Certified Information Specialist Security Professional (CISSP)

 

Kursinhalt

SECURITY AND RISK MANAGEMENT
  • Confidentiality, integrity, and availability concepts
  • Security governance principles
  • Compliance
  • Legal and regulatory issues
  • Professional ethic
  • Security policies, standards, procedures and guidelines
ASSET SECURITY
  • Information and asset classification
  • Ownership (e.g. data owners, system owners)
  • Protect privacy
  • Appropriate retention
  • Data security controls
  • Handling requirements (e.g. markings, labels, storage)
SECURITY ENGINEERING
  • Engineering processes using secure design principles
  • Security models fundamental concepts
  • Security evaluation models
  • Security capabilities of information systems
  • Security architectures, designs, and solution elements vulnerabilities
  • Web-based systems vulnerabilities
  • Mobile systems vulnerabilities
  • Embedded devices and cyber-physical systems vulnerabilities
  • Cryptography
  • Site and facility design secure principles
  • Physical security
COMMUNICATIONS AND NETWORK SECURITY
  • Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
  • Secure network components
  • Secure communication channels
  • Network attacks
IDENTITY AND ACCESS MANAGEMENT
  • Physical and logical assets control
  • Identification and authentication of people and devices
  • Identity as a service (e.g. cloud identity)
  • Third-party identity services (e.g. on-premise)
  • Access control attacks
  • Identity and access provisioning lifecycle (e.g. provisioning review)
SECURITY ASSESSMENT AND TESTING
  • Assessment and test strategies
  • Security process data (e.g. management and operational controls)
  • Security control testing
  • Test outputs (e.g. automated, manual)
  • Security architectures vulnerabilities
SECURITY OPERATIONS
  • Investigations support and requirements
  • Logging and monitoring activities
  • Provisioning of resources
  • Foundational security operations concepts
  • Resource protection techniques
  • Incident management
  • Preventative measures
  • Patch and vulnerability management
  • Change management processes
  • Recovery strategies
  • Disaster recovery processes and plans
  • Business continuity planning and exercises
  • Physical security
  • Personnel safety concerns
SOFTWARE DEVELOPMENT SECURITY
  • Security in the software development lifecycle
  • Development environment security controls
  • Software security effectiveness
  • Acquired software security impact

Preise & Trainingsmethoden

Online Training

Dauer
5 Tage

Preis
  • 3.290,– €
Classroom Training

Dauer
5 Tage

Preis
  • Österreich: 3.290,– €

Kurstermine

FLEX Classroom Training (Hybrid-Kurs):   Kursteilnahme wahlweise vor Ort im Klassenraum oder online vom Arbeitsplatz oder von zu Hause aus.

Deutsch

Zeitzone: Mitteleuropäische Zeit (MEZ)   ±1 Stunde

Online Training
Klassenraum-Option: Wien
Zeitzone: Mitteleuropäische Zeit (MEZ)
Online Training
Klassenraum-Option: Wien
Zeitzone: Mitteleuropäische Sommerzeit (MESZ)
Online Training
Klassenraum-Option: Wien
Zeitzone: Mitteleuropäische Sommerzeit (MESZ)
Online Training
Klassenraum-Option: Wien
Zeitzone: Mitteleuropäische Sommerzeit (MESZ)
Online Training
Klassenraum-Option: Wien
Zeitzone: Mitteleuropäische Sommerzeit (MESZ)
Online Training
Klassenraum-Option: Wien
Zeitzone: Mitteleuropäische Sommerzeit (MESZ)
FLEX Classroom Training (Hybrid-Kurs):   Kursteilnahme wahlweise vor Ort im Klassenraum oder online vom Arbeitsplatz oder von zu Hause aus.

Österreich

Wien
Wien
Wien
Wien
Wien
Wien