AgilePM® Foundation  Practitioner Combined

AgilePM® Foundation / Practitioner Combined

ALC offers an outstanding two-module, four-day training program covering the full scope of AgilePM®, the world’s leading framework and certification for agile project management.

80% of Global Fortune 500 organizations are expected to adopt DevOps by 2021 – CA.

ADP, BBC News, ebay, GE, ING, Intuit, PayPal, Splunk, Uber & other MNCs worldwide use DevOps.

Be future ready. Start learning
Structure your learning and get a certificate to prove it.
Start Learning

Agilepm Foundation Practitioner UpComing Batches

Nov-17 - Dec-29

Weekend
SOLD OUT

Timings: 07:00 AM To 10:00 AM (IST)

350.00     Enroll Now

Nov-10 - Dec-22

Weekday
SOLD OUT

Timings: 20:30 PM To 23:30 PM (IST)

350.00     Enroll Now

Nov-23 - Jan-04

Weekend
FILLING FAST

Timings: 07:00 AM To 10:00 AM (IST)

350.00     Enroll Now

Nov-30 - Jan-11

Weekday
FILLING FAST

Timings: 20:30 PM To 23:30 PM (IST)

350.00     Enroll Now

Dec-07 - Jan-18

Weekend

Timings: 07:00 AM To 10:00 AM (IST)

350.00     Enroll Now

Dec-14 - Jan-25

Weekday

Timings: 20:30 PM To 23:30 PM (IST)

350.00     Enroll Now
Be future ready. Start learning
Structure your learning and get a certificate to prove it.
Start Learning

Course Curriculum

AgilePM® Foundation / Practitioner Combined

SELF PACED

ALC offers an outstanding two-module, four-day training program covering the full scope of AgilePM®, the world’s leading framework and certification for agile project management.

  • WEEK 5-6
  • 10 Modules
  • 6 Hours
Self Paced

Topics:
  • Welcome and Administrivia.
  • Course Overview.
  • Review and Revision Techniques.
  • References.
  • Specialised References and Additional Reading.
  • Other Resources.
  • The “CISSP World-View”.
  • The Exam.
  • On the Day of the Exam.
  • Exam Technique.
  • After the Exam.
  • CISSP Concentrations.
  • Blended Learning Follow-up.

Topics:
  • Privacy Requirements(Transborder Data Flows,Data Breaches).
  • Intellectual Property.
  • Computer Ethics and Professional Ethics.
  • Risk Management Concepts.
  • Definitions of Risk.
  • Risk Management Processes (SP800-30, ISO27005).
  • Information Risk Analysis.
  • Audit Frameworks and Methodologies.
  • Countermeasures and Controls(Control Assessment, Testing and Monitoring).
  • Threat Modeling.
  • Business Continuity Requirements.
  • Development of Business Continuity and Disaster Recovery Plans.
  • Security Policies.
  • Standards.
  • Procedures.
  • Guidelines.
  • Personnel Security.
  • Acquisitions Policy and Strategies.
  • Security Education, Awareness and Training.

Topics:
  • Security Engineering Lifecycle.
  • Systems Architecture.
  • Enterprise Security Architecture.
  • Security Models(Mandatory Access Control Models,Discretionary Access Control).
  • Evaluation.
  • Certification and Accreditation.
  • Evaluation Schemes.
  • Security Implementation Guidelines.
  • Frameworks and Standards.
  • Database Security.
  • Vulnerabilities (Architectural Vulnerabilities,Distributed Computing,Remote and Mobile Computing,Process Control and SCADA,Embedded Systems and the Internet of Things).
  • Cryptology(Types of Cryptoprimitives,Classical Cryptography,Symmetric Cryptoprimitives,Unkeyed and Keyed Hashes).
  • Public Key Cryptosystems(Authentication & Digital Signatures,Public Key Infrastructure).
  • Key Management(Advanced Concepts – Quantum computing, etc.,Cryptanalysis and Attacks).
  • Site Planning and Design(Security Survey,Crime Prevention Through Environmental Design).
  • Facility Security(Physical Security Principles,Data Centers, Server Rooms and Wiring Closets,Secure Work Areas).


Topics:
  • Security Audit, Assessment and Testing Concepts(First-Person and Third-Party Audits).
  • Software Security Assessment(Unit Testing).
  • Integration Testing(Regression Testing,Advanced Techniques and Tools – Fuzzers, Model Checkers, Automated Theorem Provers).
  • Systems Security Assessment.
  • Network Security Assessment.
  • Networking Principles(Protocol Layers,ISO/OSI vs TCP/IP).
  • Physical Layer(Local Area Network Protocols,Wide Area Network Protocols).
  • Physical Layer Attacks.
  • Network Layer(IP Addressing and Routing,IP Protocol Operation,ICMP Protocol,Dynamic Routing Protocols,Software Defined Networking,Network Layer Attacks).
  • Transport Layer(Transport Layer Concepts,UDP,TCP,Other Transport Layer Protocols,Transport Layer Attacks)
  • (Application LayerApplication Layer Protocols,Directory Services – BIND, LDAP, etc.,Remote Access and File Transfer,Email,Web – HTTP, VOIP , Instant Messaging and Collaboration).
  • Application Layer Vulnerabilities and Attacks(Network Security Testing and Assurance,Continuous Security Monitoring).


Topics:
  • Information Assets – Identification, Ownership.
  • Data Standards and Policy.
  • Information Classification.
  • Handling Requirements.
  • Data Retention Policy, Destruction and Disposal.


Topics:
  • Networking Principles(Protocol Layers,ISO/OSI vs TCP/IP).
  • Physical Layer(Local Area Network Protocols,Wide Area Network Protocols,Physical Layer Attacks).
  • Network Layer(IP Addressing and Routing,IP Protocol Operation,ICMP Protocol,Dynamic Routing Protocols,Software Defined Networking,Network Layer Attacks).
  • Transport Layer(Transport Layer Concepts,UDP,TCP,Other Transport Layer Protocols,Transport Layer Attacks).
  • Application Layer(Application Layer Protocols,Directory Services – BIND, LDAP, etc.,Remote Access and File Transfer,Email,Web – HTTP, VOIP , Instant Messaging and Collaboration).
  • Application Layer Vulnerabilities and Attacks.
  • Network Security Testing and Assurance.


Topics:
  • Job Engine Architecture.
  • Built-in Jobs.
  • Jobs and Job Management.


Topics:
  • Installing InsightIQ.
  • Using InsightIQ and FSA.
  • ESRS.

Program Syllabus

Curriculum

You can also view the program syllabus by downloading this program Curriculum.

Projects

How will I execute the practicals of Kubernetes certification course?

All the Case Studies and Demos will run on Ubuntu 17.10 VMs. The pre-built VMs and their Installation Guide will be present on LMS once you enroll for the course. Kubernetes is an open-source tool therefore anybody can use it for their lab exercises.

What are the system requirements for this Kubernetes Certification Training?

Hardware Requirement(s): Memory-Minimum 16 GB RAM, processor – Intel Core i5 CPU @2.00 GHz or above, Storage – 250 GB HDD/SDD or above, Software Requirement(s): Operating System – Windows 7 or above, Ubuntu 14 or above, Latest Version of Oracle Virtual Box Installed,Windows PowerShell 4.0 or above (Install Azure Module), Microsoft Azure SDK for .NET v2.9 (prefer latest)

How will I execute the practicals of Kubernetes certification course?

The system requirements include Minimum 4 GB RAM, i3 processor or above, 20 GB HD.

Course Certification

OL Tech Edu’s Certificate Holders work at top 500s of companies like

certificate

Features

Explore step by step paths to get started on your journey to Jobs of Today and Tomorrow.

Instructor-led Sessions

30 Hours of Online Live Instructor-Led Classes.
Weekend Class : 10 sessions of 3 hours each.

Real Life Case Studies

Real-life Case Studies

Live project based on any of the selected use cases, involving implementation of the various real life solutions / services.

Assignments

Assignments

Each class will be followed by practical assignments.

24 x 7 Expert Support

24 x 7 Expert Support

We have 24x7 online support team to resolve all your technical queries, through ticket based tracking system, for the lifetime.

Certification

Certification

Towards the end of the course, OL Tech Edu certifies you for the course you had enrolled for based on the project you submit.

Course FAQ's

Enroll, Learn, Grow, Repeat! Get ready to achieve your learning goals with OL Tech Edu View All Courses

© 2015 - 2024 OL Tech Edu. All Rights Reserved.
Designed, Developed & Powered by MNJ SOFTWARE

The website is best experienced on the following version (or higher) of Chrome 31, Firefox 26, Safari 6 and Internet Explorer 9 browsers