Thu Jan 24, 6:00 PM - Thu Mar 28, 9:00 PM
11500 Blankenbaker Access Drive, Louisville, KY
Community: Jeffersontown
Description
This is 10 week CISSP Evening Boot Camp that runs for 10 weeks on Thursday evenings from 6-9pm with a Saturday Session at the half way mark. The class is taught by Jeff Jarecki. Live-Instructor Led in Louisville, Kentucky with an option to attend remotely. Course Outl
Event Details
This is 10 week CISSP Evening Boot Camp that runs for 10 weeks on Thursday evenings from 6-9pm with a Saturday Session at the half way mark. The class is taught by Jeff Jarecki. Live-Instructor Led in Louisville, Kentucky with an option to attend remotely.
Course Outline:
This training provides a comprehensive review of information security concepts and industry best practices, covering the 8 domains of the CISSP CBK:
Security and Risk Management
Asset Security
Security Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security
Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions,
This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the CISSP exam and features: Who should attend? This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and certificationto acquire the credibility and mobility to advance within their current information
security careers. The training seminar is ideal for those working in positions such as, but not limited to:
Security Consultant
Security Manager
IT Director/Manager
Security Auditor
Security Architect
Security Analyst
Security Systems Engineer
Chief Information Security Officer
Director of Security
Network Architect
Learning Objectives
Understand and apply the concepts of risk assessment, risk analysis, data classification, and security awareness and Implement risk management and the principles used to support it (Risk avoidance, Risk acceptance, Risk mitigation, Risk transference)
Apply a comprehensive and rigorous method for describing a current and/or future structure and behavior for an organization's security processes, information security systems, personnel, and organizational sub-units so that these practices and processes align with the organization
Course Outline:
This training provides a comprehensive review of information security concepts and industry best practices, covering the 8 domains of the CISSP CBK:
Security and Risk Management
Asset Security
Security Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security
Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions,
This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the CISSP exam and features: Who should attend? This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and certificationto acquire the credibility and mobility to advance within their current information
security careers. The training seminar is ideal for those working in positions such as, but not limited to:
Security Consultant
Security Manager
IT Director/Manager
Security Auditor
Security Architect
Security Analyst
Security Systems Engineer
Chief Information Security Officer
Director of Security
Network Architect
Learning Objectives
Understand and apply the concepts of risk assessment, risk analysis, data classification, and security awareness and Implement risk management and the principles used to support it (Risk avoidance, Risk acceptance, Risk mitigation, Risk transference)
Apply a comprehensive and rigorous method for describing a current and/or future structure and behavior for an organization's security processes, information security systems, personnel, and organizational sub-units so that these practices and processes align with the organization