Vi ste ovdje
CISSP 2013 Domain: Security Architecture and Design
Overview/Description
Computer administrators have a variety of mechanisms that can be used to secure modern enterprise environments. Several access control standards and models have been created by the international community to secure both personnel access and information recovery within an enterprise environment. This course examines hardware and software systems, memory storage types, security models, and security controls. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers
Expected Duration (hours)
2.5
Lesson Objectivesrecognize the components of a basic information system architecture
identify the considerations involved in implementing security architecture
recognize key CPU operational factors involved in secure addressing
match system operating states to their descriptions
differentiate between machine types
identify the purpose of the resource manager
classify memory types as either RAM or ROM
match storage types to their descriptions
plan a secure computer network
determine the network resources required for a given scenario
match the phases of the evaluation process to their descriptions
recognize the essential features of operating system protection
match the access control mechanism to it's description
recognize the methods used to evaluate security in a networking environment
identify the key features of security models
match key peer-to-peer security issues with their descriptions
describe the main security issues associated with grid computing
describe the key challenges related to securing data in the cloud
identify the questions a potential user of cloud data storage needs to ask when conducting a risk assessment
propose an operating system security solution for a given scenario
evaluate security in a networking environment
determine the appropriate security model for a given scenario
describe the security challenges presented by distributed systems
Computer administrators have a variety of mechanisms that can be used to secure modern enterprise environments. Several access control standards and models have been created by the international community to secure both personnel access and information recovery within an enterprise environment. This course examines hardware and software systems, memory storage types, security models, and security controls. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers
Expected Duration (hours)
2.5
Lesson Objectives
CISSP 2013 Domain: Security Architecture and Design
Trajanje:
h
Šifra:
sp_cptf_a06_it_enus
Katalog: