SSCP & CISSP Certifications
This training package will involve an in-depth discussion of problems related to computer and Internet security, methods of attack, counter measures, and similar security issues. The training will prepare you for SSCP and CISSP certifications.
Introduction to Computer and Internet Security
- Hacking - Original Definition
- Malicious Crackers
- Cracker motives
- Why secure information and data
Malicious Code and Types of Attacks
- Malicious Code
- Types of Computer Viruses
- Password Attacks
- Denial of Service Attacks
- Application Attacks
- Reconnaissance Attacks
- Masquerading Attacks
- Decoy Techniques
Security Management Concepts and Principles
- Confidentiality
- Integrity
- Availability
- Protection Mechanisms
- Data Classifications
Attacks and Monitoring
- Monitoring
- Intrusion Detection
- IDS-related Tools
- Penetration Testing
- Methods of Attacks
Accountability and Access Control
- Access Control Overview
- Identification and Authentication Techniques
- Access Control Techniques
- Access Control Models
- Access Control Methodologies and Implementations
- Access Control Administration
Physical Security Requirements
- Physical Security Threats
- Facility Requirements
- Forms of Physical Access Controls
- Technical Controls
- Environment and Life Safety
- Equipment Failure
Communications Security and Countermeasures
- Tunneling
- Virtual Private Network
- Network Address Translation
- Miscellaneous Security Control Characteristics
- E-mail Security
- Facsimile Security
- Secure Voice Communications
- Security Boundaries
- Network Attacks and Countermeasures
Asset Value, Policies and Roles
- Security Roles
- Policies, Standards and Procedures
- Risk Management
- Security Awareness Training
- Security Management Planning
Cryptography and Private Key Algorithms
- Cryptography History
- Cryptographic Basics
- Modern Cryptography
- Symmetric Cryptography
PKI and Cryptographic Applications
- Asymmetric Cryptography
- Hash Functions
- Digital Signatures
- Public Key Infrastructure
- Applied Cryptography
- Cryptographic Attacks
Principles of Security Models
- Common Security Models
- IP Security (IPSec)
- Security Models
- Common Flaws and Security Issues
Security Administrative Management
- Antivirus Management
- Privileged Operations Functions
- Privacy and Protection
- Legal Requirements
- Illegal Activities
Auditing, Logging and Forensics
- Audit Trails
- Reporting Concepts
- Monitoring
- Penetration Testing Techniques
- Indistinct Threats and Countermeasures
Disaster Recovery Planning
- Disaster Types
- Recovery Strategy
- Recovery Plan Development
- Training and Documentations
- Testing and Maintenance
Law and Investigations
- Categories of Laws
- Laws
- Computer Crime
- Investigations
Incidents and Ethics
- Major Categories of Computer Crime
- Military and Intelligence Attacks
- Financial Attacks
- Incident Handling
- Ethics