What you will learn
The five-day review seminar will cover the following 10 topics:
- Access Control: a collection of mechanisms that work together to create security architecture to protect the assets of the information system.
- Telecommunications and Network Security: network structures, transmission methods, transport formats and security measures used to provide availability, integrity, and confidentiality.
- Information Security Governance and Risk Management: the identification of an organization's information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines.
- Software Development Security: the controls that are included within systems and applications software and the steps used in their development.
- Cryptography: the principles, means, and methods of disguising information to ensure its integrity, confidentiality, and authenticity.
- Security Architecture and Design: the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity and availability.
- Operations Security: the controls over hardware, media, and the operators with access privileges to any of these resources.
- Business Continuity and Disaster Recovery Planning: steps to preserve the business in the face of major disruptions to normal business operations.
- Legal, Regulations, Investigations, and Compliance: computer crime laws and regulations; the investigative measures and techniques which can be used to determine if a crime has been committed and methods to gather evidence.
- Physical (Environmental) Security: the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise's resources and sensitive information.