CISSP Bootcamp
Despre
Descriere
Acest curs este conceput pentru profesionistii în domeniul securitatii informatiei, oferind o analiza cuprinzatoare a conceptelor de securitate a sistemelor informatice si a celor mai bune practici din industrie, acoperind urmatoarele opt domenii ale CISSP Common Body of Knowledge (CBK):
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management (IAM)
- Security Assessment Testing
- Security Operations
- Software Development Security
Durata: 4 zile
Modalitate de livrare: online/in sala
Nivel: avansat
Pret: 1250 Euro
*pretul nu contine TVA
Cui se adreseaza
Audienta
Acest curs este ideal pentru cei cu experienta practica in domeniul securitatii informatiei, managerii si directorii interesati sa isi demonstreze cunoștințele intr-o gama larga de practici si principii de securitate, inclusiv pentru cei care ocupa urmatoarele poziții: Chief Information Security Officer, Chief Information Officer, Director of Security, IT Director/Manager, Security Systems Engineer, Security Manager, Security Analyst, Security Auditor etc.
Curricula curs
Agenda cursului
Security and Risk Management
- Confidentiality, Integrity, and Availability triad
- Governance overview
- Compliance
- Legal and Regulatory Issues
- Security Policy, Standards, Procedures, and Guidelines
- Continuity of Business
- Security Policies involving Personnel
- Risk Management Basis
- Threat Modeling
- Risk Considerations integrated in Acquisitions Strategy and Practice
- Security Education, Training, and Awareness
- Ethical Considerations
Asset Security
- Informational Assets and Classification
- Ownership over Informational Assets
- Privacy Considerations
- Data Retention
- Selecting Controls to Ensure Security of Data
- Needs for Data Handling
Security Architecture and Engineering
- Engineering Life Cycle Using Security Design Principles
- Security Models
- Information Systems Security Standards – controls and Countermeasures
- Security Capabilities of Information Systems
- Addressing Vulnerabilities of Security Architectures, Designs, and Solution Elements
- Addressing Vulnerabilities in Web-based Systems
- Addressing Vulnerabilities in Mobile Systems
- Addressing Vulnerabilities in Embedded Devices and Cyber-Physical Systems
- Applied Cryptography
Communication and Network Security
- Network Architecture associated with Secure Design
- Security of Network Elements
- Secure Communication Channels
- Network Attacks – Prevention and Mitigation
Identity and Access Management (IAM)
- Manage Physical and Logical Security of Assets
- Identification and Authentication of IT participants (individuals, systems)
- Identity as a Service
- Interacting with Third-Party Identities
- Authorization Implementation and Management
- Access Control Attacks – Prevention or Mitigation
- Identity and Access Provisioning Life Cycle
Security Assessment Testing
- Design and Validate Assessment and Test Strategies
- Security Control Testing
- Security Process Data
- Practices in Internal and Third-Party Audits
Security Operations
- Investigations and Investigation Types needs
- Logging and Monitoring Activities
- Manipulate Configuration Data
- Concepts of Security Operations
- Techniques for Resource Protection
- Basis of Incident Response and Preventative Measures
- Vulnerability Management and Handling Patching Process
- Basis of Change Management Processes
- Recovery Strategies and Disaster Recovery Processes
- Testing Disaster Recovery Plan
Software Development Security
- Software Development Life Cycle involving Security
- Apply Security in Development Environment
- Evaluate the Effectiveness of Software Security
- Evaluate Software Acquisition Security
Suntem aici sa te ajutam!
Adresa
Bucuresti, Romania
Scrie-ne
office@bloovia.com
Suna-ne
(040) 739-623-873