vinsys
Vinsys International
Vinsys IT Services
HomeCorporateIndividualGalleryOur PresenceAbout UsCareerPrivacy PolicyTerms and ConditionsBe An Instructor
{"courseDuratoin":null,"subCategory":"Cybersecurity Certification Training","courseRating":4,"courseSummary":"Certified Information Security Manager (CISM) certification training course gives approval to people who have shown they have learning and experience required to create and deal with a venture data security program. The affirmation planned for data security directors, yearning supervisors or IT specialists who bolster data security program administration.","pageId":"cism-certification-training","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"CISM Certification Training Program","courseImage":"certified-information-security-manager-(cism).png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.9,"courseStartsOn":"","pageURL":"/technology-training/cism-certification-training","id":null,"batchType":"WeekEnd","isFavourite":null}
Cybersecurity Certification Training
4
Certified Information Security Manager (CISM) certification training course gives approval to people who have shown they have learning and experience required to create and deal with a venture data security program. The affirmation planned for data security directors, yearning supervisors or IT specialists who bolster data security program administration.
cism-certification-training
10000
2000
Technology Training
Online
technology-training

CISM Certification Training Program

CISM Certification Training Program

certified-information-security-manager-(cism).png
true
images/
ALL
3.9
WeekEnd
[{"reviewUser":{"firstName":"Mr. Kiran","lastName":"Raghavan","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"Working as an Information Security Manager, I enrolled in the CISM Certification training. I am now able to take a comprehensive view of information systems security management and their relationship to materialise it to organizational success","course":"Business Communication","id":null,"ratingCount":5,"title":"Senior Business Analyst"},{"reviewUser":{"firstName":"Ernest","lastName":"Williams","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"Being an Information Security Manager, attending the CISM program enabled me to demonstrate to enterprise customers their commitment to compliance, security and integrity; ultimately contributing to the attraction and retention of customers. Thank you Vinsys for the wide-ranging study material that made it easier for me to understand.","course":"Business Communication","id":null,"ratingCount":4,"title":"Estimator"},{"reviewUser":{"firstName":"Prosanto","lastName":"Das","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"Ensuring that there is improved alignment between the organization's information security program and its broader goals and objectives I had been newly appointed as an Information Security Manager. Thus I decided to increase my skills and joined Vinsys\u2019 CISM Certification Training Program. The program has really helped me and I was able to get my certification easily.","course":"Business Communication","id":null,"ratingCount":3,"title":"Estimator"}]
{"reviewUser":{"firstName":"Mr. Kiran","lastName":"Raghavan","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"Working as an Information Security Manager, I enrolled in the CISM Certification training. I am now able to take a comprehensive view of information systems security management and their relationship to materialise it to organizational success","course":"Business Communication","id":null,"ratingCount":5,"title":"Senior Business Analyst"}
{"firstName":"Mr. Kiran","lastName":"Raghavan","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1}
Mr. Kiran
Raghavan
/reviewer.png
/images
1
Working as an Information Security Manager, I enrolled in the CISM Certification training. I am now able to take a comprehensive view of information systems security management and their relationship to materialise it to organizational success
Business Communication
5
Senior Business Analyst
{"reviewUser":{"firstName":"Ernest","lastName":"Williams","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"Being an Information Security Manager, attending the CISM program enabled me to demonstrate to enterprise customers their commitment to compliance, security and integrity; ultimately contributing to the attraction and retention of customers. Thank you Vinsys for the wide-ranging study material that made it easier for me to understand.","course":"Business Communication","id":null,"ratingCount":4,"title":"Estimator"}
{"firstName":"Ernest","lastName":"Williams","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1}
Ernest
Williams
/reviewer.png
/images
1
Being an Information Security Manager, attending the CISM program enabled me to demonstrate to enterprise customers their commitment to compliance, security and integrity; ultimately contributing to the attraction and retention of customers. Thank you Vinsys for the wide-ranging study material that made it easier for me to understand.
Business Communication
4
Estimator
{"reviewUser":{"firstName":"Prosanto","lastName":"Das","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"Ensuring that there is improved alignment between the organization's information security program and its broader goals and objectives I had been newly appointed as an Information Security Manager. Thus I decided to increase my skills and joined Vinsys\u2019 CISM Certification Training Program. The program has really helped me and I was able to get my certification easily.","course":"Business Communication","id":null,"ratingCount":3,"title":"Estimator"}
{"firstName":"Prosanto","lastName":"Das","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1}
Prosanto
Das
/reviewer.png
/images
1
Ensuring that there is improved alignment between the organization's information security program and its broader goals and objectives I had been newly appointed as an Information Security Manager. Thus I decided to increase my skills and joined Vinsys? CISM Certification Training Program. The program has really helped me and I was able to get my certification easily.
Business Communication
3
Estimator
0
[{"tabName":"What will you learn?","tabNumber":1,"content":{"ParamDetails":{"features":[{"heading":"After the completion of the Program, the participants would be able to:","_id":1,"listContent":[{"feature":"Understand, define and design security architecture for your IT operation","_id":1},{"feature":"Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide 2018","_id":2},{"feature":"Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.","_id":3},{"feature":"Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISM certification exam by ISACA","_id":3}]}],"description":"","_id":2},"_id":2}},{"tabName":"Audience","tabNumber":2,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT directors and managers","_id":2},{"feature":"Security auditors and architects","_id":3},{"feature":"Security systems engineers","_id":3},{"feature":"Chief Information Security Officers (CISOs)","_id":3},{"feature":"Information security managers","_id":3},{"feature":"IS/IT consultants","_id":3},{"feature":"Chief Compliance/Privacy/Risk Officers","_id":3}]}],"description":"","_id":2},"_id":2}},{"tabName":"Eligibility Criteria","tabNumber":3,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals should have five or more years of experience in information security management. ","_id":1},{"feature":"Waivers are available for a maximum of two years.","_id":2}]}],"description":"","_id":2},"_id":2}},{"tabName":"Course Topics","tabNumber":4,"content":{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"Domain 1\u2014 Information Security Governance ","_id":36},{"feature":"Domain 2\u2014 Information Risk Management ","_id":37},{"feature":"Domain 3\u2014 Information Security Program Development and Management ","_id":37},{"feature":"Domain 4\u2014 Information Security Incident Management","_id":37}]}],"description":"","_id":4},"_id":4}},{"tabName":"Key Features","tabNumber":5,"content":{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"CISM Certification Training Program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]}],"description":"","_id":4},"_id":4}},{"tabName":"Course Advisor","tabNumber":6,"content":{"advisiorName":"Mr. Sandeep Sehgal, CISSP, ISO 27001 LI, PMP, ITIL v3 Foundation & IBM Certified Sr PM","advisiorDescription":"","imageName":"/sandeep-sehgal.png","imageUrl":"/images","width":"100","disabled":true,"_id":1,"designation":"Senior SME \u2013 IT Security Management Frameworks","achivements":[{"achivement":"Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.","_id":1},{"achivement":"He has unmatched industry experience on domains such as ISMS, ITSM, IT Security Project Management, Ethical Hacking","_id":1},{"achivement":"He has trained over 1600 corporate team members/students on CISSP, CSSLP and Project Management","_id":1}],"class":"button","version":"2.0","height":"10"}},{"tabName":"FAQ","tabNumber":7,"content":{"ParamDetails":{"features":[{"heading":"What is CISM?","_id":4,"listContent":[{"feature":"Certified Information Security Manager (CISM) is a key certification for information security professionals who manage, design, oversee and assess enterprise information security.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the CISM Exam?","_id":4,"listContent":[{"feature":"Possess a minimum of five years of direct full-time information security work experience. Waiver is available for a maximum of two years","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration usually is 3 days. Few customized programs could be 4 or 5 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]},{"heading":"Where can one give the CISM examination?","_id":4,"listContent":[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]}],"description":null,"_id":4},"_id":7}}]
{"tabName":"What will you learn?","tabNumber":1,"content":{"ParamDetails":{"features":[{"heading":"After the completion of the Program, the participants would be able to:","_id":1,"listContent":[{"feature":"Understand, define and design security architecture for your IT operation","_id":1},{"feature":"Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide 2018","_id":2},{"feature":"Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.","_id":3},{"feature":"Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISM certification exam by ISACA","_id":3}]}],"description":"","_id":2},"_id":2}}
What will you learn?
1
{"ParamDetails":{"features":[{"heading":"After the completion of the Program, the participants would be able to:","_id":1,"listContent":[{"feature":"Understand, define and design security architecture for your IT operation","_id":1},{"feature":"Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide 2018","_id":2},{"feature":"Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.","_id":3},{"feature":"Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISM certification exam by ISACA","_id":3}]}],"description":"","_id":2},"_id":2}
{"features":[{"heading":"After the completion of the Program, the participants would be able to:","_id":1,"listContent":[{"feature":"Understand, define and design security architecture for your IT operation","_id":1},{"feature":"Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide 2018","_id":2},{"feature":"Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.","_id":3},{"feature":"Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISM certification exam by ISACA","_id":3}]}],"description":"","_id":2}
[{"heading":"After the completion of the Program, the participants would be able to:","_id":1,"listContent":[{"feature":"Understand, define and design security architecture for your IT operation","_id":1},{"feature":"Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide 2018","_id":2},{"feature":"Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.","_id":3},{"feature":"Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISM certification exam by ISACA","_id":3}]}]
{"heading":"After the completion of the Program, the participants would be able to:","_id":1,"listContent":[{"feature":"Understand, define and design security architecture for your IT operation","_id":1},{"feature":"Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide 2018","_id":2},{"feature":"Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.","_id":3},{"feature":"Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISM certification exam by ISACA","_id":3}]}

After the completion of the Program, the participants would be able to:

1
[{"feature":"Understand, define and design security architecture for your IT operation","_id":1},{"feature":"Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide 2018","_id":2},{"feature":"Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.","_id":3},{"feature":"Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework","_id":3},{"feature":"Gain the relevant knowledge and skills required to pass the CISM certification exam by ISACA","_id":3}]
{"feature":"Understand, define and design security architecture for your IT operation","_id":1}
Understand, define and design security architecture for your IT operation
1
{"feature":"Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide 2018","_id":2}
Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide 2018
2
{"feature":"Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.","_id":3}
Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.
3
{"feature":"Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework","_id":3}
Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework
3
{"feature":"Gain the relevant knowledge and skills required to pass the CISM certification exam by ISACA","_id":3}
Gain the relevant knowledge and skills required to pass the CISM certification exam by ISACA
3
2
2
{"tabName":"Audience","tabNumber":2,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT directors and managers","_id":2},{"feature":"Security auditors and architects","_id":3},{"feature":"Security systems engineers","_id":3},{"feature":"Chief Information Security Officers (CISOs)","_id":3},{"feature":"Information security managers","_id":3},{"feature":"IS/IT consultants","_id":3},{"feature":"Chief Compliance/Privacy/Risk Officers","_id":3}]}],"description":"","_id":2},"_id":2}}
Audience
2
{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT directors and managers","_id":2},{"feature":"Security auditors and architects","_id":3},{"feature":"Security systems engineers","_id":3},{"feature":"Chief Information Security Officers (CISOs)","_id":3},{"feature":"Information security managers","_id":3},{"feature":"IS/IT consultants","_id":3},{"feature":"Chief Compliance/Privacy/Risk Officers","_id":3}]}],"description":"","_id":2},"_id":2}
{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT directors and managers","_id":2},{"feature":"Security auditors and architects","_id":3},{"feature":"Security systems engineers","_id":3},{"feature":"Chief Information Security Officers (CISOs)","_id":3},{"feature":"Information security managers","_id":3},{"feature":"IS/IT consultants","_id":3},{"feature":"Chief Compliance/Privacy/Risk Officers","_id":3}]}],"description":"","_id":2}
[{"heading":"","_id":1,"listContent":[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT directors and managers","_id":2},{"feature":"Security auditors and architects","_id":3},{"feature":"Security systems engineers","_id":3},{"feature":"Chief Information Security Officers (CISOs)","_id":3},{"feature":"Information security managers","_id":3},{"feature":"IS/IT consultants","_id":3},{"feature":"Chief Compliance/Privacy/Risk Officers","_id":3}]}]
{"heading":"","_id":1,"listContent":[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT directors and managers","_id":2},{"feature":"Security auditors and architects","_id":3},{"feature":"Security systems engineers","_id":3},{"feature":"Chief Information Security Officers (CISOs)","_id":3},{"feature":"Information security managers","_id":3},{"feature":"IS/IT consultants","_id":3},{"feature":"Chief Compliance/Privacy/Risk Officers","_id":3}]}

1
[{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1},{"feature":"IT directors and managers","_id":2},{"feature":"Security auditors and architects","_id":3},{"feature":"Security systems engineers","_id":3},{"feature":"Chief Information Security Officers (CISOs)","_id":3},{"feature":"Information security managers","_id":3},{"feature":"IS/IT consultants","_id":3},{"feature":"Chief Compliance/Privacy/Risk Officers","_id":3}]
{"feature":"Professionals, Security Consultants/Managers involved in Information Security Management","_id":1}
Professionals, Security Consultants/Managers involved in Information Security Management
1
{"feature":"IT directors and managers","_id":2}
IT directors and managers
2
{"feature":"Security auditors and architects","_id":3}
Security auditors and architects
3
{"feature":"Security systems engineers","_id":3}
Security systems engineers
3
{"feature":"Chief Information Security Officers (CISOs)","_id":3}
Chief Information Security Officers (CISOs)
3
{"feature":"Information security managers","_id":3}
Information security managers
3
{"feature":"IS/IT consultants","_id":3}
IS/IT consultants
3
{"feature":"Chief Compliance/Privacy/Risk Officers","_id":3}
Chief Compliance/Privacy/Risk Officers
3
2
2
{"tabName":"Eligibility Criteria","tabNumber":3,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals should have five or more years of experience in information security management. ","_id":1},{"feature":"Waivers are available for a maximum of two years.","_id":2}]}],"description":"","_id":2},"_id":2}}
Eligibility Criteria
3
{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals should have five or more years of experience in information security management. ","_id":1},{"feature":"Waivers are available for a maximum of two years.","_id":2}]}],"description":"","_id":2},"_id":2}
{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Professionals should have five or more years of experience in information security management. ","_id":1},{"feature":"Waivers are available for a maximum of two years.","_id":2}]}],"description":"","_id":2}
[{"heading":"","_id":1,"listContent":[{"feature":"Professionals should have five or more years of experience in information security management. ","_id":1},{"feature":"Waivers are available for a maximum of two years.","_id":2}]}]
{"heading":"","_id":1,"listContent":[{"feature":"Professionals should have five or more years of experience in information security management. ","_id":1},{"feature":"Waivers are available for a maximum of two years.","_id":2}]}

1
[{"feature":"Professionals should have five or more years of experience in information security management. ","_id":1},{"feature":"Waivers are available for a maximum of two years.","_id":2}]
{"feature":"Professionals should have five or more years of experience in information security management. ","_id":1}
Professionals should have five or more years of experience in information security management.
1
{"feature":"Waivers are available for a maximum of two years.","_id":2}
Waivers are available for a maximum of two years.
2
2
2
{"tabName":"Course Topics","tabNumber":4,"content":{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"Domain 1\u2014 Information Security Governance ","_id":36},{"feature":"Domain 2\u2014 Information Risk Management ","_id":37},{"feature":"Domain 3\u2014 Information Security Program Development and Management ","_id":37},{"feature":"Domain 4\u2014 Information Security Incident Management","_id":37}]}],"description":"","_id":4},"_id":4}}
Course Topics
4
{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"Domain 1\u2014 Information Security Governance ","_id":36},{"feature":"Domain 2\u2014 Information Risk Management ","_id":37},{"feature":"Domain 3\u2014 Information Security Program Development and Management ","_id":37},{"feature":"Domain 4\u2014 Information Security Incident Management","_id":37}]}],"description":"","_id":4},"_id":4}
{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"Domain 1\u2014 Information Security Governance ","_id":36},{"feature":"Domain 2\u2014 Information Risk Management ","_id":37},{"feature":"Domain 3\u2014 Information Security Program Development and Management ","_id":37},{"feature":"Domain 4\u2014 Information Security Incident Management","_id":37}]}],"description":"","_id":4}
[{"heading":null,"_id":4,"listContent":[{"feature":"Domain 1\u2014 Information Security Governance ","_id":36},{"feature":"Domain 2\u2014 Information Risk Management ","_id":37},{"feature":"Domain 3\u2014 Information Security Program Development and Management ","_id":37},{"feature":"Domain 4\u2014 Information Security Incident Management","_id":37}]}]
{"heading":null,"_id":4,"listContent":[{"feature":"Domain 1\u2014 Information Security Governance ","_id":36},{"feature":"Domain 2\u2014 Information Risk Management ","_id":37},{"feature":"Domain 3\u2014 Information Security Program Development and Management ","_id":37},{"feature":"Domain 4\u2014 Information Security Incident Management","_id":37}]}
4
[{"feature":"Domain 1\u2014 Information Security Governance ","_id":36},{"feature":"Domain 2\u2014 Information Risk Management ","_id":37},{"feature":"Domain 3\u2014 Information Security Program Development and Management ","_id":37},{"feature":"Domain 4\u2014 Information Security Incident Management","_id":37}]
{"feature":"Domain 1\u2014 Information Security Governance ","_id":36}
Domain 1? Information Security Governance
36
{"feature":"Domain 2\u2014 Information Risk Management ","_id":37}
Domain 2? Information Risk Management
37
{"feature":"Domain 3\u2014 Information Security Program Development and Management ","_id":37}
Domain 3? Information Security Program Development and Management
37
{"feature":"Domain 4\u2014 Information Security Incident Management","_id":37}
Domain 4? Information Security Incident Management
37
4
4
{"tabName":"Key Features","tabNumber":5,"content":{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"CISM Certification Training Program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]}],"description":"","_id":4},"_id":4}}
Key Features
5
{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"CISM Certification Training Program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]}],"description":"","_id":4},"_id":4}
{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"CISM Certification Training Program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]}],"description":"","_id":4}
[{"heading":null,"_id":4,"listContent":[{"feature":"CISM Certification Training Program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]}]
{"heading":null,"_id":4,"listContent":[{"feature":"CISM Certification Training Program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]}
4
[{"feature":"CISM Certification Training Program is conducted by experienced and certified faculties","_id":1},{"feature":"Students are given official course material","_id":1},{"feature":"Trainers experienced with foreign training delivery","_id":1},{"feature":"Special guidance for CISSP application to ISC2","_id":1},{"feature":"Sample exam papers are solved for real life experience","_id":1}]
{"feature":"CISM Certification Training Program is conducted by experienced and certified faculties","_id":1}
CISM Certification Training Program is conducted by experienced and certified faculties
1
{"feature":"Students are given official course material","_id":1}
Students are given official course material
1
{"feature":"Trainers experienced with foreign training delivery","_id":1}
Trainers experienced with foreign training delivery
1
{"feature":"Special guidance for CISSP application to ISC2","_id":1}
Special guidance for CISSP application to ISC2
1
{"feature":"Sample exam papers are solved for real life experience","_id":1}
Sample exam papers are solved for real life experience
1
4
4
{"tabName":"Course Advisor","tabNumber":6,"content":{"advisiorName":"Mr. Sandeep Sehgal, CISSP, ISO 27001 LI, PMP, ITIL v3 Foundation & IBM Certified Sr PM","advisiorDescription":"","imageName":"/sandeep-sehgal.png","imageUrl":"/images","width":"100","disabled":true,"_id":1,"designation":"Senior SME \u2013 IT Security Management Frameworks","achivements":[{"achivement":"Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.","_id":1},{"achivement":"He has unmatched industry experience on domains such as ISMS, ITSM, IT Security Project Management, Ethical Hacking","_id":1},{"achivement":"He has trained over 1600 corporate team members/students on CISSP, CSSLP and Project Management","_id":1}],"class":"button","version":"2.0","height":"10"}}
Course Advisor
6
{"advisiorName":"Mr. Sandeep Sehgal, CISSP, ISO 27001 LI, PMP, ITIL v3 Foundation & IBM Certified Sr PM","advisiorDescription":"","imageName":"/sandeep-sehgal.png","imageUrl":"/images","width":"100","disabled":true,"_id":1,"designation":"Senior SME \u2013 IT Security Management Frameworks","achivements":[{"achivement":"Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.","_id":1},{"achivement":"He has unmatched industry experience on domains such as ISMS, ITSM, IT Security Project Management, Ethical Hacking","_id":1},{"achivement":"He has trained over 1600 corporate team members/students on CISSP, CSSLP and Project Management","_id":1}],"class":"button","version":"2.0","height":"10"}

Mr. Sandeep Sehgal, CISSP, ISO 27001 LI, PMP, ITIL v3 Foundation & IBM Certified Sr PM

/sandeep-sehgal.png
/images
100
true
1
Senior SME ? IT Security Management Frameworks
[{"achivement":"Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.","_id":1},{"achivement":"He has unmatched industry experience on domains such as ISMS, ITSM, IT Security Project Management, Ethical Hacking","_id":1},{"achivement":"He has trained over 1600 corporate team members/students on CISSP, CSSLP and Project Management","_id":1}]
{"achivement":"Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.","_id":1}
Sandeep Sehgal has over 23 years of IT experience, assuming various IT management roles in the IT Industry and telecommunication sector regionally.
1
{"achivement":"He has unmatched industry experience on domains such as ISMS, ITSM, IT Security Project Management, Ethical Hacking","_id":1}
He has unmatched industry experience on domains such as ISMS, ITSM, IT Security Project Management, Ethical Hacking
1
{"achivement":"He has trained over 1600 corporate team members/students on CISSP, CSSLP and Project Management","_id":1}
He has trained over 1600 corporate team members/students on CISSP, CSSLP and Project Management
1
button
2.0
10
{"tabName":"FAQ","tabNumber":7,"content":{"ParamDetails":{"features":[{"heading":"What is CISM?","_id":4,"listContent":[{"feature":"Certified Information Security Manager (CISM) is a key certification for information security professionals who manage, design, oversee and assess enterprise information security.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the CISM Exam?","_id":4,"listContent":[{"feature":"Possess a minimum of five years of direct full-time information security work experience. Waiver is available for a maximum of two years","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration usually is 3 days. Few customized programs could be 4 or 5 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]},{"heading":"Where can one give the CISM examination?","_id":4,"listContent":[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]}],"description":null,"_id":4},"_id":7}}
FAQ
7
{"ParamDetails":{"features":[{"heading":"What is CISM?","_id":4,"listContent":[{"feature":"Certified Information Security Manager (CISM) is a key certification for information security professionals who manage, design, oversee and assess enterprise information security.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the CISM Exam?","_id":4,"listContent":[{"feature":"Possess a minimum of five years of direct full-time information security work experience. Waiver is available for a maximum of two years","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration usually is 3 days. Few customized programs could be 4 or 5 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]},{"heading":"Where can one give the CISM examination?","_id":4,"listContent":[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]}],"description":null,"_id":4},"_id":7}
{"features":[{"heading":"What is CISM?","_id":4,"listContent":[{"feature":"Certified Information Security Manager (CISM) is a key certification for information security professionals who manage, design, oversee and assess enterprise information security.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the CISM Exam?","_id":4,"listContent":[{"feature":"Possess a minimum of five years of direct full-time information security work experience. Waiver is available for a maximum of two years","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration usually is 3 days. Few customized programs could be 4 or 5 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]},{"heading":"Where can one give the CISM examination?","_id":4,"listContent":[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]}],"description":null,"_id":4}
[{"heading":"What is CISM?","_id":4,"listContent":[{"feature":"Certified Information Security Manager (CISM) is a key certification for information security professionals who manage, design, oversee and assess enterprise information security.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the CISM Exam?","_id":4,"listContent":[{"feature":"Possess a minimum of five years of direct full-time information security work experience. Waiver is available for a maximum of two years","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration usually is 3 days. Few customized programs could be 4 or 5 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]},{"heading":"Where can one give the CISM examination?","_id":4,"listContent":[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]}]
{"heading":"What is CISM?","_id":4,"listContent":[{"feature":"Certified Information Security Manager (CISM) is a key certification for information security professionals who manage, design, oversee and assess enterprise information security.","_id":62}]}

What is CISM?

4
[{"feature":"Certified Information Security Manager (CISM) is a key certification for information security professionals who manage, design, oversee and assess enterprise information security.","_id":62}]
{"feature":"Certified Information Security Manager (CISM) is a key certification for information security professionals who manage, design, oversee and assess enterprise information security.","_id":62}
Certified Information Security Manager (CISM) is a key certification for information security professionals who manage, design, oversee and assess enterprise information security.
62
{"heading":"What is the Eligibility Criteria / Pre-requisites for the CISM Exam?","_id":4,"listContent":[{"feature":"Possess a minimum of five years of direct full-time information security work experience. Waiver is available for a maximum of two years","_id":62}]}

What is the Eligibility Criteria / Pre-requisites for the CISM Exam?

4
[{"feature":"Possess a minimum of five years of direct full-time information security work experience. Waiver is available for a maximum of two years","_id":62}]
{"feature":"Possess a minimum of five years of direct full-time information security work experience. Waiver is available for a maximum of two years","_id":62}
Possess a minimum of five years of direct full-time information security work experience. Waiver is available for a maximum of two years
62
{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration usually is 3 days. Few customized programs could be 4 or 5 days.","_id":62}]}

What is the duration of training?

4
[{"feature":"Training duration usually is 3 days. Few customized programs could be 4 or 5 days.","_id":62}]
{"feature":"Training duration usually is 3 days. Few customized programs could be 4 or 5 days.","_id":62}
Training duration usually is 3 days. Few customized programs could be 4 or 5 days.
62
{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]}

Do you provide certificates on successfully completing the course?

4
[{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}]
{"feature":"Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course. ","_id":62}
Yes, at the end of the class, you will receive soft copy of course completion certificate on your email which states that you have successfully completed the course.
62
{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]}

When are the classes conducted?

4
[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]
{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}
All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.
62
{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]}

What all is included in the course?

4
[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]
{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}
Along with facilitating training sessions, we provide required course material and practice questions for exam preparation
62
{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]}

Who conduct the training sessions?

4
[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}]
{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.","_id":62}
Training sessions are facilitated by certified experts having practical working experience as well as training experience. Our facilitators have 18+ to 30+ yrs of overall experience.
62
{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]}

Why one should join Vinsys?

4
[{"feature":"Certified Instructor","_id":62},{"feature":"Practical Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Approved course material","_id":62},{"feature":"Quality Courseware","_id":62}]
{"feature":"Certified Instructor","_id":62}
Certified Instructor
62
{"feature":"Practical Education","_id":62}
Practical Education
62
{"feature":"Experienced Industry Experts","_id":62}
Experienced Industry Experts
62
{"feature":"Approved course material","_id":62}
Approved course material
62
{"feature":"Quality Courseware","_id":62}
Quality Courseware
62
{"heading":"Where can one give the CISM examination?","_id":4,"listContent":[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]}

Where can one give the CISM examination?

4
[{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}]
{"feature":"All ISACA exams are conducted by ISACA. Please check latest candidate guide.","_id":62}
All ISACA exams are conducted by ISACA. Please check latest candidate guide.
62
4
7
5af42dc368f8e31708fd89bb
{"courses":[{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"Learn the basic functionalities and the main concept of SAP Hybris Commerce through the SAP Hybris Commerce Developer Part 1 training program. The program intends to give a clear and concise understanding of what comes in with and without and what can be implemented to give a satisfactory deliverable to the customer. SAP Hybris Commerce certification enables the developers to not only see the software but also to install, arrange and customize the software to some extent. The training has a sole purpose of focusing on B2C accelerator. The SAP Hybris training imparted is not intended to solve any project specific problems, but rather get around tackling common tasks that hampers the productivity.","pageId":"sap-hybris-commerce-developer-part1","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"SAP Hybris Commerce Developer Part 1","courseImage":"sap-hybris.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.8,"courseStartsOn":"","pageURL":"/technology-training/sap-hybris-commerce-developer-part1","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"The lure of low cost, high availability and the sturdy processing power have got many organizations to Hadoop. Doing the big Hadoop course business professionals will be able to profile, transform and cleanse data. The Hadoop program will let you understand when IoT needs a specifics requirement and when it will act. You will also be acquainted with some of the popular modules to study such as Hadoop common, HDFS, YARN, and Mapreduce.","pageId":"bigdata-and-hadoop","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"Big Data Hadoop","courseImage":"big_data_hadoop.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.2,"courseStartsOn":"","pageURL":"/technology-training/bigdata-and-hadoop","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Business Analysis Certification Training","courseRating":4,"courseSummary":"This CBAP certification training program is intended to enable members to comprehend IIBA BABOK v3.0 Knowledge Areas, Business Analysis Techniques, Requirement Models, and Requirements Documentation designs. This course covers the part and duties of a Business Analyst in customary Waterfall and the most recent Agile-Scrum strategies. The CBAP certification training course likewise covers the approach and plan expected to show up for IIBA's CBAP confirmation exam. Members are likewise helped with topping off their Exam Eligibility Application. This Program satisfies the IIBA compulsory prerequisite of 35 contact hours which a CBAP hopeful must have, before applying for the CBAP Certification examination. This course is enlisted with the IIBA as Ace Business Analysis Training","pageId":"cbap-certification-training","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"CBAP Certification Training Program","courseImage":"dummy.jpg","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.2,"courseStartsOn":"","pageURL":"/technology-training/cbap-certification-training","id":null,"batchType":"WeekEnd","isFavourite":null}],"totalCount":null}
[{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"Learn the basic functionalities and the main concept of SAP Hybris Commerce through the SAP Hybris Commerce Developer Part 1 training program. The program intends to give a clear and concise understanding of what comes in with and without and what can be implemented to give a satisfactory deliverable to the customer. SAP Hybris Commerce certification enables the developers to not only see the software but also to install, arrange and customize the software to some extent. The training has a sole purpose of focusing on B2C accelerator. The SAP Hybris training imparted is not intended to solve any project specific problems, but rather get around tackling common tasks that hampers the productivity.","pageId":"sap-hybris-commerce-developer-part1","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"SAP Hybris Commerce Developer Part 1","courseImage":"sap-hybris.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.8,"courseStartsOn":"","pageURL":"/technology-training/sap-hybris-commerce-developer-part1","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"The lure of low cost, high availability and the sturdy processing power have got many organizations to Hadoop. Doing the big Hadoop course business professionals will be able to profile, transform and cleanse data. The Hadoop program will let you understand when IoT needs a specifics requirement and when it will act. You will also be acquainted with some of the popular modules to study such as Hadoop common, HDFS, YARN, and Mapreduce.","pageId":"bigdata-and-hadoop","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"Big Data Hadoop","courseImage":"big_data_hadoop.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.2,"courseStartsOn":"","pageURL":"/technology-training/bigdata-and-hadoop","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Business Analysis Certification Training","courseRating":4,"courseSummary":"This CBAP certification training program is intended to enable members to comprehend IIBA BABOK v3.0 Knowledge Areas, Business Analysis Techniques, Requirement Models, and Requirements Documentation designs. This course covers the part and duties of a Business Analyst in customary Waterfall and the most recent Agile-Scrum strategies. The CBAP certification training course likewise covers the approach and plan expected to show up for IIBA's CBAP confirmation exam. Members are likewise helped with topping off their Exam Eligibility Application. This Program satisfies the IIBA compulsory prerequisite of 35 contact hours which a CBAP hopeful must have, before applying for the CBAP Certification examination. This course is enlisted with the IIBA as Ace Business Analysis Training","pageId":"cbap-certification-training","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"CBAP Certification Training Program","courseImage":"dummy.jpg","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.2,"courseStartsOn":"","pageURL":"/technology-training/cbap-certification-training","id":null,"batchType":"WeekEnd","isFavourite":null}]
{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"Learn the basic functionalities and the main concept of SAP Hybris Commerce through the SAP Hybris Commerce Developer Part 1 training program. The program intends to give a clear and concise understanding of what comes in with and without and what can be implemented to give a satisfactory deliverable to the customer. SAP Hybris Commerce certification enables the developers to not only see the software but also to install, arrange and customize the software to some extent. The training has a sole purpose of focusing on B2C accelerator. The SAP Hybris training imparted is not intended to solve any project specific problems, but rather get around tackling common tasks that hampers the productivity.","pageId":"sap-hybris-commerce-developer-part1","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"SAP Hybris Commerce Developer Part 1","courseImage":"sap-hybris.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.8,"courseStartsOn":"","pageURL":"/technology-training/sap-hybris-commerce-developer-part1","id":null,"batchType":"WeekEnd","isFavourite":null}
Technology Training
4
Learn the basic functionalities and the main concept of SAP Hybris Commerce through the SAP Hybris Commerce Developer Part 1 training program. The program intends to give a clear and concise understanding of what comes in with and without and what can be implemented to give a satisfactory deliverable to the customer. SAP Hybris Commerce certification enables the developers to not only see the software but also to install, arrange and customize the software to some extent. The training has a sole purpose of focusing on B2C accelerator. The SAP Hybris training imparted is not intended to solve any project specific problems, but rather get around tackling common tasks that hampers the productivity.
sap-hybris-commerce-developer-part1
10000
2000
Technology Training
Online
technology-training

SAP Hybris Commerce Developer Part 1

SAP Hybris Commerce Developer Part 1

sap-hybris.png
true
images/
ALL
3.8
WeekEnd
{"courseDuratoin":null,"subCategory":"Technology Training","courseRating":4,"courseSummary":"The lure of low cost, high availability and the sturdy processing power have got many organizations to Hadoop. Doing the big Hadoop course business professionals will be able to profile, transform and cleanse data. The Hadoop program will let you understand when IoT needs a specifics requirement and when it will act. You will also be acquainted with some of the popular modules to study such as Hadoop common, HDFS, YARN, and Mapreduce.","pageId":"bigdata-and-hadoop","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"Big Data Hadoop","courseImage":"big_data_hadoop.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.2,"courseStartsOn":"","pageURL":"/technology-training/bigdata-and-hadoop","id":null,"batchType":"WeekEnd","isFavourite":null}
Technology Training
4
The lure of low cost, high availability and the sturdy processing power have got many organizations to Hadoop. Doing the big Hadoop course business professionals will be able to profile, transform and cleanse data. The Hadoop program will let you understand when IoT needs a specifics requirement and when it will act. You will also be acquainted with some of the popular modules to study such as Hadoop common, HDFS, YARN, and Mapreduce.
bigdata-and-hadoop
10000
2000
Technology Training
Online
technology-training

Big Data Hadoop

Big Data Hadoop

big_data_hadoop.png
true
images/
ALL
4.2
WeekEnd
{"courseDuratoin":null,"subCategory":"Business Analysis Certification Training","courseRating":4,"courseSummary":"This CBAP certification training program is intended to enable members to comprehend IIBA BABOK v3.0 Knowledge Areas, Business Analysis Techniques, Requirement Models, and Requirements Documentation designs. This course covers the part and duties of a Business Analyst in customary Waterfall and the most recent Agile-Scrum strategies. The CBAP certification training course likewise covers the approach and plan expected to show up for IIBA's CBAP confirmation exam. Members are likewise helped with topping off their Exam Eligibility Application. This Program satisfies the IIBA compulsory prerequisite of 35 contact hours which a CBAP hopeful must have, before applying for the CBAP Certification examination. This course is enlisted with the IIBA as Ace Business Analysis Training","pageId":"cbap-certification-training","countOfLearner":10000,"ratingCount":2000,"categoryName":"Technology Training","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"technology-training","courseName":"CBAP Certification Training Program","courseImage":"dummy.jpg","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":4.2,"courseStartsOn":"","pageURL":"/technology-training/cbap-certification-training","id":null,"batchType":"WeekEnd","isFavourite":null}
Business Analysis Certification Training
4
This CBAP certification training program is intended to enable members to comprehend IIBA BABOK v3.0 Knowledge Areas, Business Analysis Techniques, Requirement Models, and Requirements Documentation designs. This course covers the part and duties of a Business Analyst in customary Waterfall and the most recent Agile-Scrum strategies. The CBAP certification training course likewise covers the approach and plan expected to show up for IIBA's CBAP confirmation exam. Members are likewise helped with topping off their Exam Eligibility Application. This Program satisfies the IIBA compulsory prerequisite of 35 contact hours which a CBAP hopeful must have, before applying for the CBAP Certification examination. This course is enlisted with the IIBA as Ace Business Analysis Training
cbap-certification-training
10000
2000
Technology Training
Online
technology-training

CBAP Certification Training Program

CBAP Certification Training Program

dummy.jpg
true
images/
ALL
4.2
WeekEnd