Shon Harris s Newly Updated CISSP Materials



Similar documents
The Next Generation of Security Leaders

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

Certification and Training

Brandman University. School of CCNA

LINUX / INFORMATION SECURITY

Information Systems Security Certificate Program

InfoSec Academy Application & Secure Code Track

The Value of Information Security Certifications

Information Systems Security Engineering Professional (ISSEP)

Information Systems and Tech (IST)

USF Graduate Catalog SECTION 23.

CERTIFIED DISASTER RECOVERY ENGINEER

An expert s tips for cracking tough CISSP exam

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

The fast track to top skills and top jobs in cyber. Guaranteed.

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Information Technology Division

Security Transcends Technology

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Security Training Programs

Forensic Certifications

USF Graduate Catalog SECTION 18.

Planning, Deploying, and Managing an Enterprise Project Management Solution

Assessment Profile: Establishing Curricular Categories for Homeland Security Education

Bellevue University Cybersecurity Programs & Courses

COURSE SYLLABUS BMIS 342 CYBER SECURITY

Work Toward Your Bachelor s Degree

DoD Directive (DoDD) 8570 & GIAC Certification

InfoSec Academy Forensics Track

Introduction to Cybersecurity Overview. October 2014

Table of Contents. Introduction. Audience. At Course Completion. Prerequisites

Certified Disaster Recovery Engineer

Programme In Information Security Management

Table of Contents. Introduction. Audience. At Course Completion

CYBER SECURITY TRAINING SAFE AND SECURE

Hosted by Lunarline: School of Cyber Security

Department of Information Systems and Cyber Security

IT Security Management 100 Success Secrets

Course Outline. Core Solutions of Microsoft Lync Server 2013 Course 20336B: 5 days Instructor Led. About this Course.

WHY YOU SHOULD NOT GET A CISSP. Timmay, with a dose of Jericho

CyberNEXS Global Services

One LAR Course Credits: 3. Page 4

INTERMEDIATE QUALIFICATION

Core Solutions of Microsoft Lync Server 2013

Certified Big Data Science Professional (CBDSP)

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

Certification for Information System Security Professional (CISSP)

EC-Council. Certified Ethical Hacker. Program Brochure

2014 Course Catalog

Domain 3 Business Continuity and Disaster Recovery Planning

ITIL V3 Service Operation Certification Program

North American Electric Reliability Corporation (NERC) Cyber Security Standard

CFA. Chartered Financial Analyst

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Domain 5 Information Security Governance and Risk Management

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

WCA WEBINAR SERIES: The Case for Cyber Security Training

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

All students must be proficient with a spreadsheet program and have the following courses (or their equivalent) prior to starting M.S. course work.

The Premier IA & Cyber Security Training Specialist

Scientific Working Group on Digital Evidence (SWGDE)

Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012

Managing and Maintaining a Microsoft Windows Server 2003 Environment

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

technology-based careers

Information Security Principles and Practices

Critical career expertise in the age of technology

Course 20336: Core Solutions of Microsoft Lync Server 2013

The Operating System Lock Down Solution for Linux

Course Outline. Course 20336B: Core Solutions of Microsoft Lync Server Duration: 5 Days

Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services

A Road Map for Advancing Your Career

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

CYBER SECURITY WORKFORCE

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Firefly Acceleration Program for CCIE Data Center Certification

EC-Council. Program Brochure. EC-Council. Page 1

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Risk & Vulnerability Assessment Training

Core Solutions of Microsoft Lync Server 2013

Transcription:

Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management positions. Achieving the Certified Information Systems Security Professional (CISSP)-the world s global security certification standard-proves high proficiency in foundation security principles. Offered through (ISC) 2, the world s leading international security certification organization, the exam s stringent criteria sets the benchmark for excellence in security practice, requiring candidates to prove deep understanding of security concepts, principles, and methodologies. "Great Instructor. Thoroughly covered all topics with expertise. Focused our attention to the pertinent information. This was a Great Experience." -Jeremy P. - Joint Staff, Pentagon The CISSP exam is rigorous, covering ten security domains essential for the protection of information systems, corporations and national infrastructures. Understanding that security is an enterprise wide problem, these domains provide the candidate with a broad understanding of the technical, managerial and human factors that must coordinate effectively to keep information and systems secure. These domains include:

Access Control Application Security Business Continuity Planning and Disaster Recovery Planning Cryptography Legal, Regulations Compliance, and Investigations Operations Security Physical (Environmental) Security Security Architecture and Design Information Security and Risk Management Telecommunications and Network Security Using this course, students prepare for the exam, while at the same time obtaining essential security knowledge that can be immediately used to improve organizational security. This knowledge enhances services and products, secures business functions and infrastructures, provides better implementation processes, and can be used to restructure critical programs and procedures to help keep companies up-to-date on today s business and security strategies, technologies, and best practices. Training is an investment, not an expense. A skilled workforce is a competitive asset. "Please extend my gratitude to all at Logical Security. The CISSP exam test results are in." "I PASSED!!! " Brenda Berry Department of Energy

Course Overview This Logical Security course trains students in all areas of the security Common Body of Knowledge (CBK). They will learn about security policy development, secure software development procedures, network vulnerabilities, attack types and corresponding countermeasures, cryptography concepts and their uses, disaster recovery plans and procedures, risk analysis, crucial laws and regulations, forensics basics, computer crime investigation procedures, physical security, and much, much more. They will explore the contents and concepts that make up the diverse domains and learn how they work together to provide true in-depth defense. 4-Day Course Schedule This course has been designed to provide all the materials needed for 4 full days of instructor led classroom training. Day 1: Information Security and Risk Management; Access Control Day 2: Cryptography; Physical (Environmental) Security Day 3: Security Architecture and Design; Legal, Regulation Compliance, Investigations, and Telecommunications and Network Security Day 4: Business Continuity and Disaster Recovery; Application Security; Operations Security "I had taken a CISSP course offered by another training company. Logical Security s class was much better by far." - Kevin Mangrum, ISSPM/IAPM, U.S. Army Intelligence and Security Command

MATERIALS SUPPLIED A curriculum workbook of 2,000 pages includes: 10 modules covering each of the 10 CBK domains Professionally developed graphics and 3-D animations that enhance the understanding of complex concepts Extensive notes accompanying each slide, including Configuration Steps, Hints, Warnings, Tips, Tables, etc. Quick Tip section, Summary section, Terminology section, and 20 question and answer section for each module Shon Harris CISSP Video Seminar, over 32 hours of classroom instruction "Shon has a great knowledge of the domains of the CISSP. Her presentation drove home the points needed to get certified." -Scott W. - AT&T Federal Solutions

Logical Security exists to provide you and the computing society with the necessary skills and knowledge to properly understand and secure your infrastructure. We are all connected and a compromise in one environment can negatively affect us all. Logical Security is on GSA Schedule and is a Woman, Veteran Owned Business Contact Us Today! Logical Security Colonnade Center 9901 I-10 West, Suite 800 San Antonio, TX 78230 www.logicalsecurity.com info@logicalsecurity.com (888) 373-5116