Zertifizierung zur Sicherung von Informationssystemen (CISSP) Schulung

Haupt-Reiter

Schulungsprache

Dieser Kurs wird auf Deutsch und Englisch angeboten

Kurs Code

cissprev

Dauer

35 Stunden (usually 5 days including breaks)

Voraussetzungen

To attend the CISSP CBK Review you do not need to have the prerequisite experience for the examination. It is available to anyone working in the field of IT and Information Security and aims to give you a thorough understanding of Information Security even if you do not intend to sit the examination.

If you intend to go on to the examination:

CISSP candidates:

Must have a minimum of five years of direct full-time security professional work experience in two or more of the ten domains of the (ISC)2® CISSP CBK®, or four years of direct full-time security professional work experience in two or more of the ten domains of the CISSP CBK with a college degree.

Associate of (ISC)2 for CISSP:

Associate of (ISC)2 status is available to those knowledgeable in key areas of industry concepts but lacking the work experience. As a candidate, you may take the CISSP examination and subscribe to the (ISC)2 Code of Ethics, however to earn the CISSP credential you will have to acquire the necessary years of professional experience required, provide proof and be endorsed by a member of (ISC)2 in good standing. If you are working towards this credential, you will have a maximum of six years from your exam pass date to acquire the necessary five years of professional experience. For more information please refer to: www.isc2.org

Überblick

A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.

This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security.

Objectives:

  • To review of the main topics of CISSP CBK (Common Body of Knowledge).
  • To prepare for a CISSP examination

Schulungsübersicht

Access Control

Security architecture that protects the assets of your systems:

  • Concepts, methodologies and techniques
  • Effectiveness
  • Attacks

Telecommunications & Network Security

Network structures, transmission methods, transport formats and security measures that provide availability, integrity and confidentiality:

  • Network architecture and design
  • Communication channels
  • Network components
  • Network attacks

Information Security Governance & Risk Management

Identifying an organisation’s information assets, and the development, documentation and implementation of policies, standards, procedures and guidelines:

  • Security governance and policy
  • Information classification and ownership
  • Contractual agreements and procurement processes
  • Risk management concepts
  • Personnel security
  • Security education, training and awareness
  • Certification and accreditation

Software Development Security

The controls found in systems and applications software, and their development:

  • Systems Development Life Cycle (SDLC)
  • Application environment and security controls
  • Effectiveness of application security

Cryptography

The principles, means and methods of disguising information; to ensure its integrity, confidentiality and authenticity:

  • Encryption concepts
  • Digital signatures
  • Cryptanalytic attacks
  • Public Key Infrastructure (PKI)
  • Information hiding alternatives

Security Architecture & Design

The concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks and applications:

  • Fundamental concepts of security models
  • Capabilities of information systems (e.g. memory protection, virtualisation)
  • Countermeasure principles
  • Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)

Security Operations (formerly 'Operations Security')

Controls over hardware, media and operators with access privileges:

  • Resource protection
  • Incident response
  • Attack prevention and response
  • Patch and vulnerability management

Business Continuity & Disaster Recovery Planning

How to maintain business in the face of major disruptions:

  • Business impact analysis
  • Recovery strategy
  • Disaster recovery process
  • Provide training

Legal, Regulations, Investigations and Compliance

Computer crime laws, investigation and how to gather evidence:

  • Legal issues
  • Investigations
  • Forensic procedures
  • Compliance requirements/procedures

Physical (Environmental) Security

How to protect your business's resources and sensitive information:

  • Site / facility design considerations
  • Perimeter security
  • Internal security
  • Facilities security

Öffentlicher Klassenraum Öffentlicher Klassenraum
Teilnehmer aus verschiedenen Organisationen. Die Themen können hier nicht angepasst werden.
Von 4168EUR
(28)
Privater Klassenraum Privater Klassenraum
Die Teilnehmer sind aus einem Unternehmen. Externe Teilnehmer sind nicht erlaubt. Der Kurs ist speziell auf eine Gruppe zugeschnitten, Die Themen werden genau auf die Bedürfnisse der Teilnehmer abgestimmt.
Von 4168EUR
Angebot erfragen
Privater Fernkurs Privater Fernkurs
Der Anleiter und die Teilnehmer befinden sich an unterschiedlichen Orten und kommunizieren über das Internet miteinander.
Von 4490EUR
Angebot erfragen

Je mehr Teilnehmer, desto höher die Ersparnis pro Teilnehmer. Die Tabelle reflektiert den Preis pro Teilnehmer und dient zur Veranschaulichung. Die tatsächlichen Preise können jedoch abweichen.

Number of Delegates Öffentlicher Klassenraum Privater Klassenraum Privater Fernkurs
1 4168EUR 4168EUR 4490EUR
2 2759EUR 2734EUR 2895EUR
3 2289EUR 2256EUR 2363EUR
4 2055EUR 2017EUR 2098EUR
Können Sie kein passendes Datum finden? Fordern Sie ein neues Kursdatum an >>
Zu teuer? Schlagen Sie einen Preis vor >>

Verwandte Kategorien


Spezialangebote

Course Ort Schulungsdatum Kurspreis (Fernkurs/Schulungsraum)
Tomcat München Mo, 2016-09-05 09:30 2723EUR / 3373EUR
Introduction to Deep Learning Potsdam Mi, 2016-10-19 09:30 4277EUR / 4927EUR

Kommende Kurse

OrtSchulungsdatumKurspreis (Fernkurs/Schulungsraum)
DüsseldorfMo, 2016-09-19 09:304490EUR / 5440EUR
StuttgartMo, 2016-09-19 09:304490EUR / 5440EUR
Berlin Mo, 2016-09-26 09:304490EUR / 5690EUR
KölnMo, 2016-10-10 09:304490EUR / 5440EUR
LeipzigMo, 2016-10-10 09:304490EUR / 5440EUR

EINIGE UNSERER KUNDEN