Il corso si sviluppa su 5 giornate full-immersion e prevede una simulazione d’esame l’ultima giornata di corso.
Security and Risk Management:
•Confidentiality, Integrity, and availability Concepts
•Security Governance Principles
•Compliance
•Legal and Regulatory Issues
•Professional Ethics
•Security Policies, Standards, Procedures, and Guidelines
Asset Security:
•Information and Asset Classification
•Ownership
•Protect Privacy
•Appropriate Retention
•Data Security Controls
•Handling Requirements
Security Architecture and Engineering:
•Engineering Processes using Secure Design Principles
•Security Models Fundamental Concepts
•Security Evaluation Models
•Security capabilityes of Information Systems
•Security Architectures, Designs, and Solution Elements Vulnerabilitàes
•Web-based Systems Vulnerabilities
•Mobile Systems Vulnerabilities
•Embedded Devices and Cyber-Physical Systems Vulnerabilitàes
•Cryptography
•Site and Facility Design Secure Principles
•Physical Security
Communication and Network Security:
•Secure Network Architecture Design
•Secure Network Components
•Secure Communication Channels
•Network Attacks
Identity and Access Management (IAM):
•Physical and Logical Assets Control
•Identification and Authentication of People and Devices
•identity as a Service
•Third-party identity Services
•Access Control Attacks
•identity and Access Provisioning Lifecycle
Security Assessment and Testing:
•Assessment and Test Strategies
•Security Process Data
•Security Control Testing
•Test Outputs
•Security Architectures Vulnerabilitàes
Security Operations:
•Investigations Support and Requirements
•Logging and Monitoring Activities
•Provisioning of Resources
•Foundational Security Operations Concepts
•Resource Protection Techniques
•Incident Management
•Preventative Measures
•Patch and Vulnerabilità Management
•Change Management Processes
•Recovery Strategies
•Disaster Recovery Processes and Plans
•Business Continuity Planning and Exercises
•Physical Security
•Personnel Safety Concerns
Software Development Security:
•Security in the Software Development Lifecycle
•Development Environment Security Controls
•Software Security Effectiveness
•Acquired Software Security Impact
SIMULAZIONE: test di auto-valutazione di 100 domande, alla fine del corso, con analisi dedicata da parte dell’istruttore
Ogni dominio è approfondito seguendo i principi del Review book CISSP di (ISC)2 e attraverso esercitazioni sulle domande d’esame
Ad hoc
Contatti