HRTrainingCenter.com provides Human Resource training on FMLA, COBRA, HIPAA, HRAs (Health Reimbursement Accounts), HSAs (Health Savings Accounts), FLSA, Payroll, Cafeteria Plans, and more through seminars, online training, webcasts, webinars, and audio conferences. Best sellers include FMLA seminars, COBRA seminars, online payroll training, retirement plan training, and HIPAA training.
Course/Product Description
Title:

Information Security Boot Camp

SKU:SM-1005030
Format: In-Person Seminar
Find A Class Near You: View Dates And Locations For This Seminar
Description:

Information Security Boot Camp

This class will help information security practitioners prepare for the CISSP CBK exam, CISM, CISA, or other formal exams in information security or IT controls.

It is also relevant for audit staff who validate and verify core IT systems and risk-related personnel who rely on IT for maintaining corporate and customer systems.

By attending, you will learn aspects of the ISC2 Common Body of Knowledge (CBK) in conjunction with evaluating methods and tools required for essential elements needed to construct or audit a comprehensive information security framework.

Attendees will gain a business-oriented, architectural perspective that defines how to organize and oversee a risk-based enterprise information security program, blending both theories and best management practices with key physical and information technology safeguards.

To reinforce what you learn in the course and to aid anyone preparing for prominent information security certification examinations, attendees will be provided with unit and course review exercises.

Come prepared for five days of intensive learning and return to your office with the foundation of knowledge and know-how needed to take the CISSP exam (or similar), but even more importantly, to help guide your organization as it develops or revises its information security program.


Agenda

Information Security Concepts and Risk Management Practices
  • Fundamental principles of information security
  • Making the business case for information security
  • Information security management objectives
  • Risk analysis: threats, vulnerabilities, risks, and countermeasures
  • Policies, standards, procedures, and guidelines
  • Information classification
  • Security awareness
Laws and Standards Affecting Information Security and IT Audit
  • Computer crimes, investigations, evidence, forensics
  • Laws, directives and regulations
  • Types of laws
  • Privacy issues and legislation
  • Intellectual property, copyright laws and software piracy
  • European Union Data Protection Act
  • Prominent US and international laws
  • Information security and auditing standards
Security Engineering - Security Models, Mechanisms and Architectures
  • Enterprise information security architecture
  • Computer architectures
  • Operating system security
  • Virtualization: operational and security considerations
  • Security models
  • Access control models, techniques and technologies, and methods
  • Open and closed systems
  • Security design standards and criteria: “Rainbow Series”, ITSEC, Common Criteria
  • Certification and accreditation
Network Security Concepts and Solutions
  • Defining a 3-layer simplified network protocol model
  • Open Systems Interconnection (OSI) model
  • Transmission Control Protocol/Internet Protocol (TCP/IP): IPv4, IPv6
  • Network addresses and applications
  • LAN and WAN technologies, topologies and protocols
  • Wiring: copper, fiber optics
  • Wireless networks technologies, protocols and security
  • Voice over IP (VoIP)
  • Network interconnection devices: functionality, risks and safeguards
  • Directory services: LDAP, DNS
  • Network management tools: packet sniffers, SNMP, network utility and diagnostic software
  • Network security vulnerabilities, threats, risks and countermeasures
  • Hacker probing and attack techniques
  • Firewalls and proxy servers
  • Intrusion detection/prevention systems
  • VPNs and related Internet security protocols: SSL/TLS, IPSec, SSH
  • Network discovery, vulnerability and penetration testing
Cryptography
  • Demystifying the language of cryptography
  • Key management: asymmetric, symmetric
  • Encryption algorithms and hashing functions
  • Digital signatures
  • Certificate Authorities (CAs) and Public Key Infrastructure (PKI)
  • Applications of cryptography
  • Cryptography vs. steganography
Identity Management / Access Controls
  • Authentication mechanism: passwords, tokens, smart cards, biometrics
  • Point-to-point protocol (PPP) authentication: PAP, CHAP
  • Extensible authentication protocol: EAP
  • Enterprise authentication systems: RADIUS, TACACS+, Diameter
  • Single/reduced sign-on (SSO): Kerberos, Web-based SSO
Software Development and Application Security
  • System development life cycle methodologies
  • Configuration management and change control
  • Application development tools and methodologies
  • Client server and middleware security
  • Data types and structures
  • Database management systems
  • Web application security architecture: control points, attacks and defenses
  • Mobile code security risks: Java, ActiveX, JavaScript, VBScript
  • Malicious software and hacker attacks
Asset Security (including Physical, Human Resources and Environment)
  • Computing center location, construction and management
  • Physical security threats, vulnerabilities, risks and countermeasures
  • Perimeter security, boundary protection and facilities access controls
  • Electrical, temperature, water, and other environmental controls
  • Fire detection, prevention and suppression
  • Information storage media protection, sanitization and disposal
  • Emergency procedures
  • Human resources security: hiring practices, badges, terminations and transfers
Availability (Data Recovery and Business Continuity Planning)
  • Business continuity planning requirements
  • Business impact analysis
  • Redundancy and fault tolerance
  • Backup procedures: on-site and offsite
  • Backup resources: processing sites, storage, offices, utilities, equipment and supplies
  • Recovery testing procedures
  • Emergency response procedures
Wrap-Up Discussion
  • Includes continuous unit and course review exercises
Learning Level: Intermediate
Prerequisite: IT Auditing and Controls, IT Audit School, or equivalent experience
Advance Preparation: None

About The Provider: Founded in 1978, MIS Training Institute is the international leader in audit and information security training, with offices in the USA, UK, and Asia. MIS' expertise draws on experience gained in training more than 200,000 delegates across five continents.

Helping audit and infosecurity professionals stay at the top of their game has always been at the core of MIS' mission. To that end, MIS has developed and focused its seminars, conferences, and symposia on the wide-ranging needs of internal and IT auditors and information security practitioners who are charged with controlling complex systems and business environments.

MIS' unparalleled course curriculum covers the most up-to-the-minute topics, provides proven audit and security practices, and delivers the information needed to be successful in today's organizations.

All MIS programs are led by industry experts…hands-on pros who have been in the field and who practice what they teach. Attendees of MIS Training Institute events benefit from unbiased practices, proven strategies, and lessons learned in the real-world.

MIS Training Institute is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. NASBA Sponsor Number: 103321

Cancellation/Refund Policy

A full refund less a $100 administrative fee will be given for cancellations received 15 days or more before the event. Tuition is non-refundable for cancellations made 14 days or less before the event. You may, however, transfer your tuition to another MIS Training Institute event, less a $195 administrative fee. Transfers are valid for 12 months from the time of initial cancellation. Substitutions are welcome at any time.

Those who do not cancel before the event date and who do not attend are responsible for the full non-refundable, non-transferable tuition.
Price: $2,895.00
More Info: Contact Us For More Information
Share This: Share on Facebook


Share on Twitter


Share on Google+


Currently Scheduled Dates For This Seminar
Course TitleCity/StateDate
Information Security Boot CampNew York, NY2/12/2018
Information Security Boot CampWashington DC, DC5/21/2018
Information Security Boot CampBoston, MA8/13/2018
Information Security Boot CampChicago, IL11/5/2018

How To Use HR Metrics
How To Use HR Metrics

Serious Complaint or Employee Drama?
Serious Complaint or Employee Drama?

Successful Strategies For Running An ′HR Department Of One′
Successful Strategies For Running An ′HR Department Of One′

How To Conduct A Reasonable Accommodation Discussion
How To Conduct A Reasonable Accommodation Discussion

Benefits Of An HR Audit
Benefits Of An HR Audit

How To Conduct Employee Relations Investigations
How To Conduct Employee Relations Investigations

Preventing Workplace Harassment and Bullying - What Every HR Professional Should Know

Internal Investigations Certificate Program
Internal Investigations Certificate Program

How Workers′ Compensation Works (Comprehensive 11-Module Course)
How Workers′ Compensation Works (Comprehensive 11-Module Course)

Certificate Program For HR Generalists
Certificate Program For HR Generalists

Return-To-Work Strategies
Return-To-Work Strategies

How To Write An Affirmative Action Plan
How To Write An Affirmative Action Plan

Managing Unemployment Insurance Costs, Risks, and Opportunities
Managing Unemployment Insurance Costs, Risks, and Opportunities

Tips For Tracking, Monitoring, And Managing Your Workers′ Comp Claims
Tips For Tracking, Monitoring, And Managing Your Workers′ Comp Claims

Certificate Program In FMLA &ADA Compliance
Certificate Program In FMLA &ADA Compliance

Bring Our Training Courses To Your Location
Bring Our Training Courses To Your Location

Google+HRTrainingCenter.com. 5755 North Point Parkway, Suite 228 | Alpharetta, GA 30022 | 770-410-1219 | support@HRTrainingCenter.com
Copyright HRTrainingCenter.com 2017 | Web Site Development by OTAU
Facebook