Posted in Certification, CISSP

Certified Information Systems Security Professional

Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profi.  International Information Systems Security Certification Consortium, commonly known as (ISC)². As of July 20, 2010, (ISC)² reports 67,744 members who hold the CISSP certification in 134 countries. In June, 2004, the CISSP was the first information security credential accredited by ANSI ISO/IEC Standard 17024:2003 accreditation, and, as such, has led industry acceptance of this global standard and its requirements. It is formally approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories. The CISSP has been adopted as a baseline for the U.S. National Security Agency’s ISSEP program.

  • Introduction & Course Outline
    • Introduction
    • Course Outline
  • Access Control
    • Access Control Concepts
    • Types of Access Control
    • Access Control Models
    • Authentication Methods
    • Access Control Systems & Administration
    • Access Control Attacks
  • Telecommunications & Network Security
    • Introduction
    • Network Protocols
    • The OSI Model
    • Networking Topologies
    • Network Transmission Media
    • Network Security Devices
    • Remote Access Protocols & Technologies
    • Network Security Weaknesses & Countermeasures
    • Wireless Security

  • Security & Risk Management
    • Security Goals & Tenets
    • Security Management Roles & Responsibilities
    • Security Policies & Procedures
    • Security Classification
    • Introduction to Risk
    • Risk Assessment
    • Risk Analysis
    • Risk Management
  • Applications Security
    • Introduction to Application Security
    • Systems Development Life Cycle
    • Programming Languages & Techniques
    • Database Security
    • Application Threats
  • Cryptography
    • Basics of Cryptography
    • Cryptography Definitions
    • Encryption Algorithms
    • Hashing
    • Symmetric & Asymmetric Cryptography
    • Public Key Infrastructure
    • Cryptographic Key Management
    • Cryptographic Threats
    • Cryptographic Protocols & Applications
    • Cryptography Demonstration
  • Security Architecture & Design
    • Security Models
    • System Components
    • Security Architecture
    • Security Evaluation Criteria
    • System Certification & Accreditation
  • Operations Security
    • Operational Security Controls
    • Personnel Security
    • Media Security
    • Configuration Management
    • Security Awareness & Training
  • BCP & DRP
    • Introduction to DRP & BCP
    • Organization & Contingency Planning
    • Disaster Recovery Planning (DRP)
    • Business Continuity Planning (BCP)
    • Contingency Operations
    • Plan Testing & Implementation
  • Law, Investigation & Ethics
    • Introduction to Cyberlaw
    • Privacy Laws
    • Intellectual Property
    • Criminal Law
    • Administrative/Regulatory Laws
    • Legal Liability & Ethical Practices
    • Cyber Crime Investigations
  • Physical Security
    • Safety
    • Fire Safety
    • Facility Security Pt.1
    • Facility Security Pt.2
    • Environmental Security
  • After the Exam
    • The CISSP Exam
    • Preparing your CISSP Resume
    • After the CISSP
    • Wrap Up             ·

 

 

Author:

Teman yang baik, teman yang memaksa anda untuk terus berkembang...

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s