CISSP 2013 Domain: Business Continuity and Disaster Recovery Planning
Business continuity is an essential part of any enterprise. When a disaster occurs, it is imperative that a company be prepared, and has policies and people in place to step in and restore normal ...
CISSP 2013 Domain: Cryptography
Cryptography has been used for thousands of years to secure messages, identities, vital information, and communications mechanisms. This course covers the invention of cryptography, the use of ...
CISSP 2013 Domain: Information Security Governance and Risk Management
Information Security Governance and Risk Management is an all encompassing domain that the information security professional must constantly be aware of. This course examines the frameworks and ...
CISSP 2013 Domain: Legal, Regulations, Investigations, and Compliance
Computer crime is a major area of concern for everyone from the standard end user to the enterprise environment. Government agencies and corporate groups have come together to create rules and laws ...
CISSP 2013 Domain: Operations Security
In today's enterprise environment, security operations takes on many faces, but always comes back to making sure that all aspects of the operation of an enterprise environment are secured and ...
CISSP 2013 Domain: Physical (Environment) Security
Physical security is the foundation for all networking security mechanisms. Unless a network is physically secure from threats, all other types of security can be negated. This course focuses on the ...
CISSP 2013 Domain: Security Architecture and Design
Computer administrators have a variety of mechanisms that can be used to secure modern enterprise environments. Several access control standards and models have been created by the international ...
CISSP 2013 Domain: Software Development Security
Poorly written systems or applications can allow an attacker to exploit coding errors and thus interrupt the orderly processes of the system or application. This course discusses methods to increase ...
CISSP 2013 Domain: Telecommunications and Network Security
Access to a company's resources through unauthorized means is the number one goal of most attackers. The security professional must understand the proper countermeasures in order to stop attacks on ...
Essentials 1: Firewall Installation, Configuration & Management
Students must have a basic familiarity with networking concepts including routing, switching and IP addressing. Students should also be familiar with the traditional role of a firewall in network ...