Program Brief

This training program for the CISSP Certification, a pinnacle journey for cybersecurity professionals aiming to validate their expertise and ascend in their careers. Over six days, encompassing 66 hours of immersive instruction, this program demystifies the CISSP certification, ensuring participants are exam-ready with a deep understanding of all eight domains of cybersecurity. From security and risk management principles to intricate details of security engineering and software development security, you will gain insights into asset security, dive into the complexities of security engineering, and explore the nuances of communication and network security. The program also emphasizes the importance of identity and access management, security assessment and testing, security operations, and much more. The LDR414 program employs various training methodologies including lectures and simulation tests for professional certifications exams, ensuring a dynamic and engaging learning experience. By the end of this program, you will be prepared to take significant leadership roles in cybersecurity, developing a holistic understanding of information security best practices, frameworks, and strategies to protect organizations from cyber threats. Join us in shaping the future of cybersecurity leadership.

Program Goals

At the end of the training program, the participant should be able to:

  • Acquire knowledge and strategies to confidently tackle the CISSP® certification exam, focusing on the latest 2024 exam updates.
  • Master the principles of security governance, compliance, legal and regulatory issues, including GDPR and supply chain risk management concepts.
  • Gain insights into data and asset classification, ownership, and data security principles including privacy, DRM, and data destruction methods.
  • Explore secure design principles, security models, and controls for safeguarding enterprise assets and software, emphasizing virtualization, cloud computing, and IoT security.
  • Develop a deep understanding of network architecture, including the OSI model, TCP/IP protocols, network devices, and secure network design and implementation.
  • Learn to manage access controls, identity services, and authentication mechanisms, ensuring secure access to resources and data.
  • Acquire the ability to conduct comprehensive security control testing, vulnerability assessments, and penetration testing to identify and address security gaps.
  • Enhance skills in incident response, forensics, logging, monitoring, and the management of security operations for effective threat detection and response.
  • Understand the importance of securing the software development lifecycle, including the application of secure coding practices, software assessment, and the use of DevSecOps for security integration.
  • Prepare to take on significant leadership roles in cybersecurity by developing a holistic understanding of information security best practices, frameworks, and strategies to protect organizations from cyber threats.
Program Agenda
Module 1: Introduction; Security and Risk Management
  • 1 Introductory Material

    • Overview of the exam

      • Focus of 2024 exam updates

        • What is required to become a CISSP®?

          • Maintaining a CISSP®

            • Exam overview

              • Test-taking tips and tricks.

              • 2 Overview of the 8 Domains

                • Domain 1: Security and Risk Management

                  • Domain 2: Asset Security

                    • Domain 3: Security Engineering

                      • Domain 4: Communication and Network Security

                        • Domain 5: Identity and Access Management (IAM)

                          • Domain 6: Security Assessment and Testing

                            • Domain 7: Security Operations

                              • Domain 8: Software Development Security

                              • 3 Domain 1: Security and Risk Management

                                • Confidentiality, integrity, availability, authenticity, and non-repudiation

                                  • Security governance principles

                                    • Compliance

                                      • Supply Chain Risk Management (SCRM) concepts.

                                        • Legal and regulatory Issues

                                          • General Data Protection Regulation (GDPR)

                                            • California Consumer Privacy Act

                                              • Software Bill of Materials (SBOM)

                                                • Ethics

                                                  • Policies, standards, procedures, and guidelines

                                                    • Risk management concepts.

                                                      • Product tampering and counterfeits

                                                        • Threat modeling

                                                          • Security champions

                                                            • Gamification

                                                              • Security Operations Center (SOC) reports

                                                                • Education, training, and awareness

                                                                Module 2: Asset Security and Security Engineering- Part 1
                                                                • 1 Domain 2: Asset Security

                                                                  • Data and asset classification

                                                                    • Tangible and intangible assets

                                                                      • Data owners

                                                                        • System owners

                                                                          • Business/Mission owners

                                                                            • Privacy

                                                                              • Data processors

                                                                                • Data remanence

                                                                                  • Limitation on collection of sensitive data

                                                                                    • Digital Rights Management (DRM)

                                                                                      • Data retention

                                                                                        • Data destruction

                                                                                          • Data Loss Prevention (DLP)

                                                                                            • Cloud Access Security Broker (CASB)

                                                                                              • Baselines

                                                                                                • Scoping and Tailoring

                                                                                                • 2 omain 3: Security Engineering (Part 1)

                                                                                                  • Secure design principles

                                                                                                    • Security models

                                                                                                      • Controls and countermeasures

                                                                                                        • Virtualization

                                                                                                          • Microservices

                                                                                                            • Containerization

                                                                                                              • Serverless

                                                                                                                • Trusted Platform Module (TPM)

                                                                                                                  • Industrial Control Systems (ICS)

                                                                                                                    • Embedded systems

                                                                                                                      • Database security

                                                                                                                        • Cloud computing

                                                                                                                          • Secure Access Service Edge (SASE)

                                                                                                                            • Supervisory Control and Data Acquisition (SCADA)

                                                                                                                              • eXtensible Markup Language (XML)

                                                                                                                                • OWASP

                                                                                                                                  • he Internet of Things

                                                                                                                                  Module 3: Security Engineering- Part 2; Communication and Network Security
                                                                                                                                  • 1 Domain 3: Security Engineering (Part 2)

                                                                                                                                    • Cryptography

                                                                                                                                      • Symmetric

                                                                                                                                      • Asymmetric

                                                                                                                                      • Hash

                                                                                                                                      • Quantum cryptography

                                                                                                                                      • Public Key Infrastructure (PKI)

                                                                                                                                      • Digital signatures

                                                                                                                                      • Non-repudiation

                                                                                                                                      • Salts

                                                                                                                                      • Rainbow tables

                                                                                                                                      • Pass the hash.

                                                                                                                                      • Cryptanalysis

                                                                                                                                      • Fault injection

                                                                                                                                      • Implementation attacks

                                                                                                                                  • 2 Facility design considerations

                                                                                                                                    • 3 Physical security

                                                                                                                                      • Safety

                                                                                                                                        • Data center security

                                                                                                                                          • Handling evidence

                                                                                                                                            • HVAC

                                                                                                                                              • Fire prevention and suppression.

                                                                                                                                              • 4 Domain 4: Communication and Network Security

                                                                                                                                                • Network architecture.

                                                                                                                                                  • OSI model

                                                                                                                                                    • TCP/IP

                                                                                                                                                      • Multilayer protocols

                                                                                                                                                        • Network Attached Storage (NAS)

                                                                                                                                                        • Fibre Channel over Ethernet (FCoE)

                                                                                                                                                        • iSCSI

                                                                                                                                                        • Infiniband

                                                                                                                                                        • Compute Express Link (CXL)

                                                                                                                                                    • 5 Voiceover IP

                                                                                                                                                      • 6 Wireless

                                                                                                                                                        • 802.11

                                                                                                                                                          • WPA2 and WPA3

                                                                                                                                                            • Zigbee

                                                                                                                                                            • 7 Network devices.

                                                                                                                                                              • Switches

                                                                                                                                                                • Routers

                                                                                                                                                                  • Firewalls

                                                                                                                                                                    • Distributed Firewalls

                                                                                                                                                                      • Proxies

                                                                                                                                                                      • 8 Content distribution networks

                                                                                                                                                                        • 9 Virtual routing and forwarding

                                                                                                                                                                          • 10 Virtual domain

                                                                                                                                                                            • 11 Network Functions Virtualization (NFV)

                                                                                                                                                                              • 12 Remote meeting technology

                                                                                                                                                                                • 13 Telecommuting

                                                                                                                                                                                  • 14 Remote access and VPN

                                                                                                                                                                                    • SSH

                                                                                                                                                                                      • VPN

                                                                                                                                                                                        • IPsec

                                                                                                                                                                                          • SSL/TLS

                                                                                                                                                                                          • 15 Port isolation

                                                                                                                                                                                            • 16 VLANs

                                                                                                                                                                                              • 17 Software-defined networks

                                                                                                                                                                                                • 18 Micro-segmentation

                                                                                                                                                                                                  • 19 Virtual eXtensible Local Area Network (VXLAN)

                                                                                                                                                                                                    • 20 Software-Defined Wide Area Network (SD-WAN)

                                                                                                                                                                                                      Module 4: Identity and Access Management
                                                                                                                                                                                                      • 1 Domain 5: Identity and Access Management (IAM)

                                                                                                                                                                                                        • Physical and logical access

                                                                                                                                                                                                          • Credential management systems

                                                                                                                                                                                                            • Just-In-Time (JIT)

                                                                                                                                                                                                              • SSO

                                                                                                                                                                                                                • LDAP

                                                                                                                                                                                                                  • Multi-factor authentication

                                                                                                                                                                                                                    • Password-less authentication

                                                                                                                                                                                                                      • Biometrics

                                                                                                                                                                                                                        • Accountability

                                                                                                                                                                                                                          • Session management

                                                                                                                                                                                                                            • SAML

                                                                                                                                                                                                                              • Credential management

                                                                                                                                                                                                                              • 2 Third-party identity services

                                                                                                                                                                                                                                • 3 On-premises, cloud, and hybrid identity

                                                                                                                                                                                                                                  • 4 Authorization mechanisms

                                                                                                                                                                                                                                    • MAC

                                                                                                                                                                                                                                      • DAC

                                                                                                                                                                                                                                        • Rule-based

                                                                                                                                                                                                                                          • RBAC

                                                                                                                                                                                                                                            • ABAC

                                                                                                                                                                                                                                            • 5 Provisioning

                                                                                                                                                                                                                                              Module 5: Security Assessment and Testing; Security Operations
                                                                                                                                                                                                                                              • 1 Domain 6: Security Assessment

                                                                                                                                                                                                                                                • Assessment and test strategies

                                                                                                                                                                                                                                                  • Security control testing

                                                                                                                                                                                                                                                    • Vulnerability assessment

                                                                                                                                                                                                                                                    • Penetration testing

                                                                                                                                                                                                                                                    • Log reviews

                                                                                                                                                                                                                                                    • Synthetic transactions and benchmarks

                                                                                                                                                                                                                                                    • Misuse case testing

                                                                                                                                                                                                                                                    • Test coverage analysis

                                                                                                                                                                                                                                                    • Responsible disclosure

                                                                                                                                                                                                                                                • 2 Security testing strategies

                                                                                                                                                                                                                                                  • Interface testing

                                                                                                                                                                                                                                                    • Breach attack simulations

                                                                                                                                                                                                                                                      • Red, blue, and purple team exercises

                                                                                                                                                                                                                                                      • 3 Security process

                                                                                                                                                                                                                                                        • Account management

                                                                                                                                                                                                                                                          • Management review

                                                                                                                                                                                                                                                            • Training and awareness

                                                                                                                                                                                                                                                              • Disaster recovery and business continuity

                                                                                                                                                                                                                                                                • Exception handling

                                                                                                                                                                                                                                                                • 4 Internal and third-party audits

                                                                                                                                                                                                                                                                  • 5 Domain 7: Security Operations

                                                                                                                                                                                                                                                                    • Investigations

                                                                                                                                                                                                                                                                      • Evidence collection and handling

                                                                                                                                                                                                                                                                      • Reporting and documenting

                                                                                                                                                                                                                                                                      • Forensics

                                                                                                                                                                                                                                                                  • 6 Operational, criminal, civil, and regulatory investigations

                                                                                                                                                                                                                                                                    • 7 eDiscovery

                                                                                                                                                                                                                                                                      • 8 Logging and monitoring

                                                                                                                                                                                                                                                                        • Intrusion detection and prevention

                                                                                                                                                                                                                                                                          • SIEM

                                                                                                                                                                                                                                                                            • Continuous monitoring

                                                                                                                                                                                                                                                                              • Egress monitoring

                                                                                                                                                                                                                                                                                • User and Entity Behavior Analytics (UEBA)

                                                                                                                                                                                                                                                                                  • Tools based on machine learning and Artificial Intelligence (AI)

                                                                                                                                                                                                                                                                                  • 9 Provisioning

                                                                                                                                                                                                                                                                                    • Asset inventory

                                                                                                                                                                                                                                                                                      • Configuration management

                                                                                                                                                                                                                                                                                        • Physical, virtual, and cloud assets

                                                                                                                                                                                                                                                                                          • Software as a Service (SaaS)

                                                                                                                                                                                                                                                                                          • 10 Security operations

                                                                                                                                                                                                                                                                                            • Need-to-know and least privilege

                                                                                                                                                                                                                                                                                              • Service-level agreements

                                                                                                                                                                                                                                                                                                • System resilience

                                                                                                                                                                                                                                                                                                  • Quality of Service (QoS)

                                                                                                                                                                                                                                                                                                    • Threat feeds

                                                                                                                                                                                                                                                                                                      • Threat hunting

                                                                                                                                                                                                                                                                                                      • 11 Incident management

                                                                                                                                                                                                                                                                                                        • 12 Firewalls

                                                                                                                                                                                                                                                                                                          • 13 IDS and IPS

                                                                                                                                                                                                                                                                                                            • 14 Honeypots and honeynets

                                                                                                                                                                                                                                                                                                              • 15 Vulnerability management

                                                                                                                                                                                                                                                                                                                • 16 Change management processes.

                                                                                                                                                                                                                                                                                                                  • 17 Recovery strategies

                                                                                                                                                                                                                                                                                                                    • 18 Disaster recovery processes

                                                                                                                                                                                                                                                                                                                      • 19 Disaster recovery plans

                                                                                                                                                                                                                                                                                                                        Module 6: Identity and Access Management
                                                                                                                                                                                                                                                                                                                        • 1 Domain 8: Software Development Security

                                                                                                                                                                                                                                                                                                                          • Software development lifecycle

                                                                                                                                                                                                                                                                                                                            • Software development methodologies

                                                                                                                                                                                                                                                                                                                              • Waterfall

                                                                                                                                                                                                                                                                                                                              • Spiral

                                                                                                                                                                                                                                                                                                                              • Agile

                                                                                                                                                                                                                                                                                                                              • Integrated Product Team (IPT)

                                                                                                                                                                                                                                                                                                                          • 2 Software capability maturity models

                                                                                                                                                                                                                                                                                                                            • Capability Maturity Model Integration (CMMi)

                                                                                                                                                                                                                                                                                                                              • Software Assurance Maturity Model (SAMM)

                                                                                                                                                                                                                                                                                                                              • 3 Change management

                                                                                                                                                                                                                                                                                                                                • 4 DevOps

                                                                                                                                                                                                                                                                                                                                  • 5 DevSecOps

                                                                                                                                                                                                                                                                                                                                    • 6 Scaled Agile Framework (SAFe)

                                                                                                                                                                                                                                                                                                                                      • 7 Software Component/Composition Analysis (SCA)

                                                                                                                                                                                                                                                                                                                                        • 8 Interactive Application Security Test (IAST)

                                                                                                                                                                                                                                                                                                                                          • 9 Continuous Integration/Continuous Delivery (CI/CD)

                                                                                                                                                                                                                                                                                                                                            • 10 Security Orchestration, Automation, and Response (SOAR)

                                                                                                                                                                                                                                                                                                                                              • 11 Security vulnerabilities

                                                                                                                                                                                                                                                                                                                                                • Bounds checking

                                                                                                                                                                                                                                                                                                                                                  • Input/output validation

                                                                                                                                                                                                                                                                                                                                                    • Buffer overflow

                                                                                                                                                                                                                                                                                                                                                      • Privilege escalation

                                                                                                                                                                                                                                                                                                                                                      • 12 Secure coding

                                                                                                                                                                                                                                                                                                                                                        • 13 Code repositories

                                                                                                                                                                                                                                                                                                                                                          • 14 Programming interfaces

                                                                                                                                                                                                                                                                                                                                                            • 15 Software-defined security

                                                                                                                                                                                                                                                                                                                                                              • 16 Assessing software security

                                                                                                                                                                                                                                                                                                                                                                • Black box testing

                                                                                                                                                                                                                                                                                                                                                                  • White box testing

                                                                                                                                                                                                                                                                                                                                                                    • Fuzzing

                                                                                                                                                                                                                                                                                                                                                                    • 17 Security of Application Programming Interfaces (APIs)

                                                                                                                                                                                                                                                                                                                                                                      Program Requirements

                                                                                                                                                                                                                                                                                                                                                                      Not Available

                                                                                                                                                                                                                                                                                                                                                                      Program Path

                                                                                                                                                                                                                                                                                                                                                                      Names of the training programs that are integrated (enriched) with the training program:

                                                                                                                                                                                                                                                                                                                                                                      • Not Available

                                                                                                                                                                                                                                                                                                                                                                      Names of the training programs that after the training program:

                                                                                                                                                                                                                                                                                                                                                                      • Not Available
                                                                                                                                                                                                                                                                                                                                                                      Program Method
                                                                                                                                                                                                                                                                                                                                                                      • Lecture
                                                                                                                                                                                                                                                                                                                                                                      • Practical Implementation
                                                                                                                                                                                                                                                                                                                                                                      • Exercises and assignments
                                                                                                                                                                                                                                                                                                                                                                      Evaluation Method
                                                                                                                                                                                                                                                                                                                                                                      • Simulation Test for professional exam
                                                                                                                                                                                                                                                                                                                                                                      Training Type
                                                                                                                                                                                                                                                                                                                                                                      • In Class Training
                                                                                                                                                                                                                                                                                                                                                                      Partners
                                                                                                                                                                                                                                                                                                                                                                      • the Escal Institute of Advanced Technologies, Inc. /dba SANS Institute

                                                                                                                                                                                                                                                                                                                                                                      Add Comment

                                                                                                                                                                                                                                                                                                                                                                      CAPTCHA

                                                                                                                                                                                                                                                                                                                                                                      Realted Program

                                                                                                                                                                                                                                                                                                                                                                      Leading Innovation in Financial Institutions

                                                                                                                                                                                                                                                                                                                                                                      The Financial Sector Development Program enables financial institutions to better support private sector growth, develop more advanced capital markets and improve the retail savings and investment landscape. Promoting and supporting a culture of innovation is obviously a critical milestone in achieving vision 2030 goals. This training programme is designed to equip participants with the necessary skills to lead their teams and organisations in an industry that will see significant disruption over the coming decade.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Mergers and Acquisitions

                                                                                                                                                                                                                                                                                                                                                                      To assess a potential merger and deliver the best deal, you must value the target company accurately, as well as negotiate effectively and apply proven concepts and tools to confidently enter the process. In this training program, participants will learn how to determine a target company’s worth, both in itself and to organisation. In addition, the program will cover how to use value fundamentals and free cash flow valuations, how to evaluate potential synergies between companies and the value they might bring, as well as how to finance the deal, focusing on highly leveraged transactions, and exploring debt capacity and affordable bid. The program also focuses on how to prepare for negotiations, the importance of effective leadership during the deal-making process, and how to assess bid tactics and the frameworks to predict and influence behaviour. Ideal for financial advisors, strategists, or anyone looking to advance in high-stakes investment roles, this program also provides a prestigious certificate from London Business School.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Portfolio Management

                                                                                                                                                                                                                                                                                                                                                                      Investment opportunities in the financial markets allow you to choose between the shares of many companies listed in the financial markets, and they are usually exposed to different levels of risk and varying levels of returns. Given that the investment options available to the investor are many and different and may reach dozens of stocks and investment funds; This program has been designed to build and manage investment portfolios in line with the types and requirements of investors in the financial market according to the different models for managing the risks related to them to achieve the targeted returns for investors.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Preparation Program for Certified Internal Auditor Exam (CIA®)- Second Part

                                                                                                                                                                                                                                                                                                                                                                      A professional certificate accredited by the Institute of Internal Auditors, IIA, USA, an organization offered in the internal field of performance, as well as there is a need in the labor market for holders of this certificate, and hence the high value of the benefits and job opportunities for them. This certificate helps prepare a new generation of accountants with globally qualified professional qualifications, to face the economic challenges faced by business establishments. The CIA Internal Auditor Certificate in Part Two focuses on the practice of internal auditing by examining audit assignments, fraud risks, and individual natures.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Effective Manager

                                                                                                                                                                                                                                                                                                                                                                      Effective management has always been an important part of the working life of employees, as motivation, enthusiasm and productivity are closely related to how efficient and effective a manager is. The manager is not only responsible for the management’s output and reports, but also the responsibility of supporting and empowering employees by understanding their needs, motives, and guiding them in areas where they need to develop. The best leaders are those who communicate effectively with their employees and have high levels of emotional intelligence. So, what are some characteristics of an effective manager and how should he motivate and empower his employees and team members to achieve the best results? This training program focuses on effective management methods and basic skills for managers, as well as a review of the concepts and methods of guidance and how to set smart goals for employees, in addition to identifying motivation methods and its obstacles, and addressing the challenges facing managers to increase their ability to empower employees and direct them towards achieving the organization's desired goals.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Microsoft Excel- Advanced Level

                                                                                                                                                                                                                                                                                                                                                                      One of the basic skills needed to carry out daily tasks professionally is the ability to use Microsoft Excel to manage and create equations and statistics. This training program is designed to provide participants with the knowledge and skills necessary to use advanced technologies in Excel efficiently and effectively.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Microsoft Excel- Basic Level

                                                                                                                                                                                                                                                                                                                                                                      With the huge amount of data that must be handled and analyzed every day, it is imperative that you learn how to use a flexible tool to handle equations and statistics professionally, and Microsoft Excel is the most popular tool for doing so. This training program is designed to provide participants with the knowledge and skills needed to organize, analyze and present data, by learning how to perform calculations, use functions, and manage workbooks efficiently and effectively.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Future of Finance: Leveraging Fintech Innovation

                                                                                                                                                                                                                                                                                                                                                                      Gain insights, tools, and tactical know-how to leverage fintech innovation and digital currency without prior tech background. This interactive program demystifies the forces shaping the financial services industry and empowers executives with strategic and tactical know-how to implement and execute innovative actions

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      SANS Training Program for the CISSP Certification (LDR414)

                                                                                                                                                                                                                                                                                                                                                                      This training program for the CISSP Certification, a pinnacle journey for cybersecurity professionals aiming to validate their expertise and ascend in their careers. Over six days, encompassing 66 hours of immersive instruction, this program demystifies the CISSP certification, ensuring participants are exam-ready with a deep understanding of all eight domains of cybersecurity. From security and risk management principles to intricate details of security engineering and software development security, you will gain insights into asset security, dive into the complexities of security engineering, and explore the nuances of communication and network security. The program also emphasizes the importance of identity and access management, security assessment and testing, security operations, and much more. The LDR414 program employs various training methodologies including lectures and simulation tests for professional certifications exams, ensuring a dynamic and engaging learning experience. By the end of this program, you will be prepared to take significant leadership roles in cybersecurity, developing a holistic understanding of information security best practices, frameworks, and strategies to protect organizations from cyber threats. Join us in shaping the future of cybersecurity leadership.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Implementing and Auditing CIS Controls (SEC566) ®

                                                                                                                                                                                                                                                                                                                                                                      Embark on a transformative journey with our SEC566: Implementing and Auditing CIS Controls course, designed to fortify your organization’s cybersecurity defenses. Over five intensive days, immerse yourself in mastering the CIS Critical Controls, a gold standard for securing IT systems and data. This program will equip you with the knowledge and practical skills to not only understand but effectively implement and audit these critical controls within your infrastructure. From gaining a deeper understanding of controls' structure and intent to leveraging tools and resources for bolstering security, this program covers it all. Engage in hands-on exercises that simulate real-world cybersecurity threats and responses, ensuring you’re battle-ready to protect your enterprise assets. Learn to assess control effectiveness, manage vulnerabilities, and navigate the complex landscape of IT security with confidence. Whether you're safeguarding software assets, enhancing data protection, or managing access controls, SEC566 provides the strategies and insights needed for a comprehensive cybersecurity framework. Perfect for IT professionals tasked with security management, auditing, and compliance, this program is your steppingstone to becoming a cybersecurity leader in your organization. Join us to elevate your skills, meet compliance standards, and lead with security excellence.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Preparing Financial Reports

                                                                                                                                                                                                                                                                                                                                                                      The financial reports issued by the facility are considered as the outputs of its accounting system through which the results of the financial events related to the reporting period are presented and that help the beneficiaries of those reports to judge the state of the facility in terms of financial balance and the structure of financing the acquisition of assets, as well as showing its ability to generate revenue, and enables them From the analysis of the cost component structure. This training program is designed to provide participants with the knowledge and skills necessary to read and understand the components of financial reports and how to prepare them, and to review the most important presentation and disclosure requirements for international accounting standards and financial reporting standards.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      ICA \ TFA - Advanced Certification in Regulatory and Financial Crime Compliance

                                                                                                                                                                                                                                                                                                                                                                      ICA\ TFA Advanced Certification in Regulatory and Financial Crime Compliance has been developed in line with international standards of competency covering both knowledge and abilities for those working in compliance in the financial services sector. Through the combination of self-study and classroom classes in this blended learning program, several topics will be addressed, the most important of which is how to conduct a robust assessment on regulatory and financial crime compliance, in addition to managing risks efficiently and effectively.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      ESG in the Financial Sector

                                                                                                                                                                                                                                                                                                                                                                      This comprehensive programme has been developed to enable participants to build a full, practical understanding of the environmental, social and governance (ESG) issues and risk factors and the principal economic, financial, and regulatory implications of ESG and sustainability. The programme fully covers the dimensions of environmental –including climate change as well as localised pollution– social and governance risk factors in addition to the principal themes underlying sustainability such as natural capital and circular economies.

                                                                                                                                                                                                                                                                                                                                                                      Details

                                                                                                                                                                                                                                                                                                                                                                      Strategies for Optimizing Capital Structure and Maximizing Shareholder Value

                                                                                                                                                                                                                                                                                                                                                                      In contemporary corporate and project finance the optimisation of entities’ capital structures is a critical process in financial risk management as well as in maximising investor value. Firms’ target capital structure can potentially comprise funding from a number of sources across equity, sukuk, conventional debt including bonds, and in some instances, mezzanine finance in the form of preferred shares and subordinated debt. The capital optimisation process is complex: in addition to its basis in comprehensive capital budgeting assessment of current and expected future availability of appropriate financing in the required form (and acceptable pricing) is required to sustainably support the pursuit of new business opportunities, as well as maintaining existing capital assets, through the cycle. This comprehensive, applied programme covers the key issues and considerations in capital structuring and – via a number of case studies – examines the specific challenges across different sectors and project finance types as well as the dynamic nature of entities’ funding requirements as they evolve.

                                                                                                                                                                                                                                                                                                                                                                      Details
                                                                                                                                                                                                                                                                                                                                                                      We value your feedback

                                                                                                                                                                                                                                                                                                                                                                      Dear visitor, we hope that you will participate in improving and developing the services provided by the academy on the website.

                                                                                                                                                                                                                                                                                                                                                                      Was it easy to find what you were looking for on the Academy's website?
                                                                                                                                                                                                                                                                                                                                                                      Was the information presented on the Academy’s website sufficient and useful?
                                                                                                                                                                                                                                                                                                                                                                      Please share with us your suggestions for developing the website
                                                                                                                                                                                                                                                                                                                                                                      Thank you!