Freitag, Januar 31, 2003

Certified Information Systems Security Professionell
Udo Blumenthal's avatar

IT Certified GmbHJanuar 2003

Having Met all of certification requirements, whisch include the professional experience prerequisite, adoption of the (ISC) Code of Ethics, and successful performance on the required competence examination, subject to recertification every three pears, this individual is entitleb to all of the rights and privileges associated with this designation, als defined in the (ISC)

Weitere Informationen zur Qualifikation:

CISSP (Certified Information Systems Security Professional) gehört zu den international am meisten respektierten und am meisten gesuchten Zertifizierungen im Bereich IT-Security am Markt.

Zielgruppen:
Network-Administratoren, Sicherheitsbeauftragte Access Control Systems & Methodology

  • Identification, Authentication, Authorization and Accountability
  • Single Sign-On Technologies
  • Access Control Models and Techniques (DAC, MAC, Rule-Based, Role-Based,..)
  • Access Control Administration (RADIUS, TACACS, DIAMETER)
  • Access Control Methods

Applications & Systems Development

  • The Software Life Cycle
  • Object-Oriented Systems
  • Database Systems
  • Artificial Intelligence Systems

Business Continuity Planning

  • Defining a Disaster
  • Disaster Recovery vs. Business Continuity
  • Business Impact Analysis
  • Contigency Planning Requirements
  • Backup Alternatives
  • Recovery and Restoration
  • Testing
  • Emergency Response

Cryptography

  • History
  • Definitions
  • Symmetric Key Cryptography Algorithms
  • Asymmetric Key Cryptography Algorithms
  • Public Key Infrastructure
  • Message Integrity
  • Key management
  • E-Mail Standards
  • Internet Security
  • Attacks

Law, Investigation & Ethics

  • Types of Computer Crime
  • Intellectual Property Laws
  • Laws, Directives, and Regulations
  • Computer Crime Investigations
  • Liability
  • Ethics

Operations Security

  • Security Operations Concepts
  • Security Operations Management
  • Security Controls
  • Monitoring
  • Auditing

Physical Security

  • Physical Security Threats
  • Facility Requirements Planning
  • Environmental Issues
  • Administrative Controls for Physical Security
  • Perimeter Security

Security Architecture & Models

  • Computer Architecture
  • System Architecture
  • Security Models
  • Security Modes of Operation
  • Orange Book, ITSec, Common Criteria
  • Certification, Accreditation
  • Open versus Closed Systems

Security Management Practices

  • Security Management
  • Fundamental Principles of Security
  • Risk Management
  • Risk Analysis

Telecommunications, Network & Internet Security

  • Telecommunication and Network Security
  • Open System Interconnect Model
  • TCP/IP
  • Networking
  • Types of Transmissions
  • LANs
  • Protocols
  • Networking Devices
  • WANs
  • Remote Access
  • Network and Resource Availability

weiterführender Link

Dokument Download

Udo Blumenthal's avatar

(0) KommentareArtikellink Artikel Empfehlen


Dieser Eintrag wurde 1077 mal gelesen.

Next entry: Cybercrime 2003

Previous entry: Deutscher Investment Trust (DIT) Frankurt

Dieser Eintrag kann nicht mehr kommentiert werden.

Zurück zur Startseite