About the Author – Ahmed
With over a decade of hands-on experience in cybersecurity, auditing, and cloud governance, Ahmed is a passionate trainer and industry consultant. As the founder of Cyvitrix Learning, he has helped thousands of learners worldwide prepare for top certifications, including CISSP, CISA, CCSP, and CRISC. Ahmed specializes in translating complex technical concepts into easy-to-follow lessons, combining real-world insights with exam-focused strategies to help you succeed more quickly and effectively.
Course Content
19+ Hours of Bite-sized lectures
"Free Preview Enabled for selected lectures!"
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- The Security Objective (7:15)
- What is the Governance, Risk and Compliance? (5:08)
- Information Security roles and GRC (4:03)
- Key Security Terminologies (8:41)
- Adversaries and Threat Actors (4:58)
- Security vulnerabilities (5:15)
- What is Malware? (11:33)
- The Cyber Security Attacks (4:12)
- Understand Web Application Attacks (9:31)
- Social Engineering (10:02)
- IT Infrastructure (6:07)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Policies (4:46)
- Example - Acceptable Use - Physical Security - Clear Desk (7:21)
- Example - Internet Access, Email Security - Remote Access Policies (7:07)
- Example - Network, Wireless & BYOD Policies (7:04)
- Example - Data Protection, Encryption, Classification Policies (8:19)
- User Account, Password and Access Control Policies (7:55)
- Artificial Intelligence Usage Policy (5:36)
- Standards (4:18)
- Procedures and Guidelines (4:24)
- Review Policies, Standards and Procedures (6:47)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Information System Auditing overview (5:29)
- Types of Audits (4:59)
- Audit Committee (4:26)
- Audit Planning (16:09)
- Audit Execution (4:44)
- Evidence Collection during Auditing (5:37)
- Evaluation of Controls during the Audit (5:42)
- Using Sampling in Audit Engagement (7:01)
- Audit Reporting and Documentation (5:52)
- SSAE (7:41)
- SOC Audit and Understand SOC Reports (5:11)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- # Securing Endpoints (14:50)
- # Endpoint Security Software & Endpoint Protection Platform (13:12)
- Data Lifecycle (3:45)
- Roles in Data and Assets Protection (4:49)
- Data Classification (12:12)
- Data Security Measures and Controls (6:47)
- DLP (7:37)
- DRM (8:13)
- Data Destruction (4:39)
- Physical Access Control Security Measures (6:00)
Available in
days
days
after you enroll
- The Process of Acquiring New technology (6:05)
- Feasibility Analysis and Business Case (4:44)
- Software Development Process (12:08)
- Software Development Methodologies (7:35)
- Software and Information System Testing (12:43)
- Secure Coding and Software Development (8:45)
- DevOps (6:37)
- DevSecOps (7:11)
- Software Types and Licenses (8:56)
- Intellectual Property (3:24)
Available in
days
days
after you enroll
- Software and System Implementation & PIR (10:39)
- Vulnerability Assessment and Patch Management (4:54)
- Penetration Testing (10:06)
- The Bug Bounty Program (5:23)
- Release Management (7:15)
- Change Management Process (11:05)
- Configuration Management (7:15)
- IT Assets Management (6:51)
- IT Management and ITIL Framework Overview (8:40)
- Control Objective of IT - COBIT (6:11)
Available in
days
days
after you enroll
- # Incident Management Process (10:26)
- # Responding to Incidents (15:37)
- # Business Impact Assessment (17:21)
- # Understand RTO and RPO (12:35)
- # Recovery Strategies (5:47)
- # BCP and DRP Testing and Evaluation (6:19)
- Backup and Recovery (10:47)
- # Storage Redundancy and RAID (11:03)
- # Network Redundancy (9:30)