced VMware NSX training course focuses on installing, configuring, and managing VMware NSX. This V6.2 program presents VMware NSX as a part of the software-defined data center. Professionals will learn how to use logical switching in VMware NSX to virtualize the switching environment. The VMware NSX Certification also details logical routing to enable you to dynamically route between different virtual environments. As a professional, you will learn how to use gateway services, firewall configurations, and security services to help secure and optimize your VMware NSX environment.
vmware-nsx-install-configure-manage
10000
2000
Technology Training
Online
technology-training

VMware NSX: Install, Configure, Manage V6.2 Training Course

VMware NSX: Install, Configure, Manage V6.2 Training Course

vmware.png
true
images/
ALL
3.8
WeekEnd
{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"Architecting on AWS course covers the basics of building IT framework on AWS. The course is intended to show arrangements designers how to improve the utilization of the AWS Cloud by understanding AWS administrations and how these administrations fit into cloud-based arrangements. Since building arrangements may vary contingent upon industry, kind of utilization's, and size of business, this architecting on AWS training accentuates AWS Cloud best practices and prescribed outline examples to enable understudies to thoroughly consider the procedure of architecting ideal IT arrangements on AWS. It additionally displays contextual investigations all through the course that feature how some AWS clients have outlined their frameworks and the techniques and administrations they executed. Chances to manufacture an assortment of foundations through a guided, hands-on approach are additionally given","pageId":"architecting-on-aws","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"Architecting on AWS","courseImage":"aws.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.8,"courseStartsOn":"","pageURL":"/technology-training/architecting-on-aws","id":null,"batchType":"WeekEnd","isFavourite":null}
Technology Training
4
Architecting on AWS course covers the basics of building IT framework on AWS. The course is intended to show arrangements designers how to improve the utilization of the AWS Cloud by understanding AWS administrations and how these administrations fit into cloud-based arrangements. Since building arrangements may vary contingent upon industry, kind of utilization's, and size of business, this architecting on AWS training accentuates AWS Cloud best practices and prescribed outline examples to enable understudies to thoroughly consider the procedure of architecting ideal IT arrangements on AWS. It additionally displays contextual investigations all through the course that feature how some AWS clients have outlined their frameworks and the techniques and administrations they executed. Chances to manufacture an assortment of foundations through a guided, hands-on approach are additionally given
architecting-on-aws
10000
2000
Technology Training
Online
technology-training

Architecting on AWS

Architecting on AWS

aws.png
true
images/
ALL
3.8
WeekEnd
{"courseDuratoin":null,"subCategory":"Business Analysis Certification Training","courseRating":4,"courseSummary":"This CBAP certification training program is intended to enable members to comprehend IIBA BABOK v3.0 Knowledge Areas, Business Analysis Techniques, Requirement Models, and Requirements Documentation designs. This course covers the part and duties of a Business Analyst in customary Waterfall and the most recent Agile-Scrum strategies. The CBAP certification training course likewise covers the approach and plan expected to show up for IIBA's CBAP confirmation exam. Members are likewise helped with topping off their Exam Eligibility Application. This Program satisfies the IIBA compulsory prerequisite of 35 contact hours which a CBAP hopeful must have, before applying for the CBAP Certification examination. This course is enlisted with the IIBA as Ace Business Analysis Training","pageId":"cbap-certification-training","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"CBAP Certification Training Program","courseImage":"dummy.jpg","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.2,"courseStartsOn":"","pageURL":"/technology-training/cbap-certification-training","id":null,"batchType":"WeekEnd","isFavourite":null}
Business Analysis Certification Training
4
This CBAP certification training program is intended to enable members to comprehend IIBA BABOK v3.0 Knowledge Areas, Business Analysis Techniques, Requirement Models, and Requirements Documentation designs. This course covers the part and duties of a Business Analyst in customary Waterfall and the most recent Agile-Scrum strategies. The CBAP certification training course likewise covers the approach and plan expected to show up for IIBA's CBAP confirmation exam. Members are likewise helped with topping off their Exam Eligibility Application. This Program satisfies the IIBA compulsory prerequisite of 35 contact hours which a CBAP hopeful must have, before applying for the CBAP Certification examination. This course is enlisted with the IIBA as Ace Business Analysis Training
cbap-certification-training
10000
2000
Technology Training
Online
technology-training

CBAP Certification Training Program

CBAP Certification Training Program

dummy.jpg
true
images/
ALL
4.2
WeekEnd