Convertibles are hybrid securities that typically pay a fixed coupon but can also be converted into the common stock of the issuer. This tutorial provides a broad overview of the key features and cost-benefits of convertible bonds and their main-sub-types, and outlines the main mathematical terminology used with such instruments.
The global financial crisis focused attention on risks beyond 'simple' measures of credit exposure. Among many other issues, the crisis highlighted the problem of counterparty credit risk (CCR) when the demise of an institution causes losses in financial instruments where the credit of the counterparty is not referenced directly. In particular, the linkages between derivatives counterparties and the associated credit risks were at the root of concerns over the collapse of Lehman Brothers and the bailout of AIG. This tutorial analyzes how CCR is generated within financial markets and shows how the scale of exposure can be initially assessed.
Credit derivatives allow one party to transfer an asset's credit risk to another party without transferring ownership of the underlying asset. This tutorial outlines the basics of credit derivatives and examines the structure of a basic credit derivatives trade, known as a credit default swap (CDS). Other topics covered include the development of the market pre- and post-financial crisis, and the risks associated with undertaking credit derivatives transactions.
The “Ktrends in Defense & National Security” is intended to provide our professionals with a timely and relevant trends deck on kdynamics, emerging themes and potential disruptors in the space.
Discover key Advanced Persistent Threat concepts such as defenses and best practices. Explore the common APT attacks and mitigation techniques that can be used, APT tools, and how to create effective APT checklists.
Discover key DevOps concepts such as continuous security and security monitoring, benefits of using DevOps and best practices of DevOps security. Explore the secure DevOps lifecycle and learn about security risks and the various tools used for DevOps testing.
Discover the key concepts of different security topologies. Explore their advantages and disadvantages, techniques, integration with cloud, and layers of cloud security.
Explore various honeypot concepts, such as the types of honeypots, roles and uses of a honeypot, and how honeypot data analysis is used. Examine the strengths and weaknesses of a honeypot and how its placed in networks.
Discover the key NAC (Network Access Control) concepts such as NAC features, the importance of NAC in a network, various NAC elements, authentication, and its implementation. Explore the risks and challenges associated with BYOD and IoT.
Explorer the key pen testing concepts such as vulnerability assessment, types of pen testing, and threat actors. Discover why pen testing is needed and the tools used for pen testing.
Explore the key concepts of common protocols in use, and discover the security issues of TCP/IP model and security protocols.
Discover the importance of implementing security governance in an organization. Explore the differences between governance and management, types of governance frameworks, and the roles of senior management. Ensuring good IT security governance, risks and opportunities, security governance programs, and governance framework structure is also covered.
Learn how your company can protect its information and get certified to ISO/IEC 27001
What you'll learn:
Understand the requirements of ISO/IEC 27001 and the information security controls
Participate in information security audits
Understand information security principles and concepts
Have a solid knowledge of the requirements for information security controls required by ISO/IEC 27001
Understand what is required for an organization to obtain ISO/IEC 27001 certification
Participate in the implementation of an Information Security Management Systems
Innovation creates new opportunities, but also creates new risk. This course discusses how innovation is needed for financial service firms to keep pace with change. The course also discuss how innovation introduces new risks and vulnerabilities into the threat landscape.
A basic guide to staying safe online and to introduce new knowledge to people about internet security and privacy.
Making Next Gen Information Security Leaders
Today most of us begin and end our day in the complex cyber world, which is why it has become more of a necessity than extravaganza to ensure the protection of information and its related assets. As much as for us it is equally important or may be more for an organization on its information assets security assurance−and so is the increasing necessity of information security leaders. This is where the importance of CISSP appears. A CISSP has the breadth and depth of the necessary expertise to establish holistic security programs that declare the protection of organizations’ information assets.
Who this course is for:
•The training is ideal for those working in positions such as, but not limited to: • Security Consultant • Security Manager • IT Director/Manager • Security Auditor • Security Architect • Security Analyst • Security Systems Engineer • Chief Information Security Officer • Director of Security • Network Architect