• CATALOG
  • MILITARY
  • LOGIN
Capital Community College
Home > Training Programs > Security > Information Security Training
Contact: Odile Dilone
(860) 906-5141 ODilone@ccc.commnet.edu
CALL
NOW

855.520.6806

Fill out the form below

Close Window

Thank you for your interest in this program. We should be contacting you shortly.

Close Window

Information Security Training

information-security-training
$1,795.00 (USD)

OVERVIEW

DETAILS

OUTLINE

Certified Information Systems Security Professional (CISSP)
 
  I.    Security and Risk Management
                A.     Introduction
                B.    CIA Triad Security Governance Part 1
                C.    CIA Triad Security Governance Part 2
                D.    Compliance Legal & Regulatory Issues Part 1
                E.    Compliance Legal & Regulatory Issues Part 2
                F.    Understanding Professional Ethics Part 1
                G.    Understanding Professional Ethics Part 2
                H.    Risk Management Part 1
                I.    Risk Management Part 2
                J.    Threat Modeling Acquisition Strategy & Practice Security Awareness & Training Part 1
                K.    Threat Modeling Acquisition Strategy & Practice Security Awareness & Training Part 2
    II.    Asset Security
                A.    Asset Security Part 1
                B.    Asset Security Part 2
    III.    Security Engineering
                A.    Engineering & Management of Security Part 1
                B.    Engineering & Management of Security Part 2
                C.    Engineering & Management of Security Part 3
                D.    Engineering & Management of Security Part 4
                E.    Engineering & Management of Security Part 5
                F.    Engineering & Management of Security Part 6
    IV.    Communication and Network Security
                A.    Apply Secure Design Principles to Networks Part 1
                B.    Apply Secure Design Principles to Networks Part 2
                C.    Apply Secure Design Principles to Networks Part 3
                D.    Apply Secure Design Principles to Networks Part 4
                E.    Apply Secure Design Principles to Networks Part 5
                F.    Apply Secure Design Principles to Networks Part 6
                G.    Securing Network Components Part 1
                H.    Securing Network Components Part 2
                I.    Design & Establish Secure Communication Channels Part 1
                J.    Design & Establish Secure Communication Channels Part 2
                K.    Design & Establish Secure Communication Channels Part 3
    V.    Identity and Access Management
                A.    Controlling Access & Managing Identity Part 1
                B.    Controlling Access & Managing Identity Part 2
                C.    Controlling Access & Managing Identity Part 3
                D.    Controlling Access & Managing Identity Part 4
    VI.    Security Assessment Testing
                A.    Designing Performing & Analyzing Security Testing
    VII.    Security Operations
                A.    Foundational Concepts & Investigations Part 1
                B.    Foundational Concepts & Investigations Part 2
                C.    Incident Management & Preventative Measures Part 1
                D.    Incident Management & Preventative Measures Part 2
                E.    Disaster Recovery Process Part 1
                F.    Disaster Recovery Process Part 2
    VIII.    Software Development Security
                A.    Understanding Applying & Enforcing Software Security Part 1
                B.    Understanding Applying & Enforcing Software Security Part 2
                C.    Conclusion

Certified Information Systems Auditor (CISA)
    I. Module 1
                A.        Introduction
                B.        Audit Process
                C.        Auditing Standards
                D.        Auditing Guidelines
                E.        Cobit Model
                F.        Audit Management
                G.        Internal Control Classifications
                H.        Planning
                I.        Program
                J.        Evidence
                K.        Audit Control Evaluation
                L.        C S A Control Self- Assessment
    II. Module 2
                A.        IT Governance
                B.        Outsourcing & Governance
                C.        IT Strategy
                D.        Governance & Security Policies
                E.        Organizational Compliance
                F.        Outsourcing & Globalization
                G.        Outsourcing
                H.        IT Performance
    III. Module 3
                A.        System & Infrastructure
                B.        Requirements
                C.        Project Management Tools- Part 1
                D.        Project Management Tools- Part 2
                E.        Applications
                F.        Agile Development
                G.        Monitoring & Controlling
                H.        Acquisition Process
                I.        Testing Process
                J.        Information Systems Maintenance Practices
                K.        Data Conversion Tools
    IV. Module 4
                A.        Media Disposal Process
                B.        Post Implementation Review
                C.        Periodic Review
                D.        System Maintenance
    V. Module 5
                A.        IT Service Delivery & Support
                B.        How to Evaluate Service Level Management Practices
                C.        Operations Management
                D.        Databases
                E.        Structured Query Language
                F.        Monitoring Performance
                G.        Source Code & Performance Monitoring
                H.        Patch Management
                I.        Incident Management
                J.        Hardware Component Types
                K.        Network Component Types
    VI. Module 6
                A.        S Auditor Technical Overview
                B.        Security Design
                C.        Monitoring Systems
                D.        Types of Attacks
                E.        Cryptography
                F.        Encryption
                G.        Asymmetric Encryption
                H.        Digital Certificate
                I.        Different Kinds of Attacks
                J.        Access Controls
                K.        Identification & Authentication
                L.        Physical Access Exposure
                M.        Environmental Security
                N.        Network Security Devices & Network Components
                O.        Network Address Translation
                P.        Virtual Private Networks
                Q.        Voice System Risks
                R.        Intrusion Detection
                S.        Firewalls
                T.        Firewall Implementation
                U.        Network Access Protection
                V.        Honey Pot
                W.        Risks to Portable & Wireless Devices
                X.        Bluetooth
                Y.        OSI Networking
                Z.        Managing Data
    VII. Module 7
                A.        Business Continuity & Disaster Recovery
                B.        Fault Tolerance
                C.        Business Continuity & Disaster Recovery Regulations


Certified Information Security Manager (CISM)

I. Module 1: Information Security Governance
II. Module 2: Risk Management
III. Module 3: Information Security Program Development
IV. Module 4: Information Security Program Implementation
V. Module 5: Information Security Program Management
VI. Module 6: Incident Management and Response 

REQUIREMENTS

PREREQUISITES

INSTRUCTOR

FAQS

Capital Community College
Business & Industry
950 Main Street
Continuing Education
Hartford, CT 06103 US
MAIN CONTENT

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning.