Course Outline
first day
- Information Assurance Information Security Concept Information Assurance Framework
Information security management, including information security management foundation, information security risk management, security management system construction, security management system best practices, information security management system
- business continuity business continuity
Information Security Assessment Fundamentals of Security Assessment
- Security Assessment Implementation
OSI communication model
- TCP/IP protocol security
Software Security Implementation
- Software Security Testing
Requirements
Object-oriented:
- Enterprise information security supervisors; information security service providers; IT or security consultants; IT auditors; information security lecturers or trainers; information security incident investigators; other personnel engaged in information security related work (such as system administrators, programmer, etc.). CISE (registered information security engineer): suitable for network security technicians of governments, major enterprises and institutions, and network security integration service providers; CISO (registered information security managers): suitable for network security management of governments, major enterprises and institutions It is also suitable for network security consultants of network security integration service providers; CISA (registered information security auditor): suitable for government, network security technicians of major enterprises and institutions, and also suitable for network security of network security integration service providers consultant staff.
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
I extracted valuable information that I will be able to present in my company as a solution to one of the processes
Paweł - Santander
Course - Public Key Infrastructure
Machine Translated