Certified Information System Security Professional (CISSP) CBK Review
Corso
Online
Hai bisogno di un coach per la formazione?
Ti aiuterà a confrontare vari corsi e trovare l'offerta formativa più conveniente.
Descrizione
-
Tipologia
Corso
-
Metodologia
Online
-
Inizio
Scegli data
Un CISSP è un professionista dell'assicurazione delle informazioni che definisce l'architettura, il design, la gestione e / oi controlli che garantiscono la sicurezza degli ambienti aziendali La vasta gamma di conoscenze e l'esperienza che serve per superare l'esame è ciò che distingue un CISSP Le credenziali dimostrano un livello riconosciuto a livello globale di competenza fornito da (ISC) 2® CBK®, che copre argomenti critici nella sicurezza di oggi, inclusi il cloud computing, la sicurezza mobile, la sicurezza dello sviluppo delle applicazioni, la gestione dei rischi e altro ancora Questo corso ti aiuta a rivedere i 10 domini delle pratiche di sicurezza delle informazioni Serve anche come un forte strumento di apprendimento per padroneggiare concetti e argomenti relativi a tutti gli aspetti della sicurezza dei sistemi di informazione obiettivi: Per rivedere i principali argomenti di CISSP CBK (Common Body of Knowledge) Prepararsi per un esame CISSP .
Machine Translated
Sedi e date
Luogo
Inizio del corso
Inizio del corso
Profilo del corso
To attend the CISSP CBK Review you do not need to have the prerequisite experience for the examination. It is available to anyone working in the field of IT and Information Security and aims to give you a thorough understanding of Information Security even if you do not intend to sit the examination.
If you intend to go on to the examination:
CISSP candidates: available to those knowledgeable in key areas of industry concepts but lacking the work experience. As a candidate, you may take the CISSP examination and subscribe to the (ISC)2 Code of Ethics, however to earn the CISSP credential...
Opinioni
Materie
- Security
- Management
- E-business
Programma
Access Control
Security architecture that protects the assets of your systems:
- Concepts, methodologies and techniques
- Effectiveness
- Attacks
Network structures, transmission methods, transport formats and security measures that provide availability, integrity and confidentiality:
- Network architecture and design
- Communication channels
- Network components
- Network attacks
Identifying an organisation’s information assets, and the development, documentation and implementation of policies, standards, procedures and guidelines:
- Security governance and policy
- Information classification and ownership
- Contractual agreements and procurement processes
- Risk management concepts
- Personnel security
- Security education, training and awareness
- Certification and accreditation
The controls found in systems and applications software, and their development:
- Systems Development Life Cycle (SDLC)
- Application environment and security controls
- Effectiveness of application security
The principles, means and methods of disguising information; to ensure its integrity, confidentiality and authenticity:
- Encryption concepts
- Digital signatures
- Cryptanalytic attacks
- Public Key Infrastructure (PKI)
- Information hiding alternatives
The concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks and applications:
- Fundamental concepts of security models
- Capabilities of information systems (e.g. memory protection, virtualization)
- Countermeasure principles
- Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)
Controls over hardware, media and operators with access privileges:
- Resource protection
- Incident response
- Attack prevention and response
- Patch and vulnerability management
How to maintain business in the face of major disruptions:
- Business impact analysis
- Recovery strategy
- Disaster recovery process
- Provide training
Computer crime laws, investigation and how to gather evidence:
- Legal issues
- Investigations
- Forensic procedures
- Compliance requirements/procedures
How to protect your business's resources and sensitive information:
- Site / facility design considerations
- Perimeter security
- Internal security
- Facilities security
Hai bisogno di un coach per la formazione?
Ti aiuterà a confrontare vari corsi e trovare l'offerta formativa più conveniente.
Certified Information System Security Professional (CISSP) CBK Review
