» AKATI Academy » (ISC)2 Official Training Provider
AKATI Consulting, a leading Information Security provider is the sole distributor of (ISC)2, the largest not-for-profit body of certified information and software security professionals with over 100,000 members worldwide. We are the only (ISC)2 Official Training Provider (OTP) in Malaysia.
Efforts to secure information assets can only be realised with constant enhancement of security skills by IT Professionals. AKATI Academy who has already built a reputation in providing security consulting services par excellence now goes beyond, as we have established our own AKATI Academy which provides highly sought after Information Assurance and Cyber Security training courses as well.
Now through this strategic alliance with (ISC)2, AKATI Academy will be able to provide world-class Information Security training courses including certifications offered by (ISC)2 which is at the top of the list for all information security professionals. We have come together through this alliance for the benefit of IT professionals in Malaysia and this region.
Through building strategic alliances with quality information security education providers such as (ISC)2, AKATI Academy believes that it is greatly contributing to the improvement of Malaysian and APAC's Information Security capacity building.
(ISC)2 in its mission of supporting and providing members and constituents with credentials, resources, and leadership to secure information and deliver value to society, has recognised AKATI Consulting as a worthy partner to join this endeavour.
This strategic alliance between (ISC)2 and AKATI Consulting would improve the geographical coverage of the (ISC)2 training services and would be a great opportunity for IT professionals in Malaysia. (ISC)2 certifications are recognised globally, serve as an accepted standard in the industry and offer confidence to professionals in private and government sectors.
The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
Backed by (ISC)2, the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement. The CISSP draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. The CISSP exam tests one's competence in the 8 domains of the CISSP CBK, which cover:
|Security and Risk Management||Asset Security|
|Security Engineering||Communications and Network Security|
|Identity and Access Management||Security Assessment and Testing|
|Security Operations||Software Development Security|
The SSCP certification is the ideal credential for those with proven technical skills and practical security knowledge in hands-on operational IT roles. It provides industry-leading confirmation of a practitioner's ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.
The SSCP indicates a practitioner's technical ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more. The SSCPs benefit from a global network of 100,000 certified members and valuable resources and support to help them to continually develop and advance in their careers.
The SSCP credential draws from a comprehensive, up-to-date global body of knowledge that ensures candidates have the right information security knowledge and skills to be successful in IT operational roles. It demonstrates competency in the following:
|Access Controls||Security Operations and Administration|
|Risk Identification, Monitoring, and Analysis||Incident Response and Recovery|
|Cryptography||Network and Communications Security|
|Systems and Application Security|
Backed by the two leading non-profits focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)2, the CCSP credential denotes professionals with deep-seated knowledge and competency derived from hands-on experience with information security and cloud computing.
As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced professionals equipped with the right cloud security knowledge and skills to be successful. They need CCSPs. CCSPs help you achieve the highest standard for cloud security expertise and enable your organization to benefit from the power of cloud computing while keeping sensitive data secure.
The CCSP credential is appropriate and applicable to cloud security in a global environment. This is especially important given the legal, regulatory and compliance concerns that come with multi-jurisdictional housing of personally identifiable information (PII).
For those who qualify, the CCSP exam will test their competence in the six CCSP domains of the (ISC)2 Common Body of Knowledge (CBK), which cover:
|Architectural Concepts & Design Requirements||Cloud Data Security|
|Cloud Platform & Infrastructure Security||Cloud Application Security|
|Operations||Legal & Compliance|
The CCFP credential indicates expertise in forensics techniques and procedures, standards of practice, and legal and ethical principles to assure accurate, complete, and reliable digital evidence admissible in a court of law.
The evolving field of cyber forensics requires professionals who understand far more than just hard drive or intrusion analysis. The field requires CCFP professionals who demonstrate competence across a globally recognized common body of knowledge that includes established forensics disciplines as well as newer challenges, such as mobile forensics, cloud forensics, anti-forensics, and more.
The CCFP credentials indicates the ability to apply forensics to other information security disciplines, such as e-discovery, malware analysis, or incident response. In other words, the CCFP is an objective measure of excellence valued by courts and employers alike. For those who qualify, the CCFP exam will test their competence in the 6 CCFP domains of the (ISC)2 CBK, which cover:
|Legal and Ethical Principles||Investigations|
|Forensic Science||Digital Forensics|
|Application Forensics||Hybrid and Emerging Technologies|
|October 10-14, 2016 : CISSP CBK Training, Kuala Lumpur Malaysia||October 17-21, 2016 : CISSP CBK Training, Miri Malaysia||Download Brochure|