Certified Information Systems Security Professional (CISSP)
This course will expand upon your knowledge by ad- dressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK) ® for information systems security professionals.
You will learn security policy development, secure software development procedures, network vulnerabilities, attack types and corresponding countermeasures, cryptography concepts and their uses, disaster recovery plans and procedures, risk analysis, crucial laws and regulations, forensics basics, computer crime investigation procedures, physical security, and more.
COURSE OBJECTIVE
You will control access to data and information systems using common access control best practices. You will discover how networks are designed for security and the components, protocols, and services that allow telecommunications to occur in a secure manner. Next, you will learn about the principles of security management and how to manage risk as part of a comprehensive information security management program. You will explore applications and systems development security controls. Then, you will learn how to perform cryptography and how to secure system architecture.
You will examine operations security and the appropriate controls and best practices to use to keep operations secure. You will learn how to perform business continuity planning and apply physical security to protect organizational assets and resources. Finally, you will explore law, investigations, and ethics with respect to information systems security and computer forensics.
After completing this workshop, students will be able to:
- Information Systems Access Control
- Network systems and
- Define security
- Create application
- Perform
- Secure system
- Execute operations
- Perform business continuity
- Apply physical
- Apply law, investigations, and
Comments
Post a Comment