CPATrainingCenter.com offers CPA exams, accounting degree training, CPE, and professional development for accountants and CPAs
Course/Product Description
Title:

Information Security Boot Camp

SKU:SE-1218581
Format: Seminar
Order:Qty:
Metropolitan Area: Chicago
Event Venue: MicroTek Computer Lab CH
Address: 230 West Monroe St
Suite 900
Chicago, IL 60606
Contact Phone: 770-410-9941
Starting Date / Time: 9/25/2017  -  Days 1-4: 8:30am - 5:00pm, Day 5: 8:30am - 3:00pm
Duration:5 days
Other Options: View Other Cities And Dates
Description:

Information Security Boot Camp

This class will help information security practitioners prepare for the CISSP CBK exam, CISM, CISA, or other formal exams in information security or IT controls.

It is also relevant for audit staff who validate and verify core IT systems and risk-related personnel who rely on IT for maintaining corporate and customer systems.

By attending, you will learn aspects of the ISC2 Common Body of Knowledge (CBK) in conjunction with evaluating methods and tools required for essential elements needed to construct or audit a comprehensive information security framework.

Attendees will gain a business-oriented, architectural perspective that defines how to organize and oversee a risk-based enterprise information security program, blending both theories and best management practices with key physical and information technology safeguards.

To reinforce what you learn in the course and to aid anyone preparing for prominent information security certification examinations, attendees will be provided with unit and course review exercises.

Come prepared for five days of intensive learning and return to your office with the foundation of knowledge and know-how needed to take the CISSP exam (or similar), but even more importantly, to help guide your organization as it develops or revises its information security program.


Agenda

Information Security Concepts and Risk Management Practices
  • Fundamental principles of information security
  • Making the business case for information security
  • Information security management objectives
  • Risk analysis: threats, vulnerabilities, risks, and countermeasures
  • Policies, standards, procedures, and guidelines
  • Information classification
  • Security awareness
Laws and Standards Affecting Information Security and IT Audit
  • Computer crimes, investigations, evidence, forensics
  • Laws, directives and regulations
  • Types of laws
  • Privacy issues and legislation
  • Intellectual property, copyright laws and software piracy
  • European Union Data Protection Act
  • Prominent US and international laws
  • Information security and auditing standards
Security Engineering - Security Models, Mechanisms and Architectures
  • Enterprise information security architecture
  • Computer architectures
  • Operating system security
  • Virtualization: operational and security considerations
  • Security models
  • Access control models, techniques and technologies, and methods
  • Open and closed systems
  • Security design standards and criteria: “Rainbow Series”, ITSEC, Common Criteria
  • Certification and accreditation
Network Security Concepts and Solutions
  • Defining a 3-layer simplified network protocol model
  • Open Systems Interconnection (OSI) model
  • Transmission Control Protocol/Internet Protocol (TCP/IP): IPv4, IPv6
  • Network addresses and applications
  • LAN and WAN technologies, topologies and protocols
  • Wiring: copper, fiber optics
  • Wireless networks technologies, protocols and security
  • Voice over IP (VoIP)
  • Network interconnection devices: functionality, risks and safeguards
  • Directory services: LDAP, DNS
  • Network management tools: packet sniffers, SNMP, network utility and diagnostic software
  • Network security vulnerabilities, threats, risks and countermeasures
  • Hacker probing and attack techniques
  • Firewalls and proxy servers
  • Intrusion detection/prevention systems
  • VPNs and related Internet security protocols: SSL/TLS, IPSec, SSH
  • Network discovery, vulnerability and penetration testing
Cryptography
  • Demystifying the language of cryptography
  • Key management: asymmetric, symmetric
  • Encryption algorithms and hashing functions
  • Digital signatures
  • Certificate Authorities (CAs) and Public Key Infrastructure (PKI)
  • Applications of cryptography
  • Cryptography vs. steganography
Identity Management / Access Controls
  • Authentication mechanism: passwords, tokens, smart cards, biometrics
  • Point-to-point protocol (PPP) authentication: PAP, CHAP
  • Extensible authentication protocol: EAP
  • Enterprise authentication systems: RADIUS, TACACS+, Diameter
  • Single/reduced sign-on (SSO): Kerberos, Web-based SSO
Software Development and Application Security
  • System development life cycle methodologies
  • Configuration management and change control
  • Application development tools and methodologies
  • Client server and middleware security
  • Data types and structures
  • Database management systems
  • Web application security architecture: control points, attacks and defenses
  • Mobile code security risks: Java, ActiveX, JavaScript, VBScript
  • Malicious software and hacker attacks
Asset Security (including Physical, Human Resources and Environment)
  • Computing center location, construction and management
  • Physical security threats, vulnerabilities, risks and countermeasures
  • Perimeter security, boundary protection and facilities access controls
  • Electrical, temperature, water, and other environmental controls
  • Fire detection, prevention and suppression
  • Information storage media protection, sanitization and disposal
  • Emergency procedures
  • Human resources security: hiring practices, badges, terminations and transfers
Availability (Data Recovery and Business Continuity Planning)
  • Business continuity planning requirements
  • Business impact analysis
  • Redundancy and fault tolerance
  • Backup procedures: on-site and offsite
  • Backup resources: processing sites, storage, offices, utilities, equipment and supplies
  • Recovery testing procedures
  • Emergency response procedures
Wrap-Up Discussion
  • Includes continuous unit and course review exercises
Learning Level: Intermediate
Prerequisite: IT Auditing and Controls, IT Audit School, or equivalent experience
Advance Preparation: None

About The Provider: Founded in 1978, MIS Training Institute is the international leader in audit and information security training, with offices in the USA, UK, and Asia. MIS' expertise draws on experience gained in training more than 200,000 delegates across five continents.

Helping audit and infosecurity professionals stay at the top of their game has always been at the core of MIS' mission. To that end, MIS has developed and focused its seminars, conferences, and symposia on the wide-ranging needs of internal and IT auditors and information security practitioners who are charged with controlling complex systems and business environments.

MIS' unparalleled course curriculum covers the most up-to-the-minute topics, provides proven audit and security practices, and delivers the information needed to be successful in today's organizations.

All MIS programs are led by industry experts…hands-on pros who have been in the field and who practice what they teach. Attendees of MIS Training Institute events benefit from unbiased practices, proven strategies, and lessons learned in the real-world.

MIS Training Institute is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. NASBA Sponsor Number: 103321

Cancellation/Refund Policy

A full refund less a $100 administrative fee will be given for cancellations received 15 days or more before the event. Tuition is non-refundable for cancellations made 14 days or less before the event. You may, however, transfer your tuition to another MIS Training Institute event, less a $195 administrative fee. Transfers are valid for 12 months from the time of initial cancellation. Substitutions are welcome at any time.

Those who do not cancel before the event date and who do not attend are responsible for the full non-refundable, non-transferable tuition.
Price: $2,895.00
Applicable Discounts:Required VolumeDiscountPrice
 Qty: 3$289.50$2,605.50
More Info: Contact Us For More Information

Bring This Training To Your Location!

Click Here For More Cities And Dates
Order:Qty:
Share This: Share on Facebook


Share on Twitter


Share on Google+


Sales &Use Tax Workshop
Sales &Use Tax Workshop

Certified Payroll Administrator
Certified Payroll Administrator

Series 6 - Live &OnDemand Online Course
Series 6 - Live &OnDemand Online Course

Fundamentals Of Internal Auditing
Fundamentals Of Internal Auditing

Internal Audit School
Internal Audit School

Audit And Security For Cloud-Based Services
Audit And Security For Cloud-Based Services

Fraud Auditing Boot Camp
Fraud Auditing Boot Camp

Advanced Auditing For In-Charge Auditors
Advanced Auditing For In-Charge Auditors

Forensic Certified Public Accountant Designation
Forensic Certified Public Accountant Designation

How To Use QuickBooks
How To Use QuickBooks

1040 Training
1040 Training

Project Management Workshop
Project Management Workshop

Peachtree Seminars
Peachtree Seminars

How To Document Your Payroll Procedures
How To Document Your Payroll Procedures

Certified Annuity Specialist (CAS)
Certified Annuity Specialist (CAS)

I-9 Administrator Training - Top 10 Mistakes To Avoid In Completing, Storing, And Destroying Form I-9
I-9 Administrator Training - Top 10 Mistakes To Avoid In Completing, Storing, And Destroying Form I-9

Google+CPATrainingCenter.com. 5755 North Point Parkway, Suite 228 | Alpharetta, GA 30022 | 770-410-9941 | support@CPATrainingCenter.com
Copyright CPATrainingCenter.com 2017 | Web Site Development by OTAU
Facebook