Price:
$4,095.00
Days:
1
Virtual
– • Apply fundamental concepts and methods related to the fields of information technology and security.
– • Align overall organizational operational goals with security functions and implementations.
– • Determine how to protect assets of the organization as they go through their lifecycle.
– • Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
– • Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
– • Explain the importance of cryptography and the security services it can provide in today’s digital and information age.
– • Evaluate physical security elements relative to information security needs.
– • Evaluate the elements that comprise communication and network security relative to information security needs.
– • Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
– • Determine appropriate access control models to meet business security requirements.
– • Apply physical and logical access controls to meet information security needs.
– • Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
– • Apply appropriate security controls and countermeasures to optimize an organization’s operational function and capacity.
– • Assess information systems risks to an organization’s operational endeavors.
– • Determine appropriate controls to mitigate specific threats and vulnerabilities.
– • Apply information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems’ lifecycles.
• Minimum of five years of direct full-time security work experience in two or more of the 8 domains of the ISC2 CISSP CBK
• Alternatively, four years of direct full-time security work experience in two or more of the 8 domains
• The Information Security Environment
• Information Asset Security
• Identity and Access Management (IAM)
• Security Architecture and Engineering
• Communication and Network Security
• Security Assessment and Testing
• Software Development Security
• Putting It All Together
• Security Operations
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.