Course Information

Duration

Minimum of 40 Hours

Exam Time

2 Hours Exam

Course Type

Self Paced / Blended / Classroom

Structure

Curriculum

Day 1

  • Developing Business Process, Process Risks, and Controls Part I - RM00201
  • Developing Business Process, Process Risks, and Controls Part II - BP00101
  • Developing Business Process, Process Risks, and Controls Part III - BP00102

Day 2

  • Developing Business Process, Process Risks, and Controls Part IV - RM00204
  • Vendor Risk Management Awareness Part I -RM00101
  • Vendor Risk Management Framework Development Part II - RM00102

Day 3

  • Sarbanes Oxley Compliance (SOX) Part I - CO01101
  • Sarbanes Oxley Compliance (SOX) Part II - CO01102
  • Information Technology General Controls (ITGC) Part I

Day 4

  • Information Technology General Controls (ITGC) COSO Framework Part II
  • Information Technology General Controls (ITGC) Part III
  • Project Management Part I
  • Project Management Part II

Day 5

  • Code of Conduct Part I
  • Code of Conduct Part II
  • Fraud Management Part I
  • Fraud Management Part II
  • Exam

Course Details

Developing Business Process, Process Risks, and Controls Part I - BP00101


The course includes cybersecurity and privacy knowledge test as users progress through the training. The training is designed to protect and preserve the confidentiality, integrity, and availability of information owned by or in the care of the corporation.


Developing Business Process, Process Risks, and Controls Part II - BP00102


The framework design is the key for organizations to move from their current state to their target state with the ability to identify gaps and prioritize gaps based on risk assessment.


Developing Business Process, Process Risks, and Controls Part III - BP00103


The framework design is the key for organizations to move from their current state to their target state with the ability to identify gaps and prioritize gaps based on risk assessment.


Developing Business Process, Process Risks, and Controls Part IV - RM00204


The course provides in-depth knowledge of risk management concepts and fundamentals. The course improves risk awareness, promotes an open risk culture, and inclusion of risk in the decision-making process.Risk is defined as the potential for loss or damage when a threat exploits a vulnerability.


Vendor Risk Management Awareness Part I -RM00101


The course is designed to educate employees to understand how malware can infect your device, how you can avoid malware, and what action you need to take when you get infected by malware.


Vendor Risk Management Awareness Part II -RM00102


The course is designed to educate employees to understand how malware can infect your device, how you can avoid malware, and what action you need to take when you get infected by malware.


Sarbanes Oxley Compliance (SOX) Part I - CO01101


The course is designed for organizations that need to comply with the regulatory requirements, support phishing awareness campaigns, and educate employees about the impact of social engineering attacks, especially those having exposure to private data, financial data, and highly sensitive and confidential data.


Sarbanes Oxley Compliance (SOX) Part II - CO01102


Access control is an important security issue for businesses of all sizes. From the largest corporations employing specialized security controls to the salesperson on a service call opening their smartphone with a thumbprint, everyone encounters access control at some time during their workday.


Information Technology General Controls (ITGC) Part I


Access control is an important security issue for businesses of all sizes. From the largest corporations employing specialized security controls to the salesperson on a service call opening their smartphone with a thumbprint, everyone encounters access control at some time during their workday.


Information Technology General Controls (ITGC) COSO Framework Part II


Incident management (IM) is a key component of any business resiliency program. The primary focus of IM is to restore normal operations and services as quickly as possible after an unforeseen event.


Information Technology General Controls (ITGC) Part III


This course presents information on how employees can contribute to your organization's security. The course provides a comprehensive review of the knowledge required for understanding workplace security risks and actions that need to be taken by employees.


Project Management Part I


This course presents information on how employees can contribute to your organization's security. The course provides a comprehensive review of the knowledge required for understanding workplace security risks and actions that need to be taken by employees.


Project Management Part II


This course presents information on how employees can contribute to your organization's security. The course provides a comprehensive review of the knowledge required for understanding workplace security risks and actions that need to be taken by employees.


Code of Conduct Part I


This BCP and DR awareness course will provide every employee in the organization with basic knowledge about disasters, risks covered by DR, use cases, challenges, DR plans, etc.


Code of Conduct Part II


Business Process Management (BPM) is a systematic approach to making an organization's processes more efficient and dynamic to meet the business's changing needs.


Fraud Management Part I


Business Process Management (BPM) is a systematic approach to making an organization's processes more efficient and dynamic to meet the business's changing needs.


Fraud Management Part II


Business Process Management (BPM) is a systematic approach to making an organization's processes more efficient and dynamic to meet the business's changing needs.


Exam


You have total 3 attempts for this exam.

A business process is a series of tasks done in a certain way that leads to the desired outcome.

Financial services are consistently the target of threats and attacks. Finance professionals need fundamental cybersecurity training to better protect and defend client data. As more transactions occur through mobile applications and virtual banks, security is critical to sustaining a client’s overall positive user experience and, most importantly, trust.

Training business executives, compliance and audit professionals, branch managers, tellers, and all others on fundamental cybersecurity controls as it applies to their position can help better preserve confidentiality and maintain the integrity of client data.

Clients and organizations are at greater risk for IT and cybersecurity breaches during the COVID-19 pandemic. Therefore, an effective cybersecurity risk management strategy is essential for business operations in the current environment and for future preparedness. This course covers fundamental cybersecurity concepts and skills relevant to the day-to-day responsibilities of a variety of finance professionals.

Business Process Management (BPM) is a systematic approach to making an organization's processes more efficient and dynamic to meet the business's changing needs. Business process improvement is a strategic planning initiative to make the process more meaningful and efficient and contribute to overall business growth. The courses in this series of Business Process Management are focused on: Business Process Standards, Risk, and Controls.

Your employees may be the first to identify a potential breach, so they must have adequate knowledge regarding how they should handle such a scenario. Your employees must also understand what steps they should take if they suspect a breach has occurred. The advanced course trains employees on the next steps instead of panicking.

This BCP and DR awareness course will provide every employee in the organization about basic knowledge about disasters, risks covered by DR, use cases, challenges, DR Plan, etc. The course is essential for the corporations and organizations that must meet various mandates regarding privacy, confidentiality, and availability of systems and data.

In addition to developing foundational knowledge, you’ll explore some of the most pressing ethical issues today’s cybersecurity professionals face. You’ll learn how to incorporate guiding ethical principles to make not only sound decisions but also create comprehensive risk reduction strategies.

The courses in this series of Business Process Management are focused on: Business Process Standards, Risk, and Controls.

  • The three certification program series provide the highest level of knowledge and certification in cybersecurity, regulations, and GRC.
  • Ideal for working professionals, our program is designed to fit your schedule. We offer flexible options to take classes in a self-paced environment, online/virtual, in person, or through a combination of both—so you don’t have to interrupt your career to earn your certificate. Our students bring a wide range of academic and professional backgrounds, including law, operations, security, finance, IT, and government.
  • Gain hands-on practice developing and executing strategies, policies, and safeguards to manage cybersecurity risks across an enterprise.
  • Our curriculum emphasizes the competencies and functions needed to address today’s increasingly complex cyber threats.
  • The learning begins with understanding the business process, business process lifecycle, and study of essential attributes of an ideal business process. Thorough knowledge of business process best practices, self-assessment, process mapping, SIPOC diagram, process types, and RACI matrix is essential for process control and risk management. You will study the three lines of defense and the roles and responsibilities associated with each line of defense.
  • The course learnings include knowledge about the basic steps for risk management, enterprise risk management components, causes for the failure of enterprise risk management framework, risk management policy, and many more.
  • This interactive training course will ensure that professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test.
  • The series BCP/DR helps you understand a variety of topics in BCP and DR, such as introduction to DR, the concept of disasters, introduction to BCP, DR processing plans, risk management techniques, facility protection during the DR period, data/system recovery, incident response and public service effect in a DR plan, disaster communication, etc. The program explains the backup and recovery strategy development considerations, best practices for backup, different methods of backup, recovery methods, etc. The course includes knowledge questions as users progress through the training and final test.
By the time you graduate, you can expect to be able to:

  • The employees will learn key concepts of Incident management, problem management, breach management, and understand different terminologies.
  • Learn to differentiate event, alert, incident, and breach.
  • Enhance your understanding of the incident management process. Learn to identify incidents, critical success factors, and key performance indicators specific to IM.
  • You will also learn about drivers/inputs that trigger the problem management process.
  • Learn the process of breach communication internal to the organization and very importantly communicating with outsiders.
  • Learn about legal responsibilities, applicable laws, and data breach response plan.
  • Learn the Federal and State laws that require timely breach communication.
  • Learn to create effective breach response, document policy, plan and procedure.
  • The advanced course trains candidates on the next steps instead of panicking. You will have better understanding of your roles, and do’s and don’ts once the breach occurs.
  • The course will train you on establishing problem management process roles and responsibilities, step by step approach in implementing key processes, defining process inputs/outputs, and reporting.

Various Job Oppoortunites are :


  • Compliance Analysts
    (Tier I and Tier II)
  • Consultant (Junior/Senior/
    Manager) for Big 4
  • Risk Analyst
  • Cybersecurity Analyst with Multinationals
  • Entry-level cybersecurity professionals
  • Anyone who wants to become a Compliance Specialist
  • Cybersecurity Specialist
  • Information Security Manager
  • Information Security Director
  • Information Systems Security Officer
  • Information Security Consultant
  • Information Security Analyst
  • Privacy Officer
  • SOX Internal Auditor or Analyst
  • Auditor and Assessors (Big 4 & Multinationals)
  • IT Analyst
  • Compliance Officer
  • Compliance Auditor
  • Information Technology Manager
  • Privacy and Security Consultant
  • Systems Security Analyst
  • Systems Analyst/Managers
  • Computer System Engineer
  • Architect
  • Cybersecurity Operations Specialist

Eligibility :

User must complete the Foundation certificate before registering for Professional certification.

Take Exam

The candidate is eligible for CSC Council exam if he meets the Eligibility criteria listed below :

  • Applicants who do not attend training must prove 1 year of work experience in the compliance area
  • Applicants who are instructors, trainers, and PhDs shall also be eligible if they meet the above criteria.
  • On the application, there is a section for the applicant to list a boss, supervisor, or department lead who will act as their verifier.
  • If further information is requested from the applicant after the application is submitted and 90 days pass with no response from the applicant, the application will be automatically rejected, and a new form will have to be submitted.
  • If application is not approved, the application fee of USD 100 will not be refunded.
  • If the application is approved, then candidate must take exam in 15 working days

Apply Now

CSC – Certificate in Business Process Controls & SOX Compliance (CCBS)

Business Process Controls & SOX Compliance (CCBS)

Business Process Management (BPM) is a systematic approach to making an organization's processes more efficient and dynamic to meet the business's changing needs. Business process improvement is a strategic planning initiative to make the process more meaningful and efficient and contribute to overall business growth.

Material of CCBS

A business process is a series of tasks done in a certain way that leads to the desired outcome. The courses in this series of Business Process Management are focused on: Business Process Standards, Risk, and Controls.

Your employees may be the first to identify a potential breach, so they must have adequate knowledge regarding how they should handle such a scenario. Your employees must also understand what steps they should take if they suspect a breach has occurred. The advanced course trains employees on the next steps instead of panicking.

Price of the Course CCBS

Price: $ 750.00

Training business executives, compliance and audit professionals, branch managers, tellers, and all others on fundamental cybersecurity controls as it applies to their position can help better preserve confidentiality and maintain the integrity of client data.

CCBS Course Details

This BCP and DR awareness course will provide every employee in the organization about basic knowledge about disasters, risks covered by DR, use cases, challenges, DR Plan, etc.

This BCP and DR awareness course will provide every employee in the organization about basic knowledge about disasters, risks covered by DR, use cases, challenges, DR Plan, etc. The course is essential for the corporations and organizations that must meet various mandates regarding privacy, confidentiality, and availability of systems and data.

CSC – Certificate in Business Process Controls & SOX Compliance (CCBS)

Business Process Controls & SOX Compliance (CCBS)

Business Process Management (BPM) is a systematic approach to making an organization's processes more efficient and dynamic to meet the business's changing needs. Business process improvement is a strategic planning initiative to make the process more meaningful and efficient and contribute to overall business growth.

Material of CCBS

A business process is a series of tasks done in a certain way that leads to the desired outcome. The courses in this series of Business Process Management are focused on: Business Process Standards, Risk, and Controls.

Your employees may be the first to identify a potential breach, so they must have adequate knowledge regarding how they should handle such a scenario. Your employees must also understand what steps they should take if they suspect a breach has occurred. The advanced course trains employees on the next steps instead of panicking.

Price of the Blended Course CCBS

Price: $ 900.00


Training business executives, compliance and audit professionals, branch managers, tellers, and all others on fundamental cybersecurity controls as it applies to their position can help better preserve confidentiality and maintain the integrity of client data.

CCBS Course Details

This BCP and DR awareness course will provide every employee in the organization about basic knowledge about disasters, risks covered by DR, use cases, challenges, DR Plan, etc.

The course is essential for the corporations and organizations that must meet various mandates regarding privacy, confidentiality, and availability of systems and data.


Contact Us for Classroom Course Schedule

Disclaimer

CSC-Council reserves the right to impose additional restriction to comply with the policy.

Failure to act in accordance with this clause shall render the authorized training center in violation of their agreement with EC-Council.

CSC-Council reserves the right to revoke the certification of any person in breach of this requirement.