Course Outline
Introduction
Overview of Information Systems Security
Physical and Environmental Security
Information Security and Risk Management
Access Control Systems
Cryptography
Security Architecture and Design
Business Continuity and Disaster Recovery Planning
Telecommunications and Network Security
Application Security
Operations Security
Legal, Regulations, Compliance and Investigations
Troubleshooting
Summary and Conclusion
Requirements
- An understanding of security concepts
- Experience managing or administering information systems.
Audience
- Security engineers
- Architecture engineers
- Technical managers
Testimonials (4)
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
I extracted valuable information that I will be able to present in my company as a solution to one of the processes
Paweł - Santander
Course - Public Key Infrastructure
Machine Translated