In this course, we will explore everything good test takers do “prior” to taking a professional certification exam.

The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+┬áexam is an internationally recognized validation of foundation-level security skills and knowledge,┬áand is used by organizations and security professionals around the globe. The CompTIA Security+ exam will certify that the successful candidate has the knowledge and┬áskills required to identify risk, to participate in risk mitigation activities, […]

    Enterprise Security Management Practices Enterprise Governance Security Roles & Responsibilities Enterprise-Wide System Development Security Domain SDLC Security System Testing Certification and Accreditation Overseeing Compliance of Security Operations Operations Security Issues Auditing Compliance Configuration Management Penetration & Vulnerability Testing BCP / DRP and COOP BCP DRP Project Planning BIA Recovery Strategies Plan Design Law Investigation, Forensic […]

Security Authorization of IS Introduction Key Elements of an Enterprise System Authorization Program NIST 800-37 System Authorization Roles and responsibilities System Authorization Life Cycle Why System Authorization Programs Fail System Authorization Project Planning System Inventory Process Interconnected Systems Information System Categorization Introduction Defining Sensitivity Data Sensitivity and System Sensitivity Sensitivity Assessment Process Data Classification Approaches Responsibility for […]

This course is the Step-By-Step guide to preparing for the Certified Information Systems Auditor CISA exam. ┬á ┬áThis is not an ISACA course or official training. ┬áThis is a classroom tried and true teaching method to prepare for advanced certifications. ┬áThe subject matter of CISA will specifically be used to demonstrate the method of instruction to teach […]

Physical Security Policies and Standards Physical Security Risks Unauthorized Access Physical Security Needs and Organization Drivers Facility Risk Restricted Work Areas Protection Plans Evacuation Drills Incident Response Design Validation Penetration Tests Access Control Violation Monitoring

Planning Phases and Deliverables Risk Analysis Natural hazard Risks Human-Made Risks and Threats Industry Risks Do Not Forget the Neighbors! Business Impact Analysis Data Stored in Electronic Form Remote Replication and Off-Site Journaling Backup Strategies Selecting A Recovery Strategy for Technology Cost-Benefit Analysis Implementing Recovery Strategies Documenting the Plan The Human Factor Logistics Plan Maintenance Strategies Sample […]

  Risk Analysis Quantitative Risk Analysis Qualitative Risk Analysis Risk Theory Attack Vectors Methods of Vector Attack Attack By Email Attack By Deception Hoaxes Hackers Web Page Attack Attack of the Worms Malicious Macros Instant Messaging, IRC, P2P File Sharing Networks Viruses Asset And Data Value Corporate Versus Departmental Valuation Business, Legal and regulatory Requirements Product Assurance […]

Cryptography Principles Applications of Cryptography Benefits Uses Message Encryption Security IP Communication Remote Access Secure IP Communication Remote Access Secure Wireless Communication Others Identification and Authentication Storage Encryption Electronic commerce Software Code Signing Interoperability Methods of Cryptography Symmetric Block Stream Asymmetric Hash Functions and MAC DS Vet Proprietary Cryptography & ┬áDesign Testable Cryptographic Systems Computational Overhead & […]