Fundamentals of Information Systems Security Training

Commitment 5 Days, 7-8 hours a day.
Language English
User Ratings Average User Rating 4.8 See what learners said
Price REQUEST
Delivery Options Instructor-Led Onsite, Online, and Classroom Live

COURSE OVERVIEW

Fundamentals of Information Systems Security Training course with real hands-on labs – Learn about new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today

In this Fundamentals of Information Systems Security Training course, you will learn about new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how businesses, governments, and individuals operate today. You will also be provided with a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. You will also be given additional material on information security standards, education, professional certifications, and compliance laws.

In addition to premium instructional content from Jones & Bartlett Learning’s comprehensive Information Systems Security and Assurance (ISSA) curriculum, this Fundamentals of Information Systems Security Training course provides access to a customized “virtual sandbox” learning environment that aggregates an unparalleled spectrum of cybersecurity applications.

The instructional content is adapted from the Official (ISC)2 SSCP Certified Body of Knowledge and features an SSCP practice exam. This Fundamentals of Information Systems Security course covers content within the following industry certification exams:

  • Certified Information Systems Security Professional (CISSP) – six content domains covered
  • Security + – five content domains covered
  • System Security Certified Practitioner (SSCP) – six content domains covered
  • National Institute of Standards and Technology (NIST) – five content domains covered
  • 8570.01 – five content domains covered
WHAT'S INCLUDED?
  • 5 days of Fundamentals of Information Systems Security Training with an expert instructor
  • Fundamentals of Information Systems Security Training Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee
RESOURCES
RELATED COURSES

ADDITIONAL INFORMATION

COURSE OBJECTIVES

Upon completing this Fundamentals of Information Systems Security Training course, learners will be able to meet these objectives:

  • Concepts of information systems security as applied to an IT infrastructure
  • How malicious attacks, threats, and vulnerabilities impact an IT infrastructure
  • Access controls in implementing a security policy
  • Operations and administration in effective implementation of security policy
  • Security audits, testing, and monitoring to effective security policy
  • Risk management, common response techniques, and issues related to the recovery of IT systems
  • How businesses apply cryptography in maintaining information security
  • Network principles and architecture to security operations
  • Ways attackers use to compromise systems and networks and defenses used by organizations
  • Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector
CUSTOMIZE IT
  • We can adapt this Fundamentals of Information Systems Security Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Fundamentals of Information Systems Security course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Fundamentals of Information Systems Security around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Fundamentals of Information Systems Security course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP

The target audience for this Fundamentals of Information Systems Security Training course:

  • Information security analysts
  • Payroll specialists
  • IT infrastructure security specialists
  • People who decide which information technology and cybersecurity products to acquire for their organization
CLASS PREREQUISITES

The knowledge and skills that a learner must have before attending this Fundamentals of Information Systems Security course are:

  • Basic Windows Knowledge

COURSE SYLLABUS

1. The Need for Information Security
  • Information Systems Security
  • Changing the Way People and Businesses do Business
  • Malicious Attacks, Threats, and Vulnerabilities
  • The Drivers of Information Security Business
2. The Systems Security Certified Practitioner (SSCP®) Professional Certification from (ISC)2
  • Access Controls
  • Security Operations and Administration
  • Auditing, Testing, and Monitoring
  • Risk, Response, and Recovery
  • Cryptography
  • Networks and Communications
  • Malicious Code and Activity
3. Information Security Standards, Education, Certification, and Laws
  • Information Security Standards
  • Information Security Education and Training
  • Information Security Professional Certifications
  • Fundamentals of Information Systems Security Training
  • US Compliance Laws
  • View Less
LABS

Lab 1: Perform Reconnaissance and Probing Using ZenMap GUI (Nmap)
Lab 2: Perform a Vulnerability Assessment Scan Using Nessus®
Lab 3: Enable Windows Active Directory and User Access Controls
Lab 4: Configure Group Policy Objects and Microsoft Baseline Security Analyzer
Lab 5: Perform Protocol Capture and Analysis Using Wireshark and Netwitness Investigator
Lab 6: Perform Business Continuity Plan Implementation Planning
Lab 7: Relate Windows Encryption and Hashing to Confidentiality and Integrity
Lab 8: Perform a Website and Database Attack by Exploiting Identified Vulnerabilities
Lab 9: Perform a Virus Scan and Malware Identification Scan and Eliminate Threats
Lab 10: Craft an Information Systems Security Policy

Fundamentals of Information Systems Security TrainingFundamentals of Information Systems Security Training Course Recap, Q/A, and Evaluations

REQUEST MORE INFORMATION