Training Portfolio
- Home
- ∎
- Training Portfolio
AZAAN training programs are designed for a complete understanding of regulatory requirements.
AZAAN has partnered with some of the world’s leading accreditation and certification bodies and institutes to offer the following courses and trainings.
Contact us to know more about our training programs and events. We Offer in-house, public, Live Online & E-Learning Training (selected courses).
AZAAN training programs are designed for a complete understanding of regulatory requirements.
Training Portfolio
Governance, Risk &
Compliance
Information Protection & Business
Resiliency
Integrated Management System
On Going Advisory
PROJECT MANAGEMENT ACROSS THE PORTFOLIO
- CYBERSECURITY
- INFORMATION SECURITY
- CLOUD SECURITY
- CONTINUITY, RESILIENCE, AND RECOVERY
- PRIVACY AND DATA PROTECTION
- QUALITY AND SERVICE MANAGEMENT
- GOVERNANCE, RISK, AND COMPLIANCE
- NEXT-GEN PROGRAMS
It is important for organizations to educate employees about the Cybersecurity basic landscape. Our Cybersecurity training encompasses everything that pertains to protecting personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries.
- Cybersecurity Foundation
- Lead Cybersecurity Manager
- Cybersecurity Maturity Model Certification
- Cyber Forensics Examiner
Information security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties.
- ISO/IEC 27001 Information Security Management
- ISO/IEC 27002 Information Security Guidelines
- ISO/IEC 27005 Information Security Risk Management
- ISO/IEC 27035 Incident Management
Cloud security is a set of strategies and practices used to secure cloud environments, applications, and data. Cloud security ensures the preservation of confidentiality, integrity, availability, and privacy of information hosted in a private, public, community, or hybrid cloud deployment model. It provides multiple levels of security controls in the cloud infrastructure that ensure data protection and business continuity.
As the use of cloud computing grows constantly, so does the need to ensure cloud security. Data breaches and other forms of attacks happen mainly because of poor security practices, complicated controls, and misconfigurations. This makes cloud security essential to the effective operation of cloud services. Organizations adopting cloud technology must ensure that the level of security of their cloud systems meets their requirements and complies with the applicable laws and regulations.
Lead Cloud Security Manager
Continuity, Resilience, and Recovery plays a significant role in organizations ensuring that they have in place the right procedures in place to resume and recover organizations from business disruptions and disasters.
Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization’s ability to remain operational after an adverse event. Resiliency has become the watchword for organizations facing an array of threats, from natural disasters to the latest round of cyberattacks.
AZAAN offers a wide array of training programs in the field of Continuity, Resilience, and Recovery. Choose the one best suit your needs:
- ISO 22301 Business Continuity Management
- Disaster Recovery
- ISO 22316 Organizational Resilience Trainings
- ISO 22317 Business Impact Analysis
Data privacy defines who has access to data, while data protection provides tools and policies to restrict access to the data.
Privacy and data protection are two interrelated Internet governance issues. Data protection is a legal mechanism that ensures privacy. Privacy is usually defined as the right of any citizen to control their own personal information and to decide about it (to disclose information or not). Privacy is a fundamental human right.
ISO/IEC 27701 Privacy Information Management
GDPR — General Data Protection Regulation
Quality and Service Management relates to compliance with laws, regulations and the standards adopted by organizations in terms of the quality and IT service management. It is a combination of technical, organizational, and managerial measures that allows an organisation to develop a safe and predictable environment while optimizing its production and performance.
ISO 9001 Quality Management
ISO/IEC 20000 – IT Service Management
Governance, risk, and compliance (GRC) refers to a strategy for managing an organization’s overall governance, enterprise risk management and compliance with regulations. Think of GRC as a structured approach to aligning IT with business objectives, while effectively managing risk and meeting compliance requirements.
ISO 31000 – Risk Management
ISO 37001 – Anti-Bribery Management
ISO 37301 – Compliance Management
ISO/IEC 38500 – IT Governance
CGEIT
COBIT 2019
IT Risk Fundamentals
ITIL
Striving towards Excellence; AZAAN has partnered with one of the largest and leading certification body to offer over 100 courses and 40 certifications that cover contemporary fields of practice, including Digital Transformation, Cloud Computing, Microservices, Robotic Process Automation (RPA), Cybersecurity, Blockchain, Machine Learning, Artificial Intelligence, Internet-of-Things (IoT), Service APIs, DevOps, Big Data Analytics and Architecture, Service-Oriented Architecture and Containerization.
DIGITAL TRANSFORMATION
BIG DATA
NEXT-GEN IT ACADEMY
CLOUD COMPUTING
SERVICE-ORIENTED ARCHITECTURE
What Clients Say
EXPERIENCE WAS
EXCELLENT
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Jamal Hamid, 30 May, 2020
SAVED OUR 2 HOURS AND 100 DHS
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Smith James, 30 May, 2020
EXCELLENT SERVICE RECOMMENDED
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Mike Hussy, 30 May, 2020