UP TO 50% OFF on Combo Courses!
D H M S
blog-banner

Social Engineering and its use cases

‘Social Engineering’ in the context of information security, refers to the manipulation of people to  execute an action or to release confidential information. It can be called a ‘method attack’, where one makes use of persuasion, sometimes abusing the user’s trust, to get information that can be u...

read more

Marriott and Quora breaches: what you should know

It seems to be the season of breaches and hacks. With Marriott reporting its breach on November 30, 2018 and Quora reporting its breach on Dec 7, 2018, it seems that hackers are determined to penetrate systems and grab the personal information of innocent users and use it for their gain! Marriott data breach...

read more

Domain 3: Cloud Platform and Infrastructure Security

The third CCSP domain, ‘Cloud Platform and Infrastructure Security’ carries 19%weightage in the certification exam. This CCSP domain broadly explains cloud infrastructure components, risks associated with cloud infrastructure, diverse techniques to mitigate risks with extensive security controls and bu...

read more

Domain 2: Cloud Data Security

The second CCSP domain is ‘Cloud Data security’. This vast domain evaluates the candidate’s technical understanding of: Various phases of cloud data life cycle Cloud data storage architecture including the storage types,security threats and controls Data security strategies along with other o...

read more

Domain 1: Architectural concepts and design requirements

The “Architectural concepts and design requirements” domain from the CCSP certification curriculum, has 19% weight age in the exam. This CCSP domain broadly tests a candidate’s design and security skills in context to the cloud environment and focuses on the following objectives: Understanding of c...

read more

What is ‘Ransomware’ and how does it work?

What is ‘Ransomware’ and how does it work? With advances in technology, it has become a big battle to keep our environment safe. There are new kinds of threats being created everyday which aim to target servers and network systems. The managers need to be prepared against these threats, using support too...

read more
Certified Information Systems Auditor

CISA (Certified Information Systems Auditor)

1. What is the CISA certification? Certified Information Systems Auditor, CISA is a globally valued certification devised and offered by ISACA that helps IT professionals gain expertise in monitoring, managing, and protecting the IT and business systems in the organizations. Passing the CISA certificatio...

read more
TOP
whatsapp