Experienced IT and Information Security staff who need to understand the concepts and threats and the impact on their organisations and also need help to prepare for CISM certification
Highlights
Help focus on preparation for CISM Certification
Protecting your resources using access control methods and cryptography
Planning a secure environment
Security objectives
Compliance requirements and standard
Operational security best practice
Business continuity techniques
Prevention and recovery from attack
Course Details
Security and Risk Management
Aligning security to organisational objectives
Employing fundamental security principles
Managing security policies, standards and procedures
Applying risk management concepts
Assessing threats and vulnerabilities
Performing risk analysis and control
Preserving the business
Adhering to Business Continuity Management Code of Practice and Specifications
Performing a business impact analysis
Investigating legal measures and techniques
Reviewing intellectual property, liability and laws
Differentiating traditional and computer crime
Addressing ethical behaviour and compliance
Security Engineering
Examining security models and frameworks
The Information Security Triad and multi-level models
Investigating industry standards: ISO 27001/27002
Exploring system and component security concepts
System design principles, capabilities, and limitations
Certification and accreditation criteria and models
Protecting information by applying cryptography
Detailing symmetric and asymmetric encryption systems
Ensuring message integrity through hashing
Uncovering threats to cryptographic systems
Safeguarding physical resources
Designing environments to resist hostile acts and threats
Denying unauthorised access
Asset Security
Identifying, categorising and prioritising assets
Applying security controls to assets
Protecting data through proper handling
Communication and Network Security
Defining a secure network architecture
TCP/IP and other protocol models
Protecting from network attacks
Examining secure networks and components
Identifying wired and wireless technologies
Implementing firewalls, proxies and tunnels
Identity and Access Management
Controlling access to protect assets
Defining administrative, technical and physical controls
Implementing centralised and decentralised approaches
Investigating biometric and multi-factor authentication
Identifying common threats
Security Assessment and Testing
Designing and conducting security assessment strategies
Leveraging the role of testing and auditing to analyse the effectiveness of security controls
Differentiating detection and protection systems
Conducting logging and monitoring activities
Distinguishing between the roles of internal and external audits
Defining secure account management
Security Operations
Maintaining operational resilience
Managing security services effectively
Leveraging and supporting investigations and incident response
Differentiating detection and protection systems
Developing a recovery strategy
Designing a disaster recovery plan
Implementing test and maintenance processes
Software Development Security
Securing the software development life cycle
Applying software development methods and security controls
Highlighting threats: Cross-Site Scripting (XSS), JavaScript attacks and Buffer Overflow
Addressing database security concepts and issues
Who Should Attend
Experienced IT and Information Security staff who need to understand the concepts and threats and the impact on their organisations and also need help to prepare for CISM certification
History Of JBI Training
JB International (JBI Training) is a London (UK) company which was formed in 1995, delivering Technology training courses to leading organisations.
JBI has always focused on cutting edge technology and is widely recognised as a leading specialist provider of training in the fields of Artificial Intelligence, Machine Learning, Analytics, DevOps, Security....
Instructors & Consultants
We are confident that you will find our instructors to be among the finest around. Our Instructors bring into the classroom the experience of applying their skills in the "Real World" as systems developers and consultants.
Many are leading figures in the world of Technology and are able to add a lot of value to your training. The instructors are personable and able to communicate their technical knowledge effectively to delegates.
Increasingly, clients are looking for consultancy and project mentoring to help get leading-edge systems design , development and implementation underway smoothly.
JBI is able to provide this service and have a number of leading consultants who can add value to client projects.
This qualification is for learners who want to start a career in digital technology. It is designed for post-16 learners and can be taken as part of a wider study programme.
A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart.
Modern businesses demand IT systems and data to always be available from any device or location, meaning protection against cyber-attacks is a must. Cyber Security and IT Security are also increasingly linked to business risk, compliance and process.
Certified in Risk and Information System Control (CRISC) is another globally recognized certification from ISACA (Information System Audit and Control Association).
Get your staff better protected through KnowBe4’s Security Awareness Training, with the largest commercially available training library, and a wide array of Simulated Phishing scenarios that will engage, inform, and upskill your workers to ensure that they don’t make mistakes as your infrastruc...
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy