Saturday, February 7, 2009

Certified Information Systems Security Professional (CISSP)

Image

This is the ultimate training package for IT Security. The concepts covered by the CISSP Certification Package were designed to provide a thorough understanding of security issues and how to implement and manage security policies and solutions.
Not only is the CISSP certification one of the most respected certifications available it is currently in great demand by organizations of all types. From banking and financial institutions to government and public utilities as well as high-tech and hospitality, the skills of a CISSP are needed by nearly every industry.

Ten different topics are addressed in regards to the security of information systems: Access Control Systems & Methodology; Telecommunications & Network Security; Security Management Practices; Applications & Systems Development Security; Cryptography; Security Architecture & Models; Operations Security; Business Continuity Planning; Laws, Investigations, & Ethics; and Physical Security.

You not only learn how to develop security policies for a computer network but the training also covers security of physical assets and facilities, ethics, cyber crime and business practices. The training is a great overview of everything security related without getting deep into the technical details.

Authentication, cryptography, public and private keys, wireless security and system attacks are among the many videos available from instructor Emilio Valdez. You’ll enjoy Emilio’s easy going style along with his extensive knowledge of the material. He presents the content with a combination of diagrams, examples and real-world application to provide information that you can put to use immediately.

CD-ROM Contents: CISSP Certification Package

- CISSP Series Intro

Access Control Systems & Methodology
- Access Control Basics
- Advanced Access Control
- Access Control Administration
- Security Models
- Authentication
- Access Control Methods
- Access Attacks
- Penetration Testing

Telecommunications & Network Security
- OSI Model
- Secure Topology
- IP Security
- Remote Access
- Network Security Devices
- Network Security Protocols
- WAN Technologies
- Security Techniques
- Email Security
- Phone Security
- Security Controls
- Web Vulnerabilities
- Physical Media
Security Management Practices
- Security Management Concepts
- Security Policy
- Protection Mechanisms
- Change Control
- Data Classification
- Risk Management
- Wireless Security
- Roles and Responsibilities
- Security Awareness/Mgt
Applications & Systems Development Security
- Database Basics
- Database Concepts
- Data Storage
- Artificial Intelligence
- System Development Lifecycle
- Security Control Architecture
- Computer Design
- Malicious Code Basics
- Malicious Code Advanced
- Web Enhancements
- Application & System Attacks

Cryptography
- Cryptography Basics
- Cryptography Algorithms
- Cryptography Strength
- Key Management
- Message Authentication
- Secret Key
- Public Key
- PKI
- Cryptography Attacks

Security Architecture & Models
- Computer Processing
- Security Architecture Concepts
- Evaluation Criteria
- Security Model Principles
- Trusted Computing Base
- Security Model Threats
Operations Security
- Administrative Management
- Anti-Virus Management
- Sensitive Information Handling
- Control Types
- Machine Types
- Resource Protection
- Auditing
- Audit Trails
- Monitoring
- Intrusion Detection
- Negative Actions
Business Continuity Planning
- Business Continuity
- Information System Backups
- Availability
- Recovery Techniques
- RAID
- Emergency Response

Laws, Investigations, & Ethics
- Types of Laws
- Information Security Laws
- Investigations
- Evidence
- Computer Crime
- Incident Handling
- Ethics

Physical Security
- Facility Requirements
- Environmental Safety
- Physical Threats

(CISSP) is a registered certification mark of the International Information Systems Security Certification Consortium, Inc.

Download

Certified Information Systems Security Professional (CISSP) part01
 
Certified Information Systems Security Professional (CISSP) part02
 
Certified Information Systems Security Professional (CISSP) part03
 
Certified Information Systems Security Professional (CISSP) part04
 
Certified Information Systems Security Professional (CISSP) part05
 
Certified Information Systems Security Professional (CISSP) part06
 
Certified Information Systems Security Professional (CISSP) part07
 
Certified Information Systems Security Professional (CISSP) part08
 
Certified Information Systems Security Professional (CISSP) part09
 
Certified Information Systems Security Professional (CISSP) part10
 
Certified Information Systems Security Professional (CISSP) part11
 
Certified Information Systems Security Professional (CISSP) part12
Password default : booktraining.net

No comments: