KAIZEN TECHNOLOGIES INC

Course :CISSP

Course ID:CISSP
Prerequisites:Knowledge of Computers



Section- 1

Access Control Systems & Methodlogy
  • Overview
  • Access control methodologies
  • Security models
  • Access control
  • Authentication
  • Access attacks
  • Penetration testing
Information Security & Risk Mgmt
  • Concepts
  • Develop & Implement policy
  • Roles & responsibilities
  • Change control & SLA
  • Security awareness
  • Wireless security


Section- 2

Application Security
  • SDLC
  • Application security controls
  • Database security issues
  • Database attacks
  • Application controls
  • Knowledge based systems
Cryptography
  • Cryptography Basics
  • Cryptography Algorithms
  • Cryptography Strength
  • Key Management
  • Message Authentication
  • Secret Key
  • Public Key
  • PKI
  • Cryptography Attacks


Section- 3

Operations Security
    • Administrative Management
    • Anti-Virus Management
    • Sensitive Information Handling
    • Control Types
    • Machine Types
    • Resource Protection
    • Auditing
     


  • Audit Trails
  • Monitoring
  • Intrusion Detection
  • Negative Actions
Business Continuity & Disaster Recovery
  • Develop and document project scope/plan
  • Conduct Business Impact Analysis
  • Develop Recovery strategy
  • Training
  • Plan Maintenance


Section- 4


Telecommunication & Network Security
  • OSI Model
  • Remote access
  • Security protocols
  • Security techniques
  • Types of networks
  • Topologies
  • Physical media
Security Architecture & Models
  • Computer Processing
  • Security Architecture Concepts
  • Evaluation Criteria
  • Security Model Principles
  • Trusted Computing Base
  • Security Model Threats


Section- 5

Laws, Investigations, & Ethics
  • Types of Laws
  • Information Security Laws
  • Investigations
  • Evidence
  • Computer Crime
  • Incident Handling
  • Ethics
Physical Security
  • Facility Requirements
  • Environmental Safety
  • Physical Threats
 

 


Each Day includes Theory and Lab practice

  • Examples based on theory
  • Exercises


What You'll Learn

  • Security Models, Penetration Testing, change control, SLA, Application Security, Cryptography, Admin Management , Disaster Recovery, OSI models, Security protocols, Security Architecture Models.