Experienced IT and Information Security staff who need to understand the concepts and threats and the impact on their organisations and also need help to prepare for CISSP certification
Highlights
Help focus on preparation for CISSP Certification
Protecting your resources using access control methods and cryptography
Planning a secure environment
Security objectives
Compliance requirements and standard
Operational security best practice
Business continuity techniques
Prevention and recovery from attack
Course Details
Security and Risk Management
Aligning security to organisational objectives
Employing fundamental security principles
Managing security policies, standards and procedures
Applying risk management concepts
Assessing threats and vulnerabilities
Performing risk analysis and control
Preserving the business
Adhering to Business Continuity Management Code of Practice and Specifications
Performing a business impact analysis
Investigating legal measures and techniques
Reviewing intellectual property, liability and laws
Differentiating traditional and computer crime
Addressing ethical behaviour and compliance
Security Engineering
Examining security models and frameworks
The Information Security Triad and multi-level models
Investigating industry standards: ISO 27001/27002
Exploring system and component security concepts
System design principles, capabilities, and limitations
Certification and accreditation criteria and models
Protecting information by applying cryptography
Detailing symmetric and asymmetric encryption systems
Ensuring message integrity through hashing
Uncovering threats to cryptographic systems
Safeguarding physical resources
Designing environments to resist hostile acts and threats
Denying unauthorised access
Asset Security
Identifying, categorising and prioritising assets
Applying security controls to assets
Protecting data through proper handling
Communication and Network Security
Defining a secure network architecture
TCP/IP and other protocol models
Protecting from network attacks
Examining secure networks and components
Identifying wired and wireless technologies
Implementing firewalls, proxies and tunnels
Identity and Access Management
Controlling access to protect assets
Defining administrative, technical and physical controls
Implementing centralised and decentralised approaches
Investigating biometric and multi-factor authentication
Identifying common threats
Security Assessment and Testing
Designing and conducting security assessment strategies
Leveraging the role of testing and auditing to analyse the effectiveness of security controls
Differentiating detection and protection systems
Conducting logging and monitoring activities
Distinguishing between the roles of internal and external audits
Defining secure account management
Security Operations
Maintaining operational resilience
Managing security services effectively
Leveraging and supporting investigations and incident response
Differentiating detection and protection systems
Developing a recovery strategy
Designing a disaster recovery plan
Implementing test and maintenance processes
Software Development Security
Securing the software development life cycle
Applying software development methods and security controls
Highlighting threats: Cross-Site Scripting (XSS), JavaScript attacks and Buffer Overflow
Addressing database security concepts and issues
Who Should Attend
Experienced IT and Information Security staff who need to understand the concepts and threats and the impact on their organisations and also need help to prepare for CISSP certification
History Of JBI Training
JB International (JBI Training) is a London (UK) company which was formed in 1995, delivering Technology training courses to leading organisations.
JBI has always focused on cutting edge technology and is widely recognised as a leading specialist provider of training in the fields of Artificial Intelligence, Machine Learning, Analytics, DevOps, Security....
Instructors & Consultants
We are confident that you will find our instructors to be among the finest around. Our Instructors bring into the classroom the experience of applying their skills in the "Real World" as systems developers and consultants.
Many are leading figures in the world of Technology and are able to add a lot of value to your training. The instructors are personable and able to communicate their technical knowledge effectively to delegates.
Increasingly, clients are looking for consultancy and project mentoring to help get leading-edge systems design , development and implementation underway smoothly.
JBI is able to provide this service and have a number of leading consultants who can add value to client projects.
Auditing is an essential tool in the battle to identify, assess and address information security risks posed by challenges such as employee error and data breaches.
ou'll also get the knowledge, skills and best practices to successfully audit, control and secure your information system. This course will prepare you with the knowledge you need to complete the ISACA CISA multiple choice exam, which gives you Certified Information Systems Auditor status.
CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting. Our CISA course is an intense, very competitive and exam focused training course.
Learn the best practices for implementing and managing an Information Security Management System (ISMS) - as specified in ISO/IEC 27001:2013.
From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy