CISSP Course – For The Security ProfessionalRich
CED Solutions is an Official Partner of (ISC)² and offers the exam onsite immediately after the instruction. Register and attend this course here.
The Certified Information System Security Professional (CISSP) course is designed for Information Systems Security professionals who elect to take this training course to hone their knowledge and skills related to Information Systems Security and/or to prepare for the (ISC)² CISSP exam. This 5-day program is comprised of a total of 10 domains. The modular format is designed to organize and chunk information in order to assist with learning retention as participants are guided through the CISSP course materials. Each module/domain includes one or more of the following design approaches to ensure learning reviews and activities to support knowledge:
- Presentation. The facilitator will explain content to participants using PowerPoint to guide the presentation. Multiple examples will be used to clarify points.
- Short Lecture/Discussion. The facilitator will engage participants in conversation by asking questions and encouraging them to respond. Participants will be encouraged to provide examples from their experience.
- Group Activity. Participants work in small teams of three or four. The facilitator will debrief the entire class at the end of the activity.
- Individual Activity. Individuals work on their own to complete an action plan, worksheet, or evaluation.
After completing this workshop, participants will be able to:
- Identify key purpose, benefits, and process of information classification and how it is used to determine Access Control policies and identifying the process for assessing the effectiveness of implemented controls.
- Provide the basic understanding of Telecommunication and Network Security concepts, required components for minimizing security risks, securing channels of communication, and techniques for preventing and detecting network-based attacks.
- Define and apply the Information Security Governance and Risk Management framework including the policies, concepts, principles, structures and standards that are established for the protection of information assets, and how to assess the effectiveness of that protection.
- Explain the details of Software Development Security, including the activities and processes pertaining to the planning, programming, and management of software and systems that manage software including ways to secure applications through design and control interfaces, and assess the usefulness of their application security.
- Identify the concepts within Cryptography, including the terms and application of public and private algorithms, distribution management, methods of attack, and the application, development, and use of digital signatures for authenticity and electronic transactions, and nonrepudiation processes.
- Identify the Security Architecture and Design concepts focusing on the architecture of security systems that provide for the availability, integrity, and confidentiality of organizational assets. Learners will address concepts, principles, structures, frameworks, and standards used in the design and implementation of security requirements of individual components, and enterprise wide systems.
- Identify the key terms and processes of Security Operations and how to protect and control information processing assets in a centralized or distributed environment through the daily tasks required to keep security services operating reliably and efficiently.
- Identify and apply the Business Continuity and Disaster Recovery Planning requirements necessary to develop the preparation, processes, and practices necessary to ensure the preservation of the business in case of major disruptions to normal business operations including the project scope and planning, how to conduct a business impact analysis, identify recovery strategies, develop the recovery plan and implement it.
- Define and explain the Legal, Regulations, Investigations, and Compliance concepts of and internationally accepted methods, processes, and procedures used in computer crime legislation and regulations specific to the investigative measures and techniques used to identify the occurrence of an incidence, and the gathering, analysis, and management of evidence.
- Define and apply the requirements necessary for the overall Physical (Environmental) Security processes for the evaluation of physical, environmental, and procedural risks that might be present in a facility, organization, or structure where information systems are stored and managed.
CED Solutions provides training and certification for MCSD: SharePoint 2013 Applications Developer; MCSE: SharePoint 2013; Cisco CCNA; Cisco CCNP; Cisco CCNA Security; Cisco CCNP Security; Cisco CCNA Voice; Cisco CCNP Voice; Microsoft MCSA: Windows 2012 Server; MCSA: Windows 2008 Server; MCSA: SQL 2012 Server; MCSE: Business Intelligence SQL 2012 Server; MCSE: Data Platform SQL 2012 Server; MCSE: Desktop Infrastructure Windows 2012 Server; MCSE: Server Infrastructure Windows 2012 Server; MCPD: 6 Cert Visual Studio Developer; MCSD: Windows Store Apps C#; MCSD: Windows Store Apps HTML5; IT Healthcare Technician and many more.
CED Solutions, LLC, www.cedsolutions.com, firstname.lastname@example.org, (800) 611-1840