DoD 8570 - Live CISSP Training - New York, NY


This event qualifies for 40 CPEs


IP3 Inc. will deliver the most innovative and comprehensive CISSP® training program in IT Security, that addresses DoD 8570 compliance.

The CISSP (Certified Information Systems Security Professional) was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. CISSP certification is not only an objective measure of excellence, but a globally recognized standard of achievement.

Our comprehensive CISSP 5-day training will deliver LIVE on September 24th through the 28th, from 8a to 5p. Pre-registration is required in order to attend.

See below for DISCOUNT CODEREGISTER HERE

All registrants will receive 5 days of intense training, along with 1 year access to our Security Training Portal, and our comprehensive CISSP Study Kit.

Topics Covered:

  • Access Control – a collection of mechanisms that work together to create security architecture to protect the assets of the information system.
    • Concepts/methodologies/techniques
    • Effectiveness
    • Attacks
  • Telecommunications and Network Security– discusses network structures, transmission methods, transport formats and security measures used to provide availability, integrity and confidentiality.
    • Network architecture and design
    • Communication channels
    • Network components
    • Network attacks
  • Information Security Governance and Risk Management – the identification of an organization’s information assets and the development, documentation and implementation of policies, standards, procedures and guidelines.
    • Security governance and policy
    • Information classification/ownership
    • Contractual agreements and procurement processes
    • Risk management concepts
    • Personnel security
    • Security education, training and awareness
    • Certification and accreditation
  • Software Development Security– refers to the controls that are included within systems and applications software and the steps used in their development.
    • Systems development life cycle (SDLC)
    • Application environment and security controls
    • Effectiveness of application security
  • Cryptography– the principles, means and methods of disguising information to ensure its integrity, confidentiality and authenticity.
    • Encryption concepts
    • Digital signatures
    • Cryptanalytic attacks
    • Public Key Infrastructure (PKI)
    • Information hiding alternatives
  • Security Architecture and Design – contains the concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity and availability.
    • Fundamental concepts of security models
    • Capabilities of information systems (e.g. memory protection, virtualization)
    • Countermeasure principles
    • Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)
  • Operations Security– used to identify the controls over hardware, media and the operators with access privileges to any of these resources.
    • Resource protection
    • Incident response
    • Attack prevention and response
    • Patch and vulnerability management
  •  Business Continuity and Disaster Recovery Planning – addresses the preservation of the business in the face of major disruptions to normal business operations.
    • Business impact analysis
    • Recovery strategy
    • Disaster recovery process
    • Provide training
  • Legal, Regulations, Investigations and Compliance – addresses computer crime laws and regulations; the investigative measures and techniques which can be used to determine if a crime has been committed and methods to gather evidence.
    • Legal issues
    • Investigations
    • Forensic procedures
    • Compliance requirements/procedures
  • Physical (Environmental) Security – addresses the threats, vulnerabilities and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information.
    • Site/facility design considerations
    • Perimeter security
    • Internal security
    • Facilities security

CISSP - Certified Information Systems Security Professional

The Certification that Inspires Utmost Confidence -
If you plan to build a career in information security - one of today's most visible professions - then the CISSP credential should be your next career goal.

*****
GovEvents.com members will receive a $600 discount off the retail price.
Use Coupon code,  GOVEVT12   when registering.  REGISTER HERE
*****

Speaker and Presenter Information

Frank Bradshaw, III, CISSP Frank has a depth of information security experience dating back to when he was still in college in 1993. While studying for a dual degree in Education (Exercise Physiology) and Business, he began consulting around Albuquerque, NM with several small businesses. This expanded into larger engagements in Albuquerque, which eventually involved municipal and state engagements. This exposure to governmental work was his introduction to becoming an Information Security Practitioner. After graduating in 1994, Frank joined IBM as a technical trainer and consultant for Lotus Notes and Information Security engagements with IBM clients and customers. Frank has taught over 10000 people the full gamut of computer based courses from how to use a mouse to instructing the US Forest Service’s Field Officers and district office staff on the management of their new and complex Lotus Notes infrastructure (in part designed by Frank Bradshaw and the rest of the Domino design team). In 2000, Frank began concentrating on Information Security and started a consulting firm in NYC. Several of his disaster recovery (DR) and business continuity (BCP) plans were simultaneously put into action during the attacks on the World Trade Center on September 11th, 2001. Ninety percent of his clients were able to resume business-as-usual by the end of that week, including 3 that were located in the World Trade Center itself. Due to his extensive work in disaster recovery, business continuity and authoring of policies, procedures and standards, he now works full time for the largest financial services company in the world in their Security Strategy division. His primary concentrations are drafting and review of the enterprise’s policies, standards and procedures. Education: 1989 – 1994, University of New Mexico, Albuquerque, NM, Business Administration Certifications: CISSP (56516) CISSP Technical Instructor Security+ Technical Instructor CheckFree Six Sigma Yellow Belt Lotus Notes R5 PCLP (Systems Administration) Lotus Notes 4.x CLI (System Administration I) Microsoft MCSE

Expected Number of Attendees

20

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, GSA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, FEMA, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, Census Bureau, USAID, National Guard Association


This event has no exhibitor/sponsor opportunities


When
Mon-Fri, Sep 24-28, 2012, 8:00am - 5:00pm


Where
Everyday Health, Inc.
345 Hudson St.
16th Floor
New York, NY 10014
Get directions


Website
Click here to visit event website


Organizer
IP3 Inc.


Contact Event Organizer



Return to search results