The Certified Information Systems Security Professional (CISSP)® designation is a recognized international standard for information security certifications.
The CISSP ® series will provide certification candidates and others interested in information security management an understanding of crucial security issues. Our course covers the full CISSP ® Common Body of Knowledge, explains how the various domains relate in an overall security policy and delivers solid preparation for the certification exam.
In additionally we cover some Swiss-specific issues as well.
The CISSP certification mark and the (ISC)² trademark are registered marks of the International Information Systems Security Certification Consortium, Inc. Their use does not imply association, endorsement, sponsorship, or approval by (ISC)².
Network Administrators, Security Officers
Access Control Systems & Methodology
- Identification, Authentication, Authorization and Accountability
- Single Sign-On Technologies
- Access Control Models and Techniques (DAC, MAC, Rule-Based, Role-Based,..)
- Access Control Administration (RADIUS, TACACS, DIAMETER)
- Access Control Methods
Applications & Systems Development
- The Software Life Cycle
- Object-Oriented Systems
- Database Systems
- Artificial Intelligence Systems
Business Continuity Planning
- Defining a Disaster
- Disaster Recovery vs. Business Continuity
- Business Impact Analysis
- Contigency Planning Requirements
- Backup Alternatives
- Recovery and Restoration
- Testing
- Emergency Response
Cryptography
- History
- Definitions
- Symmetric Key Cryptography Algorithms
- Asymmetric Key Cryptography Algorithms
- Public Key Infrastructure
- Message Integrity
- Key management
- E-Mail Standards
- Internet Security
- Attacks
Law, Investigation & Ethics
- Types of Computer Crime
- Intellectual Property Laws
- Laws, Directives, and Regulations
- Computer Crime Investigations
- Liability
- Ethics
Operations Security
- Security Operations Concepts
- Security Operations Management
- Security Controls
- Monitoring
- Auditing
Physical Security
- Physical Security Threats
- Facility Requirements Planning
- Environmental Issues
- Administrative Controls for Physical Security
- Perimeter Security
Security Architecture & Models
- Computer Architecture
- System Architecture
- Security Models
- Security Modes of Operation
- Orange Book, ITSec, Common Criteria
- Certification, Accreditation
- Open versus Closed Systems
Security Management Practices
- Security Management
- Fundamental Principles of Security
- Risk Management
- Risk Analysis
Telecommunications, Network & Internet Security
- Telecommunication and Network Security
- Open System Interconnect Model
- TCP/IP
- Networking
- Types of Transmissions
- LANs
- Protocols
- Networking Devices
- WANs
- Remote Access
- Network and Resource Availability
Requirements for our training: Participation in our "Security+" course or equivalent knowledge
Requirements for ISC)²® Applicants must have a minimum of 5 years full-time professional work experiences in two or more of the ten domains of CBK.
5 days
Form: - Efficient small group instruction
Course language: English & German (depends on situation)
Documentation.
The participants receive our comprehensive documentation. The course documentation contains copies of all documents shown in the course.
Documentation:
- a binder with ca. 900 Powerpoint Slides (in Englisch)
- original "Study book" (Official (ISC)² Guide to the CISSP CBK).
There are various security and network system (firewalls, IDS/IPS, authenticationsystems, biometry systems, routers, switches,..). The course is carried out as a combination of presentation and workshop. The individual modules are initiated by an introductory presentation. They are then extended by a various "live" demonstrations / exercises.
All participating PCs have an Internet connection, SW analyser, port scanner,...
The course fees include this documentation, as well as refreshment during intervals and lunch.
The course can also be carried out as an On-Site course on the premises of your company.
Please contact us for more information!
|