פרטים נוספים
whatsapp
לימודי הייטק ב-INT LIVE
טלפון

CISSP

The CISSP training course covers topics such as Access Control Systems, Cryptography, and
Security Management Practices, teaching students the eight domains of information system
security knowledge.

 תאריך הקורס: 18/11/2024
 17:30-20:30

מהו קורס CISSP?

The CISSP training course covers topics such as Access Control Systems, Cryptography, and
Security Management Practices, teaching students the eight domains of information system
security knowledge. The CISSP Certification is administered by the International Information
Systems Security Certification Consortium or (ISC)2. The CISSP certification provides
information security professionals with not only an objective measure of competence, but a
globally recognized standard of achievement.

תיאור הקורס

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  •  Identity and Access Management
  •  Security Assessment and Testing
  •  Security Operation
  • Software Development Security

היקף שעות

40 שעות אקדמיות, 8 מפגשים.

קהל יעד ותנאי קבלה

Experienced IT security-related practitioners, auditors, consultants, investigators or instructors, including network or security analysts and engineers, network administrators, information security specialists and risk management professionals, who wish to advance
their current computer security careers

יתרונות הקורס

  • למידת תחום מבוקש מאוד בתעשייה ובקרב חברות הייטק
  • מרצים מומחים מהתעשייה
  • תוכנית לימודים מתקדמת המותאמת לדרישות המקובלות בתעשייה

תוכנית לימודים

1
צורה
1

Module 1

o Confidentiality, integrity, and availability concepts
o Security governance principles
o Compliance
o Legal and regulatory issues
o Professional ethic
o Security policies, standards, procedures, and guidelines

Security and Risk Management

2
צורה
2

Module 2

o Information and asset classification
o Ownership (e.g. data owners, system owners)
o Protect privacy.
o Appropriate retention
o Data security controls
o Handling requirements (e.g. markings, labels, storage)

Asset Security

3
צורה
3

Module 3

o Engineering processes using secure design principles.
o Security models fundamental concepts
o Security evaluation models
o Security capabilities of information systems
o Security architectures, designs, and solution elements vulnerabilities
o Web-based systems vulnerabilities
o Mobile systems vulnerabilities
o Embedded devices and cyber-physical systems vulnerabilities
o Cryptography
o Site and facility design secure principles.
o Physical security

Security Engineering

4
צורה
4

Module 4

o Secure network architecture design (e.g. IP & non-IP protocols,
segmentation)
o Secure network components
o Secure communication channels
o Network attacks.

Communication and Network Security

5
צורה
5

Module 5

o Physical and logical assets control
o Identification and authentication of people and devices
o Identity as a service (e.g. cloud identity)
o Third-party identity services (e.g. on-premises)
o Access control attacks
o Identity and access provisioning lifecycle (e.g. provisioning review)

Identity and Access Management

6
צורה
6

Module 6

o Assessment and test strategies
o Security process data (e.g. management and operational controls)
o Security control testing
o Test outputs (e.g. automated, manual)
o Security architectures vulnerabilities

Security Assessment and Testing

7
צורה
7

Module 7

o Investigations support and requirements
o Logging and monitoring activities
o Provisioning of resources
o Foundational security operations concepts
o Resource protection techniques
o Incident management
o Preventative measures
o Patch and vulnerability management.
o Change management processes.
o Recovery strategies
o Disaster recovery processes and plans
o Business continuity planning and exercises
o Physical security
o Personnel safety concerns

Security Operations

8
צורה
8

Module 8

o Security in the software development lifecycle
o Development environment security controls
o Software security effectiveness
o Acquired software security impact.

Software Development Security

הרשמה לקורס


    שיחה עם נציג

    דילוג לתוכן