www.roman.ch auf Deutsch   www.roman.ch - go to the english version
Certified Information System Security Professional (CISSP)®
Duration of course: 5 days
Price CHF: 4'550.00 dkdkdk
Price EUR: 3'777.00
Course dates:
     
This course is carried out upon request. The course dates, the type of course (e.g. workshop) and the location are arranged to suit your requirements. Please contact us for more information!
Subject/Goal:
The Certified Information Systems Security Professional (CISSP)® designation is a recognized international standard for information security certifications.

The CISSP ® series will provide certification candidates and others interested in information security management an understanding of crucial security issues. Our course covers the full CISSP ® Common Body of Knowledge, explains how the various domains relate in an overall security policy and delivers solid preparation for the certification exam.

In additionally we cover some Swiss-specific issues as well.

The CISSP certification mark and the (ISC)² trademark are registered marks of the International Information Systems Security Certification Consortium, Inc. Their use does not imply association, endorsement, sponsorship, or approval by (ISC)².
Audience:
Network Administrators, Security Officers
Content of course:
Access Control Systems & Methodology

  • Identification, Authentication, Authorization and Accountability
  • Single Sign-On Technologies
  • Access Control Models and Techniques (DAC, MAC, Rule-Based, Role-Based,..)
  • Access Control Administration (RADIUS, TACACS, DIAMETER)
  • Access Control Methods


Applications & Systems Development

  • The Software Life Cycle
  • Object-Oriented Systems
  • Database Systems
  • Artificial Intelligence Systems


Business Continuity Planning

  • Defining a Disaster
  • Disaster Recovery vs. Business Continuity
  • Business Impact Analysis
  • Contigency Planning Requirements
  • Backup Alternatives
  • Recovery and Restoration
  • Testing
  • Emergency Response


Cryptography

  • History
  • Definitions
  • Symmetric Key Cryptography Algorithms
  • Asymmetric Key Cryptography Algorithms
  • Public Key Infrastructure
  • Message Integrity
  • Key management
  • E-Mail Standards
  • Internet Security
  • Attacks


Law, Investigation & Ethics

  • Types of Computer Crime
  • Intellectual Property Laws
  • Laws, Directives, and Regulations
  • Computer Crime Investigations
  • Liability
  • Ethics


Operations Security

  • Security Operations Concepts
  • Security Operations Management
  • Security Controls
  • Monitoring
  • Auditing


Physical Security

  • Physical Security Threats
  • Facility Requirements Planning
  • Environmental Issues
  • Administrative Controls for Physical Security
  • Perimeter Security


Security Architecture & Models

  • Computer Architecture
  • System Architecture
  • Security Models
  • Security Modes of Operation
  • Orange Book, ITSec, Common Criteria
  • Certification, Accreditation
  • Open versus Closed Systems


Security Management Practices

  • Security Management
  • Fundamental Principles of Security
  • Risk Management
  • Risk Analysis


Telecommunications, Network & Internet Security

  • Telecommunication and Network Security
  • Open System Interconnect Model
  • TCP/IP
  • Networking
  • Types of Transmissions
  • LANs
  • Protocols
  • Networking Devices
  • WANs
  • Remote Access
  • Network and Resource Availability
Requirements:
Requirements for our training: Participation in our "Security+" course or equivalent knowledge
Requirements for ISC)²® Applicants must have a minimum of 5 years full-time professional work experiences in two or more of the ten domains of CBK.
Duration of course:
5 days
Additional information:
Form: - Efficient small group instruction

Course language: English & German (depends on situation)

Documentation.
The participants receive our comprehensive documentation. The course documentation contains copies of all documents shown in the course.

Documentation:
- a binder with ca. 900 Powerpoint Slides (in Englisch)
- original "Study book" (Official (ISC)² Guide to the CISSP CBK).

There are various security and network system (firewalls, IDS/IPS, authenticationsystems, biometry systems, routers, switches,..). The course is carried out as a combination of presentation and workshop. The individual modules are initiated by an introductory presentation. They are then extended by a various "live" demonstrations / exercises.

All participating PCs have an Internet connection, SW analyser, port scanner,...

The course fees include this documentation, as well as refreshment during intervals and lunch.

The course can also be carried out as an On-Site course on the premises of your company.

Please contact us for more information!
Further Information:

  

 
 
  © 1993-2024 ROMAN - Consulting & Engineering AG | Alle Rechte vorbehalten | Haftungsausschluss