Program Brief

This training program for the CISSP Certification, a pinnacle journey for cybersecurity professionals aiming to validate their expertise and ascend in their careers. Over six days, encompassing 66 hours of immersive instruction, this program demystifies the CISSP certification, ensuring participants are exam-ready with a deep understanding of all eight domains of cybersecurity. From security and risk management principles to intricate details of security engineering and software development security, you will gain insights into asset security, dive into the complexities of security engineering, and explore the nuances of communication and network security. The program also emphasizes the importance of identity and access management, security assessment and testing, security operations, and much more. The LDR414 program employs various training methodologies including lectures and simulation tests for professional certifications exams, ensuring a dynamic and engaging learning experience. By the end of this program, you will be prepared to take significant leadership roles in cybersecurity, developing a holistic understanding of information security best practices, frameworks, and strategies to protect organizations from cyber threats. Join us in shaping the future of cybersecurity leadership.

Program Goals

At the end of the training program, the participant should be able to:

  • Acquire knowledge and strategies to confidently tackle the CISSP® certification exam, focusing on the latest 2024 exam updates.
  • Master the principles of security governance, compliance, legal and regulatory issues, including GDPR and supply chain risk management concepts.
  • Gain insights into data and asset classification, ownership, and data security principles including privacy, DRM, and data destruction methods.
  • Explore secure design principles, security models, and controls for safeguarding enterprise assets and software, emphasizing virtualization, cloud computing, and IoT security.
  • Develop a deep understanding of network architecture, including the OSI model, TCP/IP protocols, network devices, and secure network design and implementation.
  • Learn to manage access controls, identity services, and authentication mechanisms, ensuring secure access to resources and data.
  • Acquire the ability to conduct comprehensive security control testing, vulnerability assessments, and penetration testing to identify and address security gaps.
  • Enhance skills in incident response, forensics, logging, monitoring, and the management of security operations for effective threat detection and response.
  • Understand the importance of securing the software development lifecycle, including the application of secure coding practices, software assessment, and the use of DevSecOps for security integration.
  • Prepare to take on significant leadership roles in cybersecurity by developing a holistic understanding of information security best practices, frameworks, and strategies to protect organizations from cyber threats.
Program Agenda
Module 1: Introduction; Security and Risk Management
  • 1 Introductory Material

    • Overview of the exam

      • Focus of 2024 exam updates

        • What is required to become a CISSP®?

          • Maintaining a CISSP®

            • Exam overview

              • Test-taking tips and tricks.

              • 2 Overview of the 8 Domains

                • Domain 1: Security and Risk Management

                  • Domain 2: Asset Security

                    • Domain 3: Security Engineering

                      • Domain 4: Communication and Network Security

                        • Domain 5: Identity and Access Management (IAM)

                          • Domain 6: Security Assessment and Testing

                            • Domain 7: Security Operations

                              • Domain 8: Software Development Security

                              • 3 Domain 1: Security and Risk Management

                                • Confidentiality, integrity, availability, authenticity, and non-repudiation

                                  • Security governance principles

                                    • Compliance

                                      • Supply Chain Risk Management (SCRM) concepts.

                                        • Legal and regulatory Issues

                                          • General Data Protection Regulation (GDPR)

                                            • California Consumer Privacy Act

                                              • Software Bill of Materials (SBOM)

                                                • Ethics

                                                  • Policies, standards, procedures, and guidelines

                                                    • Risk management concepts.

                                                      • Product tampering and counterfeits

                                                        • Threat modeling

                                                          • Security champions

                                                            • Gamification

                                                              • Security Operations Center (SOC) reports

                                                                • Education, training, and awareness

                                                                Module 2: Asset Security and Security Engineering- Part 1
                                                                • 1 Domain 2: Asset Security

                                                                  • Data and asset classification

                                                                    • Tangible and intangible assets

                                                                      • Data owners

                                                                        • System owners

                                                                          • Business/Mission owners

                                                                            • Privacy

                                                                              • Data processors

                                                                                • Data remanence

                                                                                  • Limitation on collection of sensitive data

                                                                                    • Digital Rights Management (DRM)

                                                                                      • Data retention

                                                                                        • Data destruction

                                                                                          • Data Loss Prevention (DLP)

                                                                                            • Cloud Access Security Broker (CASB)

                                                                                              • Baselines

                                                                                                • Scoping and Tailoring

                                                                                                • 2 omain 3: Security Engineering (Part 1)

                                                                                                  • Secure design principles

                                                                                                    • Security models

                                                                                                      • Controls and countermeasures

                                                                                                        • Virtualization

                                                                                                          • Microservices

                                                                                                            • Containerization

                                                                                                              • Serverless

                                                                                                                • Trusted Platform Module (TPM)

                                                                                                                  • Industrial Control Systems (ICS)

                                                                                                                    • Embedded systems

                                                                                                                      • Database security

                                                                                                                        • Cloud computing

                                                                                                                          • Secure Access Service Edge (SASE)

                                                                                                                            • Supervisory Control and Data Acquisition (SCADA)

                                                                                                                              • eXtensible Markup Language (XML)

                                                                                                                                • OWASP

                                                                                                                                  • he Internet of Things

                                                                                                                                  Module 3: Security Engineering- Part 2; Communication and Network Security
                                                                                                                                  • 1 Domain 3: Security Engineering (Part 2)

                                                                                                                                    • Cryptography

                                                                                                                                      • Symmetric

                                                                                                                                      • Asymmetric

                                                                                                                                      • Hash

                                                                                                                                      • Quantum cryptography

                                                                                                                                      • Public Key Infrastructure (PKI)

                                                                                                                                      • Digital signatures

                                                                                                                                      • Non-repudiation

                                                                                                                                      • Salts

                                                                                                                                      • Rainbow tables

                                                                                                                                      • Pass the hash.

                                                                                                                                      • Cryptanalysis

                                                                                                                                      • Fault injection

                                                                                                                                      • Implementation attacks

                                                                                                                                  • 2 Facility design considerations

                                                                                                                                    • 3 Physical security

                                                                                                                                      • Safety

                                                                                                                                        • Data center security

                                                                                                                                          • Handling evidence

                                                                                                                                            • HVAC

                                                                                                                                              • Fire prevention and suppression.

                                                                                                                                              • 4 Domain 4: Communication and Network Security

                                                                                                                                                • Network architecture.

                                                                                                                                                  • OSI model

                                                                                                                                                    • TCP/IP

                                                                                                                                                      • Multilayer protocols

                                                                                                                                                        • Network Attached Storage (NAS)

                                                                                                                                                        • Fibre Channel over Ethernet (FCoE)

                                                                                                                                                        • iSCSI

                                                                                                                                                        • Infiniband

                                                                                                                                                        • Compute Express Link (CXL)

                                                                                                                                                    • 5 Voiceover IP

                                                                                                                                                      • 6 Wireless

                                                                                                                                                        • 802.11

                                                                                                                                                          • WPA2 and WPA3

                                                                                                                                                            • Zigbee

                                                                                                                                                            • 7 Network devices.

                                                                                                                                                              • Switches

                                                                                                                                                                • Routers

                                                                                                                                                                  • Firewalls

                                                                                                                                                                    • Distributed Firewalls

                                                                                                                                                                      • Proxies

                                                                                                                                                                      • 8 Content distribution networks

                                                                                                                                                                        • 9 Virtual routing and forwarding

                                                                                                                                                                          • 10 Virtual domain

                                                                                                                                                                            • 11 Network Functions Virtualization (NFV)

                                                                                                                                                                              • 12 Remote meeting technology

                                                                                                                                                                                • 13 Telecommuting

                                                                                                                                                                                  • 14 Remote access and VPN

                                                                                                                                                                                    • SSH

                                                                                                                                                                                      • VPN

                                                                                                                                                                                        • IPsec

                                                                                                                                                                                          • SSL/TLS

                                                                                                                                                                                          • 15 Port isolation

                                                                                                                                                                                            • 16 VLANs

                                                                                                                                                                                              • 17 Software-defined networks

                                                                                                                                                                                                • 18 Micro-segmentation

                                                                                                                                                                                                  • 19 Virtual eXtensible Local Area Network (VXLAN)

                                                                                                                                                                                                    • 20 Software-Defined Wide Area Network (SD-WAN)

                                                                                                                                                                                                      Module 4: Identity and Access Management
                                                                                                                                                                                                      • 1 Domain 5: Identity and Access Management (IAM)

                                                                                                                                                                                                        • Physical and logical access

                                                                                                                                                                                                          • Credential management systems

                                                                                                                                                                                                            • Just-In-Time (JIT)

                                                                                                                                                                                                              • SSO

                                                                                                                                                                                                                • LDAP

                                                                                                                                                                                                                  • Multi-factor authentication

                                                                                                                                                                                                                    • Password-less authentication

                                                                                                                                                                                                                      • Biometrics

                                                                                                                                                                                                                        • Accountability

                                                                                                                                                                                                                          • Session management

                                                                                                                                                                                                                            • SAML

                                                                                                                                                                                                                              • Credential management

                                                                                                                                                                                                                              • 2 Third-party identity services

                                                                                                                                                                                                                                • 3 On-premises, cloud, and hybrid identity

                                                                                                                                                                                                                                  • 4 Authorization mechanisms

                                                                                                                                                                                                                                    • MAC

                                                                                                                                                                                                                                      • DAC

                                                                                                                                                                                                                                        • Rule-based

                                                                                                                                                                                                                                          • RBAC

                                                                                                                                                                                                                                            • ABAC

                                                                                                                                                                                                                                            • 5 Provisioning

                                                                                                                                                                                                                                              Module 5: Security Assessment and Testing; Security Operations
                                                                                                                                                                                                                                              • 1 Domain 6: Security Assessment

                                                                                                                                                                                                                                                • Assessment and test strategies

                                                                                                                                                                                                                                                  • Security control testing

                                                                                                                                                                                                                                                    • Vulnerability assessment

                                                                                                                                                                                                                                                    • Penetration testing

                                                                                                                                                                                                                                                    • Log reviews

                                                                                                                                                                                                                                                    • Synthetic transactions and benchmarks

                                                                                                                                                                                                                                                    • Misuse case testing

                                                                                                                                                                                                                                                    • Test coverage analysis

                                                                                                                                                                                                                                                    • Responsible disclosure

                                                                                                                                                                                                                                                • 2 Security testing strategies

                                                                                                                                                                                                                                                  • Interface testing

                                                                                                                                                                                                                                                    • Breach attack simulations

                                                                                                                                                                                                                                                      • Red, blue, and purple team exercises

                                                                                                                                                                                                                                                      • 3 Security process

                                                                                                                                                                                                                                                        • Account management

                                                                                                                                                                                                                                                          • Management review

                                                                                                                                                                                                                                                            • Training and awareness

                                                                                                                                                                                                                                                              • Disaster recovery and business continuity

                                                                                                                                                                                                                                                                • Exception handling

                                                                                                                                                                                                                                                                • 4 Internal and third-party audits

                                                                                                                                                                                                                                                                  • 5 Domain 7: Security Operations

                                                                                                                                                                                                                                                                    • Investigations

                                                                                                                                                                                                                                                                      • Evidence collection and handling

                                                                                                                                                                                                                                                                      • Reporting and documenting

                                                                                                                                                                                                                                                                      • Forensics

                                                                                                                                                                                                                                                                  • 6 Operational, criminal, civil, and regulatory investigations

                                                                                                                                                                                                                                                                    • 7 eDiscovery

                                                                                                                                                                                                                                                                      • 8 Logging and monitoring

                                                                                                                                                                                                                                                                        • Intrusion detection and prevention

                                                                                                                                                                                                                                                                          • SIEM

                                                                                                                                                                                                                                                                            • Continuous monitoring

                                                                                                                                                                                                                                                                              • Egress monitoring

                                                                                                                                                                                                                                                                                • User and Entity Behavior Analytics (UEBA)

                                                                                                                                                                                                                                                                                  • Tools based on machine learning and Artificial Intelligence (AI)

                                                                                                                                                                                                                                                                                  • 9 Provisioning

                                                                                                                                                                                                                                                                                    • Asset inventory

                                                                                                                                                                                                                                                                                      • Configuration management

                                                                                                                                                                                                                                                                                        • Physical, virtual, and cloud assets

                                                                                                                                                                                                                                                                                          • Software as a Service (SaaS)

                                                                                                                                                                                                                                                                                          • 10 Security operations

                                                                                                                                                                                                                                                                                            • Need-to-know and least privilege

                                                                                                                                                                                                                                                                                              • Service-level agreements

                                                                                                                                                                                                                                                                                                • System resilience

                                                                                                                                                                                                                                                                                                  • Quality of Service (QoS)

                                                                                                                                                                                                                                                                                                    • Threat feeds

                                                                                                                                                                                                                                                                                                      • Threat hunting

                                                                                                                                                                                                                                                                                                      • 11 Incident management

                                                                                                                                                                                                                                                                                                        • 12 Firewalls

                                                                                                                                                                                                                                                                                                          • 13 IDS and IPS

                                                                                                                                                                                                                                                                                                            • 14 Honeypots and honeynets

                                                                                                                                                                                                                                                                                                              • 15 Vulnerability management

                                                                                                                                                                                                                                                                                                                • 16 Change management processes.

                                                                                                                                                                                                                                                                                                                  • 17 Recovery strategies

                                                                                                                                                                                                                                                                                                                    • 18 Disaster recovery processes

                                                                                                                                                                                                                                                                                                                      • 19 Disaster recovery plans

                                                                                                                                                                                                                                                                                                                        Module 6: Identity and Access Management
                                                                                                                                                                                                                                                                                                                        • 1 Domain 8: Software Development Security

                                                                                                                                                                                                                                                                                                                          • Software development lifecycle

                                                                                                                                                                                                                                                                                                                            • Software development methodologies

                                                                                                                                                                                                                                                                                                                              • Waterfall

                                                                                                                                                                                                                                                                                                                              • Spiral

                                                                                                                                                                                                                                                                                                                              • Agile

                                                                                                                                                                                                                                                                                                                              • Integrated Product Team (IPT)

                                                                                                                                                                                                                                                                                                                          • 2 Software capability maturity models

                                                                                                                                                                                                                                                                                                                            • Capability Maturity Model Integration (CMMi)

                                                                                                                                                                                                                                                                                                                              • Software Assurance Maturity Model (SAMM)

                                                                                                                                                                                                                                                                                                                              • 3 Change management

                                                                                                                                                                                                                                                                                                                                • 4 DevOps

                                                                                                                                                                                                                                                                                                                                  • 5 DevSecOps

                                                                                                                                                                                                                                                                                                                                    • 6 Scaled Agile Framework (SAFe)

                                                                                                                                                                                                                                                                                                                                      • 7 Software Component/Composition Analysis (SCA)

                                                                                                                                                                                                                                                                                                                                        • 8 Interactive Application Security Test (IAST)

                                                                                                                                                                                                                                                                                                                                          • 9 Continuous Integration/Continuous Delivery (CI/CD)

                                                                                                                                                                                                                                                                                                                                            • 10 Security Orchestration, Automation, and Response (SOAR)

                                                                                                                                                                                                                                                                                                                                              • 11 Security vulnerabilities

                                                                                                                                                                                                                                                                                                                                                • Bounds checking

                                                                                                                                                                                                                                                                                                                                                  • Input/output validation

                                                                                                                                                                                                                                                                                                                                                    • Buffer overflow

                                                                                                                                                                                                                                                                                                                                                      • Privilege escalation

                                                                                                                                                                                                                                                                                                                                                      • 12 Secure coding

                                                                                                                                                                                                                                                                                                                                                        • 13 Code repositories

                                                                                                                                                                                                                                                                                                                                                          • 14 Programming interfaces

                                                                                                                                                                                                                                                                                                                                                            • 15 Software-defined security

                                                                                                                                                                                                                                                                                                                                                              • 16 Assessing software security

                                                                                                                                                                                                                                                                                                                                                                • Black box testing

                                                                                                                                                                                                                                                                                                                                                                  • White box testing

                                                                                                                                                                                                                                                                                                                                                                    • Fuzzing

                                                                                                                                                                                                                                                                                                                                                                    • 17 Security of Application Programming Interfaces (APIs)

                                                                                                                                                                                                                                                                                                                                                                      Program Requirements

                                                                                                                                                                                                                                                                                                                                                                      Not Available

                                                                                                                                                                                                                                                                                                                                                                      Program Path

                                                                                                                                                                                                                                                                                                                                                                      Names of the training programs that are integrated (enriched) with the training program:

                                                                                                                                                                                                                                                                                                                                                                      • Not Available

                                                                                                                                                                                                                                                                                                                                                                      Names of the training programs that after the training program:

                                                                                                                                                                                                                                                                                                                                                                      • Not Available
                                                                                                                                                                                                                                                                                                                                                                      Program Method
                                                                                                                                                                                                                                                                                                                                                                      • Lecture
                                                                                                                                                                                                                                                                                                                                                                      • Practical Implementation
                                                                                                                                                                                                                                                                                                                                                                      • Exercises and assignments
                                                                                                                                                                                                                                                                                                                                                                      Evaluation Method
                                                                                                                                                                                                                                                                                                                                                                      • Simulation Test for professional exam
                                                                                                                                                                                                                                                                                                                                                                      Training Type
                                                                                                                                                                                                                                                                                                                                                                      • In Class Training
                                                                                                                                                                                                                                                                                                                                                                      Partners
                                                                                                                                                                                                                                                                                                                                                                      • the Escal Institute of Advanced Technologies, Inc. /dba SANS Institute

                                                                                                                                                                                                                                                                                                                                                                      Add Comment

                                                                                                                                                                                                                                                                                                                                                                      CAPTCHA

                                                                                                                                                                                                                                                                                                                                                                      Realted Program

                                                                                                                                                                                                                                                                                                                                                                      Portfolio Management

                                                                                                                                                                                                                                                                                                                                                                      Investment opportunities in the financial markets allow you to choose between the shares of many companies listed in the financial markets, and they are usually exposed to different levels of risk and varying levels of returns. Given that the investment options available to the investor are many and different and may reach dozens of stocks and investment funds; This program has been designed to build and manage investment portfolios in line with the types and requirements of investors in the financial market according to the different models for managing the risks related to them to achieve the targeted returns for investors.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Planning and Innovation Skills

                                                                                                                                                                                                                                                                                                                                                                      Innovative thinking and planning are among the most important tasks in the business system. Innovation is an urgent necessity for continuity and growth. This program focuses on identifying the strengths, weaknesses, opportunities, and threats facing the organization. In addition to defining goals, how to formulate them and building plans according to the administrative level, identifying the elements of the planning process and integrating innovative thinking in the planning stages to ensure creative results.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Risk Based Internal Audit Plan Preparation

                                                                                                                                                                                                                                                                                                                                                                      The risk-based internal audit plan plays a vital role in financial institutions by analyzing and evaluating potential financial and operational risks, thereby enhancing compliance with financial laws and regulations, and contributing to making sound strategic decisions that ensure sustainability and success. This program provides participants with the best practices and tools for Risk Based Audit planning aligned with the organization's strategic objectives. Participants will be exposed to international best practices for internal control systems’ and governance frameworks’ assessment to enable participants to help their organizations to improve the effectiveness and efficiency of the control operations and increase the likelihood of achieving those strategic objectives.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      IPO Masterclass for Professionals

                                                                                                                                                                                                                                                                                                                                                                      A company's IPO is one of the biggest strategic decisions it can make during its financial lifespan and is considered the best way to raise capital and expand in the future. Due to the rapid growth of the financial markets، private companies were able to obtain liquidity، expand their shareholder base، and introduce radical structural and operational changes through public offerings. This training program aims to prepare participants with the knowledge، skills، and tools necessary to originate & execute IPOs. This training program aims to prepare participants with the knowledge، skills، and tools necessary to originate & execute IPOs.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Fundamentals of Internal Auditing

                                                                                                                                                                                                                                                                                                                                                                      The internal audit contributes to verifying that the establishment is committed to implementing the internal control systems represented by the policies and procedures established by the management; in order to protecting the assets of the facility and ensuring that it achieves its operational objectives. This program provides participants with the fundamental requirements of internal auditing, starting with the modern concept of internal audit, then standards and procedures for carrying out audit tasks, preparing the plan, designing worksheets, selecting samples, collecting evidences and documentation, and then preparing internal audit reports.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Anti-Money Laundering and Terrorist Financing- Advanced Level

                                                                                                                                                                                                                                                                                                                                                                      Fighting money laundering and terrorist financing is a priority for the international community; since these financial crimes threaten the integrity and stability of the financial system and the economy in general, they can also affect the integrity and stability of financial institutions, discourage foreign investment, and distort international flows. As a result, the affected country experiences dire financial instability and poor economic performance. This program deeply explains AML & CTF standards and respective risk management in financial institutions. The program also explains pertinent local and international legislations and leading practices, as well as, the preparation and implementation of ML and TF risk-based programs, including “Know Your Customer” and “Customer Due Diligence” requirements.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Underwriting Practice (M80)- Dip. CII

                                                                                                                                                                                                                                                                                                                                                                      The Diploma in Insurance is a technical and supervisory qualification for insurance staff working across all sectors of the industry, and the logical progression from the Certificate in Insurance. The Diploma will provide you with a firm understanding of insurance fundamentals and will enable you to build towards advanced technical knowledge, thereby ensuring you have the means to function effectively in a challenging environment. Underwriting Practice (M80) unit counts towards a Diploma in Insurance, it may also count towards the Advanced Diploma in Insurance. Through this training program, participants will understand the principles and practices of underwriting and the environment within which they operate.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      CMA Advance Qualification Examination in Compliance

                                                                                                                                                                                                                                                                                                                                                                      This training program is to provide participants with knowledge and skills necessary to pass the Advanced Qualification Exam in Compliance, presented by the CMA and TFA. The exam is tailored for CMA-licensed compliance and AML officers. This program is designed to familiarize participants with the regulatory environment for financial services as well as local and international regulations, as well as to promote compliance & governance culture, understanding of risks, and shows how to establish an effective compliance function, in addition to identifying key skills in combating main financial crimes.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Private Investing: From Inception to IPO

                                                                                                                                                                                                                                                                                                                                                                      This comprehensive training program, "Private Investing: From Inception to IPO," is designed to provide participants with an in-depth understanding of the private investment landscape. Spanning three days, the program covers the full spectrum of early-stage investment processes in the financial sector. Participants will gain valuable insights into evaluating investment opportunities, conducting due diligence, and assessing risks. The program delves into the roles of venture capital and private equity in scaling financial businesses, highlighting the importance of governance and ethical practices in preparing for an IPO.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Credit Analysis and Decision-Making Mechanisms

                                                                                                                                                                                                                                                                                                                                                                      Choosing the right credit decision is the first line of defense for preserving lenders' capital, protecting creditors, and maximizing profitability for the bank. In this program, the participant gets familiar with the stages of credit decision-making according to the approved credit policy, the latest strategies for analyzing and calculating credit risks, local and international controls and standards, to be able to make a correct and successful credit decision that controls the expected risks.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Preparing Financial Reports

                                                                                                                                                                                                                                                                                                                                                                      The financial reports issued by the facility are considered as the outputs of its accounting system through which the results of the financial events related to the reporting period are presented and that help the beneficiaries of those reports to judge the state of the facility in terms of financial balance and the structure of financing the acquisition of assets, as well as showing its ability to generate revenue, and enables them From the analysis of the cost component structure. This training program is designed to provide participants with the knowledge and skills necessary to read and understand the components of financial reports and how to prepare them, and to review the most important presentation and disclosure requirements for international accounting standards and financial reporting standards.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Effective Manager

                                                                                                                                                                                                                                                                                                                                                                      Effective management has always been an important part of the working life of employees, as motivation, enthusiasm and productivity are closely related to how efficient and effective a manager is. The manager is not only responsible for the management’s output and reports, but also the responsibility of supporting and empowering employees by understanding their needs, motives, and guiding them in areas where they need to develop. The best leaders are those who communicate effectively with their employees and have high levels of emotional intelligence. So, what are some characteristics of an effective manager and how should he motivate and empower his employees and team members to achieve the best results? This training program focuses on effective management methods and basic skills for managers, as well as a review of the concepts and methods of guidance and how to set smart goals for employees, in addition to identifying motivation methods and its obstacles, and addressing the challenges facing managers to increase their ability to empower employees and direct them towards achieving the organization's desired goals.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      CMA Advanced Qualification Examination in AML/CTF

                                                                                                                                                                                                                                                                                                                                                                      This training program is to provide participants with knowledge and skills necessary to pass the Advanced Qualification Exam in AML/CTF, presented by the CMA and TFA. The exam is designed for CMA-licensed compliance and AML officers. This program is tailored to familiarize participants with AMC/CTF international and KSA efforts, as well as the National AML Framework. It also provides participants with key AML/CTF skills, identifies Customer Due Diligence and suspicious activities reporting.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Digitalisation of Fund Management

                                                                                                                                                                                                                                                                                                                                                                      This comprehensive program is designed to explore the transformative impact of technology on the fund management industry over the past two decades. This course will provide an in-depth overview of both technology and regulatory trends, highlighting key changes that have shaped the digital era. We will delve into enduring themes such as data, resilience, and connectivity, and discuss the importance of regulatory consistency. The program will also examine the implications of real-time connectivity, including the necessary technological and policy frameworks, obstacles, and risks, and how these can be leveraged in fund management for strategy, trading, risk management, and liquidity management. We will take a closer look at distributed ledger technologies (DLT), assessing their progress, limitations, and potential for liquidity management. Additionally, we will cover global regulatory trends with a focus on transparency and ESG. A dedicated section on AI will explore its applications, challenges, and opportunities in the investment world. Finally, we will address the organizational and operational challenges in a rapidly evolving landscape, emphasizing risk and governance, talent management, and the importance of building a learning organization.

                                                                                                                                                                                                                                                                                                                                                                      Details
                                                                                                                                                                                                                                                                                                                                                                      We value your feedback

                                                                                                                                                                                                                                                                                                                                                                      Dear visitor, we hope that you will participate in improving and developing the services provided by the academy on the website.

                                                                                                                                                                                                                                                                                                                                                                      Was it easy to find what you were looking for on the Academy's website?
                                                                                                                                                                                                                                                                                                                                                                      Was the information presented on the Academy’s website sufficient and useful?
                                                                                                                                                                                                                                                                                                                                                                      Please share with us your suggestions for developing the website
                                                                                                                                                                                                                                                                                                                                                                      Thank you!