Ultimate Test Taking Clinic

In this course, we will explore everything good test takers do “prior” to taking a professional certification exam.

Security Plus SY0-401

The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe. The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk, to participate in risk … Read moreSecurity Plus SY0-401

ISSMP – Information System Security Management Professional

    Enterprise Security Management Practices Enterprise Governance Security Roles & Responsibilities Enterprise-Wide System Development Security Domain SDLC Security System Testing Certification and Accreditation Overseeing Compliance of Security Operations Operations Security Issues Auditing Compliance Configuration Management Penetration & Vulnerability Testing BCP / DRP and COOP BCP DRP Project Planning BIA Recovery Strategies Plan Design Law … Read moreISSMP – Information System Security Management Professional

CAP – Certification Authorization Professional

Security Authorization of IS Introduction Key Elements of an Enterprise System Authorization Program NIST 800-37 System Authorization Roles and responsibilities System Authorization Life Cycle Why System Authorization Programs Fail System Authorization Project Planning System Inventory Process Interconnected Systems Information System Categorization Introduction Defining Sensitivity Data Sensitivity and System Sensitivity Sensitivity Assessment Process Data Classification Approaches … Read moreCAP – Certification Authorization Professional

CISA

This course is the Step-By-Step guide to preparing for the Certified Information Systems Auditor CISA exam.    This is not an ISACA course or official training.  This is a classroom tried and true teaching method to prepare for advanced certifications.  The subject matter of CISA will specifically be used to demonstrate the method of instruction … Read moreCISA

ISSAP – Physical Security Considerations

Physical Security Policies and Standards Physical Security Risks Unauthorized Access Physical Security Needs and Organization Drivers Facility Risk Restricted Work Areas Protection Plans Evacuation Drills Incident Response Design Validation Penetration Tests Access Control Violation Monitoring

ISSAP – Technology Related BCP & DRP

Planning Phases and Deliverables Risk Analysis Natural hazard Risks Human-Made Risks and Threats Industry Risks Do Not Forget the Neighbors! Business Impact Analysis Data Stored in Electronic Form Remote Replication and Off-Site Journaling Backup Strategies Selecting A Recovery Strategy for Technology Cost-Benefit Analysis Implementing Recovery Strategies Documenting the Plan The Human Factor Logistics Plan Maintenance … Read moreISSAP – Technology Related BCP & DRP

ISSAP – Security Architecture Analysis

  Risk Analysis Quantitative Risk Analysis Qualitative Risk Analysis Risk Theory Attack Vectors Methods of Vector Attack Attack By Email Attack By Deception Hoaxes Hackers Web Page Attack Attack of the Worms Malicious Macros Instant Messaging, IRC, P2P File Sharing Networks Viruses Asset And Data Value Corporate Versus Departmental Valuation Business, Legal and regulatory Requirements … Read moreISSAP – Security Architecture Analysis

ISSAP – Cryptography

Cryptography Principles Applications of Cryptography Benefits Uses Message Encryption Security IP Communication Remote Access Secure IP Communication Remote Access Secure Wireless Communication Others Identification and Authentication Storage Encryption Electronic commerce Software Code Signing Interoperability Methods of Cryptography Symmetric Block Stream Asymmetric Hash Functions and MAC DS Vet Proprietary Cryptography &  Design Testable Cryptographic Systems Computational … Read moreISSAP – Cryptography

Help-Desk
UA-46837009-1