Experienced IT and Information Security staff who need to understand the concepts and threats and the impact on their organisations and also need help to prepare for CISM certification
Highlights
Help focus on preparation for CISM Certification
Protecting your resources using access control methods and cryptography
Planning a secure environment
Security objectives
Compliance requirements and standard
Operational security best practice
Business continuity techniques
Prevention and recovery from attack
Course Details
Security and Risk Management
Aligning security to organisational objectives
Employing fundamental security principles
Managing security policies, standards and procedures
Applying risk management concepts
Assessing threats and vulnerabilities
Performing risk analysis and control
Preserving the business
Adhering to Business Continuity Management Code of Practice and Specifications
Performing a business impact analysis
Investigating legal measures and techniques
Reviewing intellectual property, liability and laws
Differentiating traditional and computer crime
Addressing ethical behaviour and compliance
Security Engineering
Examining security models and frameworks
The Information Security Triad and multi-level models
Investigating industry standards: ISO 27001/27002
Exploring system and component security concepts
System design principles, capabilities, and limitations
Certification and accreditation criteria and models
Protecting information by applying cryptography
Detailing symmetric and asymmetric encryption systems
Ensuring message integrity through hashing
Uncovering threats to cryptographic systems
Safeguarding physical resources
Designing environments to resist hostile acts and threats
Denying unauthorised access
Asset Security
Identifying, categorising and prioritising assets
Applying security controls to assets
Protecting data through proper handling
Communication and Network Security
Defining a secure network architecture
TCP/IP and other protocol models
Protecting from network attacks
Examining secure networks and components
Identifying wired and wireless technologies
Implementing firewalls, proxies and tunnels
Identity and Access Management
Controlling access to protect assets
Defining administrative, technical and physical controls
Implementing centralised and decentralised approaches
Investigating biometric and multi-factor authentication
Identifying common threats
Security Assessment and Testing
Designing and conducting security assessment strategies
Leveraging the role of testing and auditing to analyse the effectiveness of security controls
Differentiating detection and protection systems
Conducting logging and monitoring activities
Distinguishing between the roles of internal and external audits
Defining secure account management
Security Operations
Maintaining operational resilience
Managing security services effectively
Leveraging and supporting investigations and incident response
Differentiating detection and protection systems
Developing a recovery strategy
Designing a disaster recovery plan
Implementing test and maintenance processes
Software Development Security
Securing the software development life cycle
Applying software development methods and security controls
Highlighting threats: Cross-Site Scripting (XSS), JavaScript attacks and Buffer Overflow
Addressing database security concepts and issues
Who Should Attend
Experienced IT and Information Security staff who need to understand the concepts and threats and the impact on their organisations and also need help to prepare for CISM certification
History Of JBI Training
JB International (JBI Training) is a London (UK) company which was formed in 1995, delivering Technology training courses to leading organisations.
JBI has always focused on cutting edge technology and is widely recognised as a leading specialist provider of training in the fields of Artificial Intelligence, Machine Learning, Analytics, DevOps, Security....
Instructors & Consultants
We are confident that you will find our instructors to be among the finest around. Our Instructors bring into the classroom the experience of applying their skills in the "Real World" as systems developers and consultants.
Many are leading figures in the world of Technology and are able to add a lot of value to your training. The instructors are personable and able to communicate their technical knowledge effectively to delegates.
Increasingly, clients are looking for consultancy and project mentoring to help get leading-edge systems design , development and implementation underway smoothly.
JBI is able to provide this service and have a number of leading consultants who can add value to client projects.
Our Cyber Security Essentials course enables you to guard your organisation against cyberattack. We will teach you how to protect yourself against the most common cyber threats and subsequently demonstrate your commitment to cyber security.
At Gradeon, we have seen how businesses which believe themselves to be fully protected have nonetheless suffered through the mismatch of cyber security measures and employee knowledge. That is why we offer a comprehensive cybersecurity training programme developed in collaboration with expert partn...
BCS Certificate in Information Security Management and Principles (CISMP) covers concepts, approaches and techniques, which are applicable to BCS Foundation CISMP.
Cybercrime, cyber espionage and other threats to networks is rapidly spanning all industries. At EU-SAM you will have to opportunity to learn new skills to qualify you for an exciting and growing industry as an analyst or incident responder.
Our Penetration Testing Training helps you to be a certified penetration testing professional (CPENT), an individual who uses the same tools and techniques as hackers to look for and exploit vulnerabilities in a supervised and legal way in computer systems.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy