Vendor: Mile2

Tehnologije: Cyber Security

CISSO može implementirati i održavati troškovno učinkovite sigurnosne kontrole koje su usklađene s poslovnim i industrijskim standardima. Ova edukacija idealna je način povećanja znanja, stručnosti i vještina menadžera, revizora i INFOSEC profesionalaca. CISSO certifikacija jamči provjerenu sposobnost pojedinca da upravlja i vodi sigurnosne funkcije organizacija. Certifikacija profesionalcima osigurava posjedovanje tehničke dubine, ali i menadžerske razine kompetencija za učinkovito upravljanje sigurnosnom strategijom i operacijama organizacije. CISSO Common Body of Knowledge (CBK®) pokriva široku lepezu tema, osiguravajući relevantnost na svim područjima informacijske sigurnosti. Uspješni kandidati pokazati će stručnost u jedanaest domena (Risk Management; Security Management; Identification, Authentication, Authorization and Accounting; Operations Security; Symmetric Cryptography, Asymmetric Cryptography and Hashing; Network Concepts, Design and Attacks; Enterprise Security Architecture and Attacks; Software Development Security; Malware and Attacks; Business Continuity; Incident Management, Law and Ethics).

Osnovne informacije

Move Icon

Moduli koji će se izvoditi

  • Risk Definitions
  • Risk Management
  • Risk Assessment
  • Responding to Risk
  • Understanding Security
  • Information Security Management System
  • Roles and Responsibility
  • Security Frameworks
  • Human Resources
  • Identity Management
  • Authentication Techniques
  • Single Sign-on
  • Access Control Monitoring
  • Access Control Types and Characteristics
  • Information Classification
  • Access Control Models and Techniques
  • Access Control Methods
  • Trusted Computing Base
  • Protection Mechanisms
  • Security Models
  • Evaluation Criteria
  • Administrative Management Responsibilities
  • Product Implementation Management
  • Redundancy and Fault Tolerance
  • Operational Issues and Responses
  • Threats to Operations
  • Cryptography Terms
  • Historical Uses of Cryptography
  • Cryptography Foundations
  • Modern Cryptography
  • Hashing
  • Asymmetric Cryptography
  • Hybrid Crypto and Digital Signatures
  • Public Key Infrastructure
  • Cryptography in Use
  • Attacks on Cryptography
  • Network and Communications Security
  • Topologies
  • Cabling
  • LAN and WAN
  • OSI Model
  • Network Devices
  • Network Security Sentries
  • Ports, Protocols and Services
  • Telephony
  • VPNs
  • Wireless
  • Network Based Attacks
  • Security Architecture
  • Architectural Models
  • System Threats
  • Software Security Concerns
  • Software Lifecycle Development Processes
  • Web Application Security
  • PCI-DSS Compliance
  • Database Models &Terminology
  • Database Security Issues
  • Artificial Intelligence
  • Project Initiation
  • Business Impact Analysis
  • Determining Recovery Strategies
  • Writing the Plan
  • Preparing for a Disaster
  • Introduction to Business Continuity Management
  • Incident Management
  • Law
  • Computer Crime
  • Evidence Handling
  • Privacy Legislations
  • Ethics
  • Facility Location and Construction
  • Risks, Threats and Countermeasures
  • Perimeter Protection
  • Electrical Power Issues
  • Fire Prevention, Detection and Suppression
  •  

Brzi upit

Prijavite se

Lokacija 

Trajanje: 40 sati

Brzi upit