KAIZEN TECHNOLOGIES INCCourse :CISSP
Course ID:CISSP
Prerequisites:Knowledge of Computers |
Section- 1
Access Control Systems & Methodlogy
- Overview
- Access control methodologies
- Security models
- Access control
- Authentication
- Access attacks
- Penetration testing
Information Security & Risk Mgmt
- Concepts
- Develop & Implement policy
- Roles & responsibilities
- Change control & SLA
- Security awareness
- Wireless security
Section- 2
Application Security
- SDLC
- Application security controls
- Database security issues
- Database attacks
- Application controls
- Knowledge based systems
Cryptography
- Cryptography Basics
- Cryptography Algorithms
- Cryptography Strength
- Key Management
- Message Authentication
- Secret Key
- Public Key
- PKI
- Cryptography Attacks
Section- 3
Operations Security
- Administrative Management
- Anti-Virus Management
- Sensitive Information Handling
- Control Types
- Machine Types
- Resource Protection
- Auditing
|
- Audit Trails
- Monitoring
- Intrusion Detection
- Negative Actions
Business Continuity & Disaster Recovery
- Develop and document project scope/plan
- Conduct Business Impact Analysis
- Develop Recovery strategy
- Training
- Plan Maintenance
Section- 4
Telecommunication & Network Security
- OSI Model
- Remote access
- Security protocols
- Security techniques
- Types of networks
- Topologies
- Physical media
Security Architecture & Models
- Computer Processing
- Security Architecture Concepts
- Evaluation Criteria
- Security Model Principles
- Trusted Computing Base
- Security Model Threats
Section- 5
Laws, Investigations, & Ethics
- Types of Laws
- Information Security Laws
- Investigations
- Evidence
- Computer Crime
- Incident Handling
- Ethics
Physical Security
- Facility Requirements
- Environmental Safety
- Physical Threats
|
Each Day includes Theory and Lab practice
- Examples based on theory
- Exercises
|
What You'll Learn
- Security Models, Penetration Testing, change control, SLA, Application Security, Cryptography, Admin Management , Disaster Recovery, OSI models, Security protocols, Security Architecture Models.
|