CISSP (Part 2): Defining Security Management


Description:

Welcome to Defining Security Management. With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today's security professional. This course will expand upon your knowledge by addressing some of the essential elements that comprise a Common Body of Knowledge (CBK) for information system security professionals. This course offers a job-related approach to the security process, while providing a set of basic skills required to prepare for CISSP certification.Students pursuing CISSP training want to establish themselves as credible computer security professionals through a study of all 10 CISSP Common Body of Knowledge™ domains. In order to obtain this goal, students must be able to understand the basics of security management, as well as applications security. Validating this knowledge assists in meeting the goal of certification. Through this course on Defining Security Management, students gain the required knowledge critical in obtaining CISSP certification.

This course carries the following professional education credits: 0.3 CEUs. For more information on accreditation bodies, please visit www.elementk.com/products/certification-and-accreditation.

Objectives:

  • In this course, you will control access to data and information systems using common access control best practices. You will discover how networks are designed for security, and the components, protocols, and services that allow telecommunications to occur in a secure manner. Next, you will learn about the principles of security management and how to manage risk as part of a comprehensive information security management program. You will explore applications and systems development security controls. Next, you will learn how to perform cryptography and how to secure system architecture. You will examine operations security and the appropriate controls and best practices to use to keep operations secure. You will learn how to perform business continuity planning and apply physical security to protect organizational assets and resources. Finally, you will explore law, investigations, and ethics with respect to information systems security and computer forensics.

Hardware and Software Required:

  • Browser Microsoft Internet Explorer 7 (or higher)
  • Browser Mozilla Firefox 2 (or higher)
  • Browser Apple Safari 2 (or higher)
  • Operating System Microsoft Windows 2000, XP, Vista, or Windows 7
  • Operating System Apple Mac OS X 10.4 (or higher)
  • Processor Pentium III 1 GHz (or better)
  • Processor Macintosh Intel-based or PowerPC G4 (or better)
  • RAM 512 MB (1 GB or more recommended)
  • Internet connection 256K (broadband recommended)
  • Adobe Flash Player 8 (current version recommended)
  • Adobe Reader 7 (or higher)
  • Other requirements may apply to supplemental offline activities. Omitting these optional activities does not affect course completion.

 




User Reviews

Not yet rated. You will need to follow this course before you can write a review.

Course Info

  • Code: EL-CISSP 2
  • Duration: 3 hours 15 minutes
  • Price: Call for price

Next Step

Enquire Now
Tell a Friend