Datum auswählen
Programm
SECURITY AND RISK MANAGEMENT; Confidentiality, integrity, and availability concepts ; Security governance principles; Compliance; Legal and regulatory issues; Professional ethic; Security policies, standards, procedures and guidelines; ASSET SECURITY; Information and asset classification; Ownership (e.g. data owners, system owners); Protect privacy; Appropriate retention; Data security controls; Handling requirements (e.g. markings, labels, storage); SECURITY ENGINEERING; Engineering processes using secure design principles; Security models fundamental concepts; Security evaluation models; Security capabilities of information systems; Security architectures, designs, and solution elements vulnerabilities; Web-based systems vulnerabilities; Mobile systems vulnerabilities; Embedded devices and cyber-physical systems vulnerabilities; Cryptography; Site and facility design secure principles; Physical security; COMMUNICATIONS AND NETWORK SECURITY; Secure network architecture design (e.g. IP & non-IP protocols, segmentation); Secure network components; Secure communication channels; Network attacks; IDENTITY AND ACCESS MANAGEMENT; Physical and logical assets control; Identification and authentication of people and devices; Identity as a service (e.g. cloud identity); Third-party identity services (e.g. on-premise); Access control attacks; Identity and access provisioning lifecycle (e.g. provisioning review); SECURITY ASSESSMENT AND TESTING; Assessment and test strategies; Security process data (e.g. management and operational controls); Security control testing; Test outputs (e.g. automated, manual); Security architectures vulnerabilities; SECURITY OPERATIONS; Investigations support and requirements; Logging and monitoring activities; Provisioning of resources; Foundational security operations concepts; Resource protection techniques; Incident management; Preventative measures; Patch and vulnerability management; Change management processes; Recovery strategies; Disaster recovery processes and plans; Business continuity planning and exercises; Physical security; Personnel safety concerns; SOFTWARE DEVELOPMENT SECURITY; Security in the software development lifecycle; Development environment security controls; Software security effectiveness; Acquired software security impact;
Ziele
Diese Zertifizierung ist ideal für alle zum Nachweis der technischen und administrativen Kenntnisse im Bereich der IT- und Informationssicherheit. Die Prüfung zum Certified Information Systems Security Professional CISSP® bietet Security Professionals neben einer objektiven Bewertung ihrer Kompetenz bei Bestehen auch eine der international meist respektierten und gesuchten Sicherheitszertifizierungen.
Voraussetzungen
Erfahrung im Bereich der IT- und Informationssicherheit
Noch nicht bewertet
Datum auswählen
Verfügbarkeit
12 Freie Plätze
Buchbar bis Mo. 24. August 2020, 07:00
Stornierbar bis Fr. 21. August 2020, 07:00