Freitag, Januar 31, 2003
Having Met all of certification requirements, whisch include the professional experience prerequisite, adoption of the (ISC) Code of Ethics, and successful performance on the required competence examination, subject to recertification every three pears, this individual is entitleb to all of the rights and privileges associated with this designation, als defined in the (ISC)
Weitere Informationen zur Qualifikation:
CISSP (Certified Information Systems Security Professional) gehört zu den international am meisten respektierten und am meisten gesuchten Zertifizierungen im Bereich IT-Security am Markt.
Zielgruppen:
Network-Administratoren, Sicherheitsbeauftragte Access Control Systems & Methodology
- Identification, Authentication, Authorization and Accountability
- Single Sign-On Technologies
- Access Control Models and Techniques (DAC, MAC, Rule-Based, Role-Based,..)
- Access Control Administration (RADIUS, TACACS, DIAMETER)
- Access Control Methods
Applications & Systems Development
- The Software Life Cycle
- Object-Oriented Systems
- Database Systems
- Artificial Intelligence Systems
Business Continuity Planning
- Defining a Disaster
- Disaster Recovery vs. Business Continuity
- Business Impact Analysis
- Contigency Planning Requirements
- Backup Alternatives
- Recovery and Restoration
- Testing
- Emergency Response
Cryptography
- History
- Definitions
- Symmetric Key Cryptography Algorithms
- Asymmetric Key Cryptography Algorithms
- Public Key Infrastructure
- Message Integrity
- Key management
- E-Mail Standards
- Internet Security
- Attacks
Law, Investigation & Ethics
- Types of Computer Crime
- Intellectual Property Laws
- Laws, Directives, and Regulations
- Computer Crime Investigations
- Liability
- Ethics
Operations Security
- Security Operations Concepts
- Security Operations Management
- Security Controls
- Monitoring
- Auditing
Physical Security
- Physical Security Threats
- Facility Requirements Planning
- Environmental Issues
- Administrative Controls for Physical Security
- Perimeter Security
Security Architecture & Models
- Computer Architecture
- System Architecture
- Security Models
- Security Modes of Operation
- Orange Book, ITSec, Common Criteria
- Certification, Accreditation
- Open versus Closed Systems
Security Management Practices
- Security Management
- Fundamental Principles of Security
- Risk Management
- Risk Analysis
Telecommunications, Network & Internet Security
- Telecommunication and Network Security
- Open System Interconnect Model
- TCP/IP
- Networking
- Types of Transmissions
- LANs
- Protocols
- Networking Devices
- WANs
- Remote Access
- Network and Resource Availability
(0) Kommentare • Artikellink Artikel Empfehlen
Dieser Eintrag wurde 1144 mal gelesen.
Next entry: Cybercrime 2003
Previous entry: Deutscher Investment Trust (DIT) Frankurt