1423 East 29th Street,
Tacoma, Washington 98404





Course Description
Welcome to Certified Information Systems Security Professional (CISSP): Second Edition. With your engagement in information technology, you are firmly grounded in the knowledge requirements of todays security professional. This course will expand upon your knowledge by addressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals. The course offers a job-related approach to the security process, while providing the basic skills required to prepare for CISSP certification.
Course Objective: You will analyze a wide range of information systems security subjects that are organized into 10 domains for CISSP exam certification. Target Student: This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all 10 CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in one or more fields related to the 10 CBK security domains, or a college degree and four years of experience.Prerequisites: Computer background.Delivery Method: Instructor led, group-paced, classroom-delivery learning model with structured hands-on activities.
Performance-Based Objectives
Upon successful completion of this course, students will be able to:
analyze information systems access control. analyze security architecture and design. analyze network security systems and telecommunications. analyze information security management goals. analyze information security classification and program development. analyze risk management criteria and ethical codes of conduct. analyze application security. analyze cryptography characteristics and elements. analyze physical security. analyze operations security. apply business continuity and disaster recovery plans. identify legal issues, regulations, compliance standards, and investigation practices relating to IS.
Course Content
Lesson 1: Information Systems Access ControlTopic 1A: Data Access PrinciplesTopic 1B: System Access and AuthenticationTopic 1C: Penetration TestsLesson 2: Security Architecture and DesignTopic 2A: Security ModelsTopic 2B: Security ModesTopic 2C: System AssuranceLesson 3: Network and Telecommunications SecurityTopic 3A: Data Network DesignTopic 3B: Remote Data AccessTopic 3C: Data Network SecurityTopic 3D: Data Network ManagementLesson 4: Information Security Management GoalsTopic 4A: Organizational SecurityTopic 4B: The Application of Security Concepts Lesson 5: Information Security Classification and Program DevelopmentTopic 5A: Information ClassificationTopic 5B: Security Program Development Lesson 6: Risk Management and EthicsTopic 6A: Risk Management Topic 6B: EthicsLesson 7: Application SecurityTopic 7A: Software Configuration ManagementTopic 7B: Software ControlsTopic 7C: Database System SecurityLesson 8: CryptographyTopic 8A: Ciphers and CryptographyTopic 8B: Symmetric-Key CryptographyTopic 8C: Asymmetric-Key Cryptography Topic 8D: Hashing and Message DigestsTopic 8E: Email, Internet, and Wireless SecurityTopic 8F: Cryptographic WeaknessesLesson 9: Physical SecurityTopic 9A: Physical Access ControlTopic 9B: Physical Access MonitoringTopic 9C: Physical Security MethodsTopic 9D: Facilities SecurityLesson 10: Operations SecurityTopic 10A: Operations Security ControlTopic 10B: Operations Security Auditing and MonitoringTopic 10C: Operational Threats and ViolationsLesson 11: Business Continuity and Disaster Recovery PlanningTopic 11A: Business Continuity Plan FundamentalsTopic 11B: Business Continuity Plan ImplementationTopic 11C: Disaster Recovery Plan FundamentalsTopic 11D: Disaster Recovery Plan ImplementationLesson 12: Legal, Regulations, Compliance, and InvestigationsTopic 12A: Computer Crime Laws and RegulationsTopic 12B: Computer Crime Incident ResponseAppendix A: Mapping CISSP Course Content to the (ISC)2 CISSP Exam Objectives

Organized by InCryptra Security

Normal
0
false
false
false
EN-US
X-NONE
X-NONE
MicrosoftInternetExplorer4




Utilizing our expert knowledge of information systems security - InCryptra
security engages government organizations,academic institutions, business
and industry to advance the knowledge and use of information systems security
features.
In an Internet enabled global economy
our goal is to deliver internationally recognized education and training
regarding best practices in security protection.
InCryptra Security leverages the
collective strengths of its partners to advance the practice of security
management at the organization level.
InCryptra Security promotes public
awareness, policies, and professional development by uniting the expertise of
the full spectrum of IT security profiles. These include the technologies &
appliances, business application services, and the management practices
necessary for maintaining a comprehensive security posture in today's open
computing environments.
For additional information about
InCryptra Security or to attend an upcoming training seminar, contact InCryptra
Security at: (253) 848-2608; www.incryptra.com; email:
[email protected].




Ticket Info:  CISSP Seminar - 50% OFF, $684.95

Official Website: http://incryptrasecuritycissp2-upcoming.eventbrite.com

Added by eventbrite-events on March 17, 2009

Interested 1