An increasing number of Corporations & Government entities are demanding experienced information security professionals with the certifications and skills to protect their information and assets.This 5 day class offers a job-related approach to the security process, while providing the basic skills required to prepare for CISSP certification exam for security professionals.
The CISSP certification program is targeted at professionals with at least four years of experience in two domains and a college degree, or five years’ experience in two domains without a college degree.
• CISSP certification is beneficial to IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.
• To qualify for the CISSP designation, a candidate must pass the CISSP exam (administered separately) and have four years’ experience in two or more of the 10 domains.
• Competently identify and handle security threats
• Gain credentials as a leading security professional for current and future employment
• Thoroughly understand the 10 essential core domains of the common body of knowledge
• You must have a minimum of five years of direct full-time security work experience in two or more of the 10 domains or four years of direct full-time security work experience in two or more of the 10 domains.
I. Access Control
1. Concepts, terms of subjects and objects, implementation of authentication techniques
II. Application Security
1. Security and controls of the systems development process, life cycle, application controls, change controls, data warehousing, data mining, knowledge-based systems, program interfaces, and concepts used to ensure data and application integrity, security, and availability
III. Business Continuity and Disaster Recovery Planning
1. Preservation of the business in the face of major disruptions to normal business operations
1. Business and security requirements for cryptography, principles of certificates and key management, secure protocols
V. Information Security and Risk Management
1. Identification of an organization’s information assets and the development, documentation, and implementation of policies, standards, procedures and guidelines that ensure confidentiality, integrity, and availability
VI. Legal, Regulations, Compliance and Investigations
1. Computer crime laws and regulations, the investigative measures and techniques which can be used to determine if a crime has been committed, methods to gather evidence if it has, as well as the ethical issues and code of conduct for the security professional
VII. Operations Security
1. Identify the controls over hardware, media, and the operators with access privileges to any of these resources
VIII. Physical (Environmental) Security
1. Threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information
IX. Security Architecture and Design
1. Concepts, principles, structures, and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability
X. Telecommunications and Network Security
1. Structures, transmission methods, transport formats, and security measures used to provide integrity, availability, authentication, and confidentiality for transmissions over private and public communications networks and media
To Hire an AMS CISSP Security Subject Matter Expert Consultant and Instructor who also teaches this class, call 800-798-3901 today!