Course Outline

Day One

  • Information Security Assurance
    • Concepts of Information Security
    • Framework for Information Security Assurance
  • Cybersecurity Oversight
    • Construction of Cybersecurity Legal System
    • National Cybersecurity Policy
    • Cybersecurity Ethical Standards
    • Information Security Standards

Day Two

  • Information Security Management
    • Basics of Information Security Management
    • Information Security Risk Management
    • Construction of Security Management System
    • Best Practices for Security Management System
    • Information Security Management System
  • Business Continuity
    • Business Continuity
    • Information Security Emergency Response
    • Disaster Backup and Recovery

Day Three

  • Security Engineering and Operations
    • System Security Engineering
    • Security Operations
    • Content Security
    • Social Engineering and Training
  • Information Security Assessment
    • Basics of Security Assessment
    • Implementation of Security Assessment
    • Information System Auditing

Day Four

  • Information Security Support Technologies
    • Cryptography
    • Identity Verification
    • Access Control
  • Physical Environment and Network Communication Security
    • Mainly Includes Physical Security
    • OSI Communication Model
    • TCP/IP Protocol Security
    • Wireless Communication Security
    • Prevention of Typical Network Attacks
    • Cybersecurity Defense Technologies

Day Five

  • Computing Environment Security
    • Operating System Security
    • Information Gathering and System Attacks
    • Malware Protection
    • Application Security
    • Data Security
  • Software Secure Development
    • Software Secure Development Lifecycle
    • Software Security Requirements and Design
    • Software Security Implementation
    • Software Security Testing
    • Software Security Delivery

Day Six

  • Examination
    • The examination covers the content of the first five days.

Requirements

Target Audience:

  • Enterprise Information Security Managers;
  • Information Security Service Providers;
  • IT or Security Consultants;
  • IT Auditors;
  • Information Security Trainers or Instructors;
  • Information Security Incident Investigators;
  • Other Professionals Engaged in Information Security-Related Work (such as System Administrators, Programmers, etc.).
  • CISE (Certified Information Security Engineer): Suitable for Cybersecurity Technicians in Government Agencies, Large Enterprises, and Network Security Integration Service Providers;
  • CISO (Certified Information Security Officer): Suitable for Cybersecurity Managers in Government Agencies and Large Enterprises, as well as Cybersecurity Consultants for Network Security Integration Service Providers;
  • CISA (Certified Information Systems Auditor): Suitable for Cybersecurity Technicians in Government Agencies and Large Enterprises, as well as Cybersecurity Consultants for Network Security Integration Service Providers.
 35 Hours

Testimonials (5)

Upcoming Courses

Related Categories