{"id":26866,"date":"2020-04-27T06:58:22","date_gmt":"2020-04-27T06:58:22","guid":{"rendered":"https:\/\/sysprove.com\/ar\/?page_id=26866"},"modified":"2020-06-25T09:14:42","modified_gmt":"2020-06-25T09:14:42","slug":"sabsa-training","status":"publish","type":"page","link":"https:\/\/sysprove.com\/ar\/strategic-it-training\/sabsa-training\/","title":{"rendered":"\u0627\u0644\u062a\u062f\u0631\u064a\u0628 \u0639\u0644\u0649 SABSA\u00ae"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;notice-section&#8221;][vc_column]<div class=\"gem-icon-with-text gem-icon-with-text-icon-size-medium\"><div style=\"margin-bottom:0px;padding-left: 20pxpx;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-medium  gem-icon-shape-square gem-simple-icon\" style=\"opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: #0082a1;\"><span class=\"back-angle\">&#xf244;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #0082a1;\"><span class=\"back-angle\">&#xf244;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\">[vc_column_text css_animation=&#8221;bottom-to-top&#8221;]<\/p>\n<p style=\"text-align: right;\"><strong>\u0646\u0638\u0631\u064b\u0627 \u0644\u0644\u0645\u0635\u0637\u0644\u062d\u0627\u062a \u0627\u0644\u062a\u0642\u0646\u064a\u0651\u0629 \u0648\u0627\u0644\u062a\u062c\u0627\u0631\u064a\u0651\u0629 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u0629 \u0641\u064a \u0648\u0635\u0641 \u0647\u0630\u0647 \u0627\u0644\u062e\u062f\u0645\u0629 \u0648\u0627\u0633\u062a\u062e\u062f\u0627\u0645\u0647\u0627 \u0627\u0644\u0639\u0645\u0644\u064a\u0651\u060c \u062a\u0645\u0651 \u0639\u0631\u0636 \u0647\u0630\u0647 \u0627\u0644\u0635\u0641\u062d\u0629 \u0628\u0627\u0644\u0651\u0644\u063a\u0629 \u0627\u0644\u0625\u0646\u062c\u0644\u064a\u0632\u064a\u0651\u0629\u060c <a href=\"https:\/\/sysprove.com\/ar\/contact-us\/\">\u062a\u0648\u0627\u0635\u0644 \u0645\u0639\u0646\u0627<\/a> \u00a0\u0625\u0646 \u0623\u0631\u062f\u062a \u0627\u0644\u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u0634\u0631\u062d \u0628\u0627\u0644\u0651\u0644\u063a\u0629 \u0627\u0644\u0639\u0631\u0628\u064a\u0651\u0629 \u0648\u0633\u062a\u0643\u0648\u0646 \u0645\u0633\u0627\u0639\u062f\u062a\u0643 \u0645\u0646 \u062f\u0648\u0627\u0639 \u0633\u0631\u0648\u0631\u0646\u0627.<\/strong><\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div>[\/vc_column][\/vc_row][vc_section full_width=&#8221;stretch_row&#8221; el_class=&#8221;english-text&#8221;][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_column_text]<\/p>\n<div class=\"container\">\n<div class=\"page-title-title\">\n<h3 style=\"text-align: center;\">SABSA\u00ae TRAINING<\/h3>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_column_text]SABSA\u00ae is a proven methodology for developing business-driven, risk and opportunity focused Security Architectures at both enterprise and solutions level that traceably support business objectives. A key objective of holding the course is to provide the community of professionals the opportunity and access to the well-known Information Security Architecture Framework SABSA\u00ae.[\/vc_column_text][vc_empty_space height=&#8221;4.25rem&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26871&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-light silver-filter&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text]<b class=\"blueish\">SABSA\u00ae is the leading open-use method<\/b> for delivering cohesive information security solutions to enterprises. The SABSA\u00ae Framework ensures that the security needs of your organisation are met completely and are designed, delivered and supported as an integral part of an IT management infrastructure.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26450&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-light silver-filter&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text]<b class=\"blueish\">Sysprove is a partner of the SABSA\u00ae Institute<\/b> and provides SABSA\u00ae Foundational Training within Bahrain.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26756&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-light silver-filter&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text]<b class=\"blueish\">The SABSA\u00ae Foundation Modules<\/b> (F1 &amp; F2) are The SABSA Institute\u2019s official starting point for developing Security Architecture competencies. They are designed to create a broad spectrum of knowledge and understanding of the SABSA\u00ae method, its frameworks, concepts, models and techniques.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;2rem&#8221;][vc_column_text css=&#8221;.vc_custom_1587971104963{margin-bottom: 0px !important;padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8221;]<\/p>\n<h6><span style=\"color: #77787b;\">About the course:<\/span><\/h6>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1588757635400{margin-bottom: 0px !important;padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8221;]<b class=\"blueish\">The SABSA\u00ae Foundation training<\/b> is held over a period of five (5) days, where the exams are held during the last day of the training. The training is held by experienced and competent trainers that hold the SABSA Masters Level, and that have applied SABSA\u00ae to well-known organisations across Europe and the Middle East. All trainers hold 25+ years of experience in the fields of IT and Information Security.[\/vc_column_text]<div class=\"clearboth\"><\/div><div class=\"gem-divider \" style=\"margin-top: 40px;\"><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1590582187657{background-color: #efefef !important;}&#8221; el_class=&#8221;english-text&#8221;][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_id=&#8221;includes&#8221;][vc_column offset=&#8221;vc_col-lg-8 vc_col-md-12 vc_col-xs-12&#8243;][vc_empty_space height=&#8221;2rem&#8221;][vc_column_text css=&#8221;.vc_custom_1587971175641{margin-bottom: 0px !important;padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8221;]<\/p>\n<h6><span style=\"color: #77787b;\">Key topics covered<\/span><\/h6>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;2rem&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26879&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css=&#8221;.vc_custom_1587971191780{margin-bottom: 0px !important;}&#8221; el_class=&#8221;double-lines&#8221;]<b class=\"blueish\">Principles of Security Architecture<\/b>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#cecece&#8221; el_class=&#8221;fix-width mts-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26542&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css=&#8221;.vc_custom_1587971274808{margin-bottom: 0px !important;}&#8221; el_class=&#8221;double-lines&#8221;]<b class=\"blueish\">Policy Architecture Framework<\/b>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#cecece&#8221; el_class=&#8221;fix-width mts-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26880&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css=&#8221;.vc_custom_1587971326048{margin-bottom: 0px !important;}&#8221; el_class=&#8221;double-lines&#8221;]<b class=\"blueish\">Risk &amp; Opportunity Modelling<\/b>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#cecece&#8221; el_class=&#8221;fix-width mts-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26647&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css=&#8221;.vc_custom_1587971343661{margin-bottom: 0px !important;}&#8221; el_class=&#8221;double-lines&#8221;]<b class=\"blueish\">Security Domain Concepts<\/b>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#cecece&#8221; el_class=&#8221;fix-width mts-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26882&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css=&#8221;.vc_custom_1587971382433{margin-bottom: 0px !important;}&#8221; el_class=&#8221;double-lines&#8221;]<b class=\"blueish\">SABSA Governance Framework<\/b>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#cecece&#8221; el_class=&#8221;fix-width mts-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26885&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css=&#8221;.vc_custom_1587971430752{margin-bottom: 0px !important;}&#8221; el_class=&#8221;double-lines&#8221;]<b class=\"blueish\">Entity &amp; Trust Modelling<\/b>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#cecece&#8221; el_class=&#8221;fix-width mts-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;25542&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css=&#8221;.vc_custom_1587971508326{margin-bottom: 0px !important;}&#8221; el_class=&#8221;double-lines&#8221;]<b class=\"blueish\">Information Security &amp; Data Security Architectures<\/b>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#cecece&#8221; el_class=&#8221;fix-width mts-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mb-0&#8243;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;25548&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css=&#8221;.vc_custom_1587971541987{margin-bottom: 0px !important;}&#8221; el_class=&#8221;double-lines&#8221;]<b class=\"blueish\">And other related topics<\/b>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;4.8rem&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-md vc_hidden-sm vc_hidden-xs&#8221;][vc_single_image image=&#8221;26889&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_border&#8221; css_animation=&#8221;fadeInRight&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1590582235815{padding-top: 0px !important;}&#8221; el_class=&#8221;english-text&#8221;][vc_row][vc_column][vc_empty_space height=&#8221;5.5rem&#8221;][vc_column_text css=&#8221;.vc_custom_1587971596234{margin-bottom: 0px !important;padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8221;]<\/p>\n<h6><span style=\"color: #77787b;\">Who should attend?<\/span><\/h6>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;2rem&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul class=\"custom-ul\">\n<li>Security Architects<\/li>\n<li>Security Analysts<\/li>\n<li>Security Professionals Business Managers &amp; Strategists<\/li>\n<li>Enterprise Architects Business Architects<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul class=\"custom-ul\">\n<li>Solutions Architects<\/li>\n<li>CIO \/ CISO \/ CRO \/ CIRO<\/li>\n<li>System Developers \/ Engineers<\/li>\n<li>Security Operations Professionals<\/li>\n<li>Risk Management Professionals<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul class=\"custom-ul\">\n<li>Audit, Compliance &amp; Governance Professionals<\/li>\n<li>Business Analysts<\/li>\n<li>Service Management Professionals<\/li>\n<li>Any Individual interested in Information Security &amp; Risk Management<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;4.25rem&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1590582277235{padding-top: 0px !important;background-color: #efefef !important;}&#8221; el_class=&#8221;english-text&#8221;][vc_row][vc_column][vc_empty_space height=&#8221;5.5rem&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221;][vc_column_inner el_class=&#8221;fix-width mb-4 mb-md-0 mb-sm-0&#8243; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;26912&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;circle-icon img-width-sm bg-3d silver-filter&#8221; css=&#8221;.vc_custom_1587973472717{margin-bottom: 0px !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;10\/12&#8243;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1587971733997{margin-bottom: 0px !important;}&#8221;]For more information about <b class=\"blueish\">SABSA\u00ae training<\/b> please contact <a href=\"mailto:info@sysprove.com\" target=\"_blank\" rel=\"noopener noreferrer\">info@sysprove.com<\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;4.25rem&#8221;][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;notice-section&#8221;][vc_column][\/vc_column][\/vc_row][vc_section full_width=&#8221;stretch_row&#8221; el_class=&#8221;english-text&#8221;][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_column_text] SABSA\u00ae TRAINING [\/vc_column_text][vc_column_text]SABSA\u00ae is a proven methodology for developing business-driven, risk and opportunity focused&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":26646,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/pages\/26866"}],"collection":[{"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/comments?post=26866"}],"version-history":[{"count":0,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/pages\/26866\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/pages\/26646"}],"wp:attachment":[{"href":"https:\/\/sysprove.com\/ar\/wp-json\/wp\/v2\/media?parent=26866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}