Certified Information Systems Security Professional (CISSP) TRAINING & EXAM PREPARATION
Certified Information Systems Security Professional (CISSP)
TRAINING & EXAM PREPARATION
Kuningan, Jakarta Selatan | 29 Oktober – 02 November 2012 | Rp 8.000.000
Prepare for the most important security certification with superior prep materials and test-taking tips.
If you are ready to take your security career to the next level, our Certified Information Systems Security Professional (CISSP) exam preparation course will help get you there.
Certification (ISC)2 requires exam candidates to have a minimum of five years of relevant work experience in two or more of the ten domains, four years of work experience with an applicable college degree, or a credential from the (ISC)2 approved list. The CISSP certification requires successfully passing the CISSP exam (administered by (ISC)2) and having met the experience requirements. After class, we recommend self-study to sharpen your weak areas before taking the exam.
What You’ll Learn In-depth coverage of the ten domains required to pass the CISSP exam:
- Operations Security
- Access Control
- Cryptography
- Security Architecture and Design
- Telecommunications and Network Security
- Disaster Recovery and Business Continuity Planning
- Legal, Regulations, Compliance, and Investigations
- Application Security
- Information Security and Risk Management
- Physical (Environmental) Security
Who Needs to Attend
IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers, and other security professionals whose positions require CISSP certification.
Prerequisites
Systems administration experience, familiarization with TCP/IP, and an understanding of UNIX, Linux, and Windows.
Durations
35 Hours Training
Course Outline
Introduction
- Course Overview
- CISSP Candidate Requirements
- CISSP Exam Review
Operations Security
- Operation Security Principles, Techniques, and Mechanisms
- Principles and Practices of Good Security
- Resource Protection Mechanisms and Techniques
- Attacks and Prevention Methods
Access Control
- Authentication
- Authorization
- Accountability
- Threats to Access Control
Cryptography
- History of Cryptography
- Symmetric Encryption
- Asymmetric Encryption
- Hashing and Digital Signatures
- Public Key Infrastructure
- Cryptographic Attacks
Security Architecture and Design
- Computer Architecture
- Rings of Protection
- Security Models
- System Evaluation
Telecommunications and Network Security
- The OSI Model
- The TCP/IP Model
- WAN Protocols
- Routing
- Wireless Systems
- Fault Tolerance
Disaster Recovery and Business Continuity Planning
- Disaster Recovery Planning
- Business Impact Analysis
- Business Continuity Planning
- Backup and Off-Site Facilities
- Testing Contingency Plans
Legal, Regulations, Compliance, and Investigations
- Laws and Ethics
- Computer Crime
- Incident Response and Forensics
Application Security
- Database Security
- System Development
- Software Development Methods
- Threats and Vulnerabilities
Information Security and Risk Management
- Security Management
- Risk Analysis
- Classification Controls
Physical (Environmental) Security
- Threats to Physical Security
- Administrative Controls
- Environmental and Safety Controls
- Physical and Technical Controls
Test Review and Preparation
- Test Review
- Test Registration
- Test Preparation
- Certification Maintenance
Durations
5 Days Training (09.00 – 17.00)
Schedule
17 – 21 September 2012
Venue
Informatics Building 3rd Floor, Jl. Prof. Dr. Satrio No. 296, Karet – Kuningan, Jakarta Selatan
Price
Rp 8.000.000
Packages :
- Training Materials (include exam bible)
- Meeting Packages (Lunch and Snack)
- Certificate of Attendance from Informatics (Singapore)