offers CPA exams, accounting degree training, CPE, and professional development for accountants and CPAs
Course/Product Description

Information Security Boot Camp

Format: In-Person Seminar
Find A Class Near You: View Dates And Locations For This Seminar

Information Security Boot Camp

This class will help information security practitioners prepare for the CISSP CBK exam, CISM, CISA, or other formal exams in information security or IT controls.

It is also relevant for audit staff who validate and verify core IT systems and risk-related personnel who rely on IT for maintaining corporate and customer systems.

By attending, you will learn aspects of the ISC2 Common Body of Knowledge (CBK) in conjunction with evaluating methods and tools required for essential elements needed to construct or audit a comprehensive information security framework.

Attendees will gain a business-oriented, architectural perspective that defines how to organize and oversee a risk-based enterprise information security program, blending both theories and best management practices with key physical and information technology safeguards.

To reinforce what you learn in the course and to aid anyone preparing for prominent information security certification examinations, attendees will be provided with unit and course review exercises.

Come prepared for five days of intensive learning and return to your office with the foundation of knowledge and know-how needed to take the CISSP exam (or similar), but even more importantly, to help guide your organization as it develops or revises its information security program.


Information Security Concepts and Risk Management Practices
  • Fundamental principles of information security
  • Making the business case for information security
  • Information security management objectives
  • Risk analysis: threats, vulnerabilities, risks, and countermeasures
  • Policies, standards, procedures, and guidelines
  • Information classification
  • Security awareness
Laws and Standards Affecting Information Security and IT Audit
  • Computer crimes, investigations, evidence, forensics
  • Laws, directives and regulations
  • Types of laws
  • Privacy issues and legislation
  • Intellectual property, copyright laws and software piracy
  • European Union Data Protection Act
  • Prominent US and international laws
  • Information security and auditing standards
Security Engineering - Security Models, Mechanisms and Architectures
  • Enterprise information security architecture
  • Computer architectures
  • Operating system security
  • Virtualization: operational and security considerations
  • Security models
  • Access control models, techniques and technologies, and methods
  • Open and closed systems
  • Security design standards and criteria: “Rainbow Series”, ITSEC, Common Criteria
  • Certification and accreditation
Network Security Concepts and Solutions
  • Defining a 3-layer simplified network protocol model
  • Open Systems Interconnection (OSI) model
  • Transmission Control Protocol/Internet Protocol (TCP/IP): IPv4, IPv6
  • Network addresses and applications
  • LAN and WAN technologies, topologies and protocols
  • Wiring: copper, fiber optics
  • Wireless networks technologies, protocols and security
  • Voice over IP (VoIP)
  • Network interconnection devices: functionality, risks and safeguards
  • Directory services: LDAP, DNS
  • Network management tools: packet sniffers, SNMP, network utility and diagnostic software
  • Network security vulnerabilities, threats, risks and countermeasures
  • Hacker probing and attack techniques
  • Firewalls and proxy servers
  • Intrusion detection/prevention systems
  • VPNs and related Internet security protocols: SSL/TLS, IPSec, SSH
  • Network discovery, vulnerability and penetration testing
  • Demystifying the language of cryptography
  • Key management: asymmetric, symmetric
  • Encryption algorithms and hashing functions
  • Digital signatures
  • Certificate Authorities (CAs) and Public Key Infrastructure (PKI)
  • Applications of cryptography
  • Cryptography vs. steganography
Identity Management / Access Controls
  • Authentication mechanism: passwords, tokens, smart cards, biometrics
  • Point-to-point protocol (PPP) authentication: PAP, CHAP
  • Extensible authentication protocol: EAP
  • Enterprise authentication systems: RADIUS, TACACS+, Diameter
  • Single/reduced sign-on (SSO): Kerberos, Web-based SSO
Software Development and Application Security
  • System development life cycle methodologies
  • Configuration management and change control
  • Application development tools and methodologies
  • Client server and middleware security
  • Data types and structures
  • Database management systems
  • Web application security architecture: control points, attacks and defenses
  • Mobile code security risks: Java, ActiveX, JavaScript, VBScript
  • Malicious software and hacker attacks
Asset Security (including Physical, Human Resources and Environment)
  • Computing center location, construction and management
  • Physical security threats, vulnerabilities, risks and countermeasures
  • Perimeter security, boundary protection and facilities access controls
  • Electrical, temperature, water, and other environmental controls
  • Fire detection, prevention and suppression
  • Information storage media protection, sanitization and disposal
  • Emergency procedures
  • Human resources security: hiring practices, badges, terminations and transfers
Availability (Data Recovery and Business Continuity Planning)
  • Business continuity planning requirements
  • Business impact analysis
  • Redundancy and fault tolerance
  • Backup procedures: on-site and offsite
  • Backup resources: processing sites, storage, offices, utilities, equipment and supplies
  • Recovery testing procedures
  • Emergency response procedures
Wrap-Up Discussion
  • Includes continuous unit and course review exercises
Learning Level: Intermediate
Prerequisite: IT Auditing and Controls, IT Audit School, or equivalent experience
Advance Preparation: None

About The Provider: Founded in 1978, MIS Training Institute is the international leader in audit and information security training, with offices in the USA, UK, and Asia. MIS' expertise draws on experience gained in training more than 200,000 delegates across five continents.

Helping audit and infosecurity professionals stay at the top of their game has always been at the core of MIS' mission. To that end, MIS has developed and focused its seminars, conferences, and symposia on the wide-ranging needs of internal and IT auditors and information security practitioners who are charged with controlling complex systems and business environments.

MIS' unparalleled course curriculum covers the most up-to-the-minute topics, provides proven audit and security practices, and delivers the information needed to be successful in today's organizations.

All MIS programs are led by industry experts…hands-on pros who have been in the field and who practice what they teach. Attendees of MIS Training Institute events benefit from unbiased practices, proven strategies, and lessons learned in the real-world.

MIS Training Institute is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. NASBA Sponsor Number: 103321

Cancellation/Refund Policy

A full refund less a $100 administrative fee will be given for cancellations received 15 days or more before the event. Tuition is non-refundable for cancellations made 14 days or less before the event. You may, however, transfer your tuition to another MIS Training Institute event, less a $195 administrative fee. Transfers are valid for 12 months from the time of initial cancellation. Substitutions are welcome at any time.

Those who do not cancel before the event date and who do not attend are responsible for the full non-refundable, non-transferable tuition.
Price: $2,895.00
More Info: Contact Us For More Information
Share This: Share on Facebook

Share on Twitter

Share on Google+

Currently Scheduled Dates For This Seminar
Course TitleCity/StateDate
Information Security Boot CampChicago, IL11/5/2018

Sales &Use Tax Workshop
Sales &Use Tax Workshop

Retirement Plan Training Courses
Retirement Plan Training Courses

Audit Training
Audit Training

Project Management Workshop
Project Management Workshop

Payroll Training
Payroll Training

Payroll Records: What To Keep, What To Toss
Payroll Records: What To Keep, What To Toss

Peachtree Seminars
Peachtree Seminars

How To Use QuickBooks
How To Use QuickBooks

Microsoft® Excel® 2007/2010 Basics
Microsoft® Excel® 2007/2010 Basics

Chartered Tax Professional Certificate Program
Chartered Tax Professional Certificate Program

Comprehensive Income Tax Course with Career Package
Comprehensive Income Tax Course with Career Package

Executive Taxation
Executive Taxation

Securities Licensing
Securities Licensing

Tax Court Exam Homestudy Program
Tax Court Exam Homestudy Program

Accounting Certifications
Accounting Certifications

Forensic Certified Public Accountant Designation
Forensic Certified Public Accountant Designation 5755 North Point Parkway, Suite 228 | Alpharetta, GA 30022 | 770-410-9941 |
Copyright 2018 | Web Site Development by OTAU