SlideShare a Scribd company logo
1 of 7
Download to read offline
CERTIFIED INFORMATION SYSTEMS
SECURITY PROFESSIONAL
CISSP FAST TRACK BOOT CAMP
27th February - 3rd March 2017,
Sarova Stanley Hotel, Nairobi, Kenya
Event Providers
&
Host
ACCESS BUSINESS MANAGEMENT CONFERENCING INTERNATIONAL LTD
A.B.M.C INTERNATIONAL LTD
LEADERS IN BUSINESS TRAINING
Access Business Management
Conferencing (ABMC) International,
Head Office: Nairobi, Kenya, Westlands,
Reliance Center, 3rd floor,
Tel No.: +254 20 5041700,
+254 772 22 2004 /5 / 7
Email: info@intl-abmc.com
Web: www.intl-abmc.com
ABMC INTERNATIONAL IS ACCREDITED BY THE
NATIONAL INDUSTRIAL TRAINING AUTHORITY
IN KENYA (NITA) - NITA/TRN/870
THE FIRST 5
DELEGATES
TO BOOK WILL
GET A
FREE TABLET PC
BOOK & PAY NOW !
CISSP FAST TRACK BOOT CAMP
www.intl-abmc.com
DESCRIPTION
Our CISSP Fast Track course is an intensive, in-depth, training program that has
Delegates can be assured of our unconditional "guaranteed pass".
Our delivery method uses the internationally recognised mind-mapping
and repeatedly into their existing body of knowledge.
Each student will get CISSP training kit, the most comprehensive training package
available, including:
1. Our CISSP Manual
2. CISSP training online for a period of 3 months from the date of payment
4. Free Monthly IT Security information subscription platform
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL
The goal of the course is to prepare professionals for the challenging CISSP
knowledge.
TARGET AUDIENCE
Experienced security professionals who want to expand their knowledge and
experience can attend our course.
OBJECTIVES
OBJECTIVES
TARGET AUDIENCE
This course is not for beginners. Delegates should already have a working
knowledge of IT Security. Note that even after successful completion of the
exam, only those who can demonstrate 5 years of experience in 2 of the 10
Four years of direct full-time security professional work experience in two or
one-year waiver of the professional experience requirement for holding an
additional credential on the (ISC)2 approved list.
Others will be able to call themselves an Associate of (ISC)2 for CISSP Associate
until they gain the 5 years of experience.
Access Business Management Conferencing (ABMC) International,
Tel No.: +254 20 50 41 700,
+254 772 222004/5/7
Email: info@intl-abmc.com,
Web: www.intl-abmc.com
COURSE SYNOPSIS
The 8 CISSP Domains:
» Security and Risk Management
» Asset Security
» Security Engineering
» Communication and Network Security
» Identity and Access Management
» Security Assessment and Testing
» Security Operations
» Software Development Security
The CISSP® Training Boot Camp is to prepare professionals for the
challenging Certified Information Systems Security Professional (CISSP®)
exam.
CISSP’s are expected to have a broad understanding of security including
policy development, management, as well as technical understanding of a
wide range of security controls across all disciplines within IT security.
In this specially extended 5-days holistic course, delegates will get intensive
training designed to help you pass the exam on your first try.
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL
Completing our CISSP® Training Boot Camp will provide you with valuable
knowledge and skills including the ability to:
» Competently identify and handle security threats
» Gain credentials as a leading security professional for current and future
employment
» Thoroughly understand the 8 essential core domain of the CISSP® Common
Body of Knowledge.
1. Security and Risk Management
(Security, Risk, Compliance, Law, Regulations, and Business Continuity)
»
» Security governance principles
» Compliance
» Legal and regulatory issues
» Professional ethics
» Security policies, standards, procedures and
guidelines
» Business continuity requirements
» Personnel security policies
» Risk management concepts
» Threat modeling
» Risk considerations
» Security education, training, and awareness
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL
CISSP Fast Track – Course Outline
2. Asset Security
(Protecting Security of Assets)
4. Communication and Network Security
(Designing and Protecting Network Security)
» Secure network architecture design
(e.g. IP & non-IP protocols, segmentation)
» Secure network components
» Secure communication channels
» Network attacks
»
» Ownership (e.g. data owners, system owners)
» Protect privacy
» Appropriate retention
» Data security controls
» Handling requirements (e.g. markings, labels,storage)
3. Security Engineering
(Engineering and Management of Security)
» Engineering processes using secure design principles
» Security models fundamental concepts
» Security evaluation models
» Security capabilities of information systems
» Security architectures, designs, and solution
elements vulnerabilities
» Web-based systems vulnerabilities
» Mobile systems vulnerabilities
» Embedded devices and cyber-physical systems vulnerabilities
» Cryptography
» Site and facility design secure principles
» Physical security
Access Business Management Conferencing (ABMC) International,
Tel No.: +254 20 50 41 700,
+254 772 222004/5/7
Email: info@intl-abmc.com,
Web: www.intl-abmc.com
5. Identity and Access Management
(Controlling Access and Managing Identity)
» Physical and logical assets control
»
» Identity as a service (e.g. cloud identity)
» Third-par ty identity services (e.g. on-premise)
» Access control attacks
» Identity and access provisioning lifecycle (e.g. provisioning review)
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL
CISSP Fast Track – Course Outline
6. Security Assessment and Testing
(Designing, Performing, and Analyzing Security Testing)
8. Software Development Security
(Understanding, Applying, and Enforcing Software Security)
» Security in the software development lifecycle
» Development environment security controls
»
» Acquired software security impact
» Assessment and test strategies
» Security process data (e.g. management and operational controls)
» Security control testing
»Test outputs (e.g. automated, manual)
» Security architectures vulnerabilities
7. Security Operations
(Foundational Concepts, Investigations, Incident Management, and
Disaster Recovery)
» Investigations suppor t and requirements
» Logging and monitoring activities
» Provisioning of resources
» Foundational security operations concepts
» Resource protection techniques
» Incident management
» Preventative measures
» Patch and vulnerability management
» Change management processes
» Recovery strategies
» Disaster recovery processes and plans
» Business continuity planning and exercises
» Physical security
» Personnel safety concerns
Access Business Management Conferencing (ABMC) International,
Tel No.: +254 20 50 41 700,
+254 772 222004/5/7
Email: info@intl-abmc.com,
Web: www.intl-abmc.com
MEET OUR EXPERT IT CHIEF TRAINER CORE COMPETENCIES
ABMC International IT Chief Trainer, has more than 14 years’experience in
Information Security. He has held several senior positions in various
industries, including IT Services, Financial Services Sector, Consulting,
Public Sector and Academia.
He has designed and taught university courses in Information Security,
including in the Masters of Information Technology Security program of
the University of Ontario Institute Of Technology (UOIT), Ontario, Canada.
His a regular speaker in ICT Security & Risk Management forums and
conferences. He holds Masters and Doctoral degrees in Computer Science
and a Bsc in Electrical Engineering. He has presented on many subjects on
information security and written about information security metrics.
He has published a number of security management papers, including
co-authoring a chapter in the Information Security Management Handbook
(5ed), a key reference Guide for the CISSP exams.
His also listed in the Who is Who in Black Canada, 2006 edition.
He is an active member in the African Diaspora community and a featured
speaker in a number of events.
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL
» Strategic Planning & Governance, Risk and Compliance
» Information security management, consulting, operations and
academic teaching:
» IT operations, service delivery and account management
» IT planning and program management
» IT risk managemen
t &
Training
» Security Operations Centre design, implementation & operations t
Summary of Experience
Information Security
» Managed senior information security professionals: interviewed, hired,
counseled, coached and mentored facilitated training & development;
reviewed performance and determined performance ratings; did
compensation reviews, helped in the design of recruitment & retention
strategies
» Managed IT security operations a major bank - intrusion monitoring,
ethical hacking, incident response and antivirus management Security
operations
» Implemented an information protection centre (IPC) for IT security
operations at a major bank
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP)
COURSE
CONTRACT REGISTRATION FORM
27TH FEBRUARY - 3RD FEBRUARY 2017 - NAIROBI, KENYA
SEND YOUR REGISTRATION FORM TO ATTENTION Email: info@intl-abmc.com
BOOK ONE DELEGATE = USD 2,290
COMPUTER BASED EXAM FEE USD 650 excl VAT
Exam option, delegate can choose to sit the exam after the course using our exam voucher from PEARSONVUE CENTRE
Dr. /Mr. /Mrs. /Miss:
Department: Cell No:
Position: Email:
Dr. /Mr. /Mrs. /Miss:
Department: Cell No:
Position: Email:
Dr. /Mr. /Mrs. /Miss:
Department: Cell No:
Position: Email:
AUTHORIZATION:
THIS BOOKING IS INVALID WITHOUT A SIGNATURE & COMPANY STAMP
Signatory must be authorized to sign on behalf of contracting organization
Name:
Job Title
Email Dir.Line/ Cell:
Organization:
Postal Address:.
Telephone: Facsimile:
Physical Address:
Signature: DATE BOOKED / /
CANCELLATIONS AND TRANSFERS
The conference documentation and a 50% refund will be granted
for cancellations received not less than 21 days before the event
only if the company ABMC is notified in writing. The full fee is
payable thereafter. A full refund will only be granted for
cancellations received 21 days or more in writing. A substitute
is welcome. Please do notify this office of the change.
RIGHT OF ADMISSION RESERVED
Payments should be done BEFORE the event
SEND THIS FORM TO BOOK TO info@intl -abmc.com
SAROVA STANLEY HOTEL
sarovastanley@sarovahotels.com
Telephone:
+254 20 2757000
http://www.sarovahotels.com/contact-us.html
BOOK THREE DELEGATE & ABOVE = USD 1,990

More Related Content

What's hot

Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanningVladimir Jirasek
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Ollie Whitehouse
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security TestingPECB
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
 
Outpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 Webinar - Common wireless security threats and how to avoid themOutpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 Webinar - Common wireless security threats and how to avoid themOutpost24
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberWilliam McBorrough
 
NCC Group Pro-active Breach Discovery: Network Threat Assessment
NCC Group Pro-active Breach Discovery: Network Threat AssessmentNCC Group Pro-active Breach Discovery: Network Threat Assessment
NCC Group Pro-active Breach Discovery: Network Threat AssessmentOllie Whitehouse
 
HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?Terro White
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Edureka!
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobPriyanka Aash
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationKoenig Solutions Ltd.
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Edureka!
 
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teamingOutpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teamingOutpost24
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ SagarNegi10
 
CHFI Certification
CHFI CertificationCHFI Certification
CHFI CertificationSagarNegi10
 
Secure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real worldSecure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real worldOllie Whitehouse
 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecuritylfh663
 
Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In SecurityPrasanna V
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkChaitanya Bhatt
 

What's hot (20)

Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security Testing
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Outpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 Webinar - Common wireless security threats and how to avoid themOutpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 Webinar - Common wireless security threats and how to avoid them
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen Cyber
 
NCC Group Pro-active Breach Discovery: Network Threat Assessment
NCC Group Pro-active Breach Discovery: Network Threat AssessmentNCC Group Pro-active Breach Discovery: Network Threat Assessment
NCC Group Pro-active Breach Discovery: Network Threat Assessment
 
HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teamingOutpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teaming
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+
 
CHFI Certification
CHFI CertificationCHFI Certification
CHFI Certification
 
Secure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real worldSecure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real world
 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecurity
 
Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In Security
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
 

Viewers also liked

Presentation Internet Sehat
Presentation Internet SehatPresentation Internet Sehat
Presentation Internet SehatAdhibina
 
Meet Florida Institute of Technology
Meet Florida Institute of TechnologyMeet Florida Institute of Technology
Meet Florida Institute of Technologyfloridatechmarketing
 
2015 CMU Trading Summit keynote
2015 CMU Trading Summit keynote2015 CMU Trading Summit keynote
2015 CMU Trading Summit keynoteClemens Wan
 
CATALOG Scroll down brochure
CATALOG Scroll down brochureCATALOG Scroll down brochure
CATALOG Scroll down brochureLinas Rakauskas
 
Egunerokoa azaroa.practicum iii
Egunerokoa azaroa.practicum iiiEgunerokoa azaroa.practicum iii
Egunerokoa azaroa.practicum iiiEdurne M. Arrese
 
Bab 7 peristiwa
Bab 7 peristiwaBab 7 peristiwa
Bab 7 peristiwaFirda_123
 
Marketing analytics survey ackerman
Marketing analytics survey ackermanMarketing analytics survey ackerman
Marketing analytics survey ackermanwilster2165
 
The Global Risks Report 2016
The Global Risks Report 2016The Global Risks Report 2016
The Global Risks Report 2016Peter Gold
 
Fast five in game assessment
Fast five  in game assessmentFast five  in game assessment
Fast five in game assessmentRonald Sen
 
Jago wendy transforma tu cerebro con pnl
Jago wendy   transforma tu cerebro con pnlJago wendy   transforma tu cerebro con pnl
Jago wendy transforma tu cerebro con pnlodayr1979
 
bảng giá làm video quảng cáo kiến trúc
bảng giá làm video quảng cáo kiến trúcbảng giá làm video quảng cáo kiến trúc
bảng giá làm video quảng cáo kiến trúcmilo307
 
Reality. Как улучшить работу сервисного центра?
Reality. Как улучшить работу сервисного центра?Reality. Как улучшить работу сервисного центра?
Reality. Как улучшить работу сервисного центра?Yaroslav Kulik
 
Ampleforth – easy walk
Ampleforth – easy walkAmpleforth – easy walk
Ampleforth – easy walkJohn C
 
It supervisor performance appraisal
It supervisor performance appraisalIt supervisor performance appraisal
It supervisor performance appraisalpetermiken89
 

Viewers also liked (20)

Presentation Internet Sehat
Presentation Internet SehatPresentation Internet Sehat
Presentation Internet Sehat
 
Meet Florida Institute of Technology
Meet Florida Institute of TechnologyMeet Florida Institute of Technology
Meet Florida Institute of Technology
 
Patson's CV
Patson's CVPatson's CV
Patson's CV
 
2015 CMU Trading Summit keynote
2015 CMU Trading Summit keynote2015 CMU Trading Summit keynote
2015 CMU Trading Summit keynote
 
ketan_resume
ketan_resumeketan_resume
ketan_resume
 
Jobzella for Businesses
Jobzella for BusinessesJobzella for Businesses
Jobzella for Businesses
 
CATALOG Scroll down brochure
CATALOG Scroll down brochureCATALOG Scroll down brochure
CATALOG Scroll down brochure
 
Egunerokoa azaroa.practicum iii
Egunerokoa azaroa.practicum iiiEgunerokoa azaroa.practicum iii
Egunerokoa azaroa.practicum iii
 
Bab 7 peristiwa
Bab 7 peristiwaBab 7 peristiwa
Bab 7 peristiwa
 
Egunerokoa.1.astea
Egunerokoa.1.asteaEgunerokoa.1.astea
Egunerokoa.1.astea
 
Marketing analytics survey ackerman
Marketing analytics survey ackermanMarketing analytics survey ackerman
Marketing analytics survey ackerman
 
Practica 2
Practica 2Practica 2
Practica 2
 
The Global Risks Report 2016
The Global Risks Report 2016The Global Risks Report 2016
The Global Risks Report 2016
 
Fast five in game assessment
Fast five  in game assessmentFast five  in game assessment
Fast five in game assessment
 
Jago wendy transforma tu cerebro con pnl
Jago wendy   transforma tu cerebro con pnlJago wendy   transforma tu cerebro con pnl
Jago wendy transforma tu cerebro con pnl
 
Making Convergence Pay - Tellabs v1.2
Making Convergence Pay - Tellabs v1.2Making Convergence Pay - Tellabs v1.2
Making Convergence Pay - Tellabs v1.2
 
bảng giá làm video quảng cáo kiến trúc
bảng giá làm video quảng cáo kiến trúcbảng giá làm video quảng cáo kiến trúc
bảng giá làm video quảng cáo kiến trúc
 
Reality. Как улучшить работу сервисного центра?
Reality. Как улучшить работу сервисного центра?Reality. Как улучшить работу сервисного центра?
Reality. Как улучшить работу сервисного центра?
 
Ampleforth – easy walk
Ampleforth – easy walkAmpleforth – easy walk
Ampleforth – easy walk
 
It supervisor performance appraisal
It supervisor performance appraisalIt supervisor performance appraisal
It supervisor performance appraisal
 

Similar to Cissp certified information systems security professional - 27 th february - 3rd february 2017 - nairobi - kenya.pdf.rd

Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security ProfessionalHelen Njuguna
 
cissp-course content.pdf & cissp description
cissp-course content.pdf & cissp descriptioncissp-course content.pdf & cissp description
cissp-course content.pdf & cissp descriptionInfosec train
 
CISSP _Course _Description and course overview
CISSP _Course _Description and course overviewCISSP _Course _Description and course overview
CISSP _Course _Description and course overviewpriyanshamadhwal2
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Cissp exam-outline
Cissp exam-outlineCissp exam-outline
Cissp exam-outlineAhmet E
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016Adel Zayed
 
Layered Approach - Information Security Recommendations
Layered Approach - Information Security RecommendationsLayered Approach - Information Security Recommendations
Layered Approach - Information Security RecommendationsMichael Kaishar, MSIA | CISSP
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Ferenc Fresz
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOSagarNegi10
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsLiving Online
 
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDITCertifications on Security - IS AUDIT
Certifications on Security - IS AUDITShahzeb Pirzada
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 

Similar to Cissp certified information systems security professional - 27 th february - 3rd february 2017 - nairobi - kenya.pdf.rd (20)

Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
 
cissp-course content.pdf & cissp description
cissp-course content.pdf & cissp descriptioncissp-course content.pdf & cissp description
cissp-course content.pdf & cissp description
 
CISSP _Course _Description and course overview
CISSP _Course _Description and course overviewCISSP _Course _Description and course overview
CISSP _Course _Description and course overview
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Cissp exam-outline
Cissp exam-outlineCissp exam-outline
Cissp exam-outline
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
Cissp Training |IEVISION
Cissp Training |IEVISION Cissp Training |IEVISION
Cissp Training |IEVISION
 
Cissp training and certification in mumbai
Cissp training and certification in mumbaiCissp training and certification in mumbai
Cissp training and certification in mumbai
 
Cissp Training |IEVISION
Cissp Training |IEVISION Cissp Training |IEVISION
Cissp Training |IEVISION
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016
 
Layered Approach - Information Security Recommendations
Layered Approach - Information Security RecommendationsLayered Approach - Information Security Recommendations
Layered Approach - Information Security Recommendations
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA Systems
 
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDITCertifications on Security - IS AUDIT
Certifications on Security - IS AUDIT
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 

Recently uploaded

VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 

Recently uploaded (20)

VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 

Cissp certified information systems security professional - 27 th february - 3rd february 2017 - nairobi - kenya.pdf.rd

  • 1. CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL CISSP FAST TRACK BOOT CAMP 27th February - 3rd March 2017, Sarova Stanley Hotel, Nairobi, Kenya Event Providers & Host ACCESS BUSINESS MANAGEMENT CONFERENCING INTERNATIONAL LTD A.B.M.C INTERNATIONAL LTD LEADERS IN BUSINESS TRAINING Access Business Management Conferencing (ABMC) International, Head Office: Nairobi, Kenya, Westlands, Reliance Center, 3rd floor, Tel No.: +254 20 5041700, +254 772 22 2004 /5 / 7 Email: info@intl-abmc.com Web: www.intl-abmc.com ABMC INTERNATIONAL IS ACCREDITED BY THE NATIONAL INDUSTRIAL TRAINING AUTHORITY IN KENYA (NITA) - NITA/TRN/870 THE FIRST 5 DELEGATES TO BOOK WILL GET A FREE TABLET PC BOOK & PAY NOW ! CISSP FAST TRACK BOOT CAMP www.intl-abmc.com
  • 2. DESCRIPTION Our CISSP Fast Track course is an intensive, in-depth, training program that has Delegates can be assured of our unconditional "guaranteed pass". Our delivery method uses the internationally recognised mind-mapping and repeatedly into their existing body of knowledge. Each student will get CISSP training kit, the most comprehensive training package available, including: 1. Our CISSP Manual 2. CISSP training online for a period of 3 months from the date of payment 4. Free Monthly IT Security information subscription platform CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL The goal of the course is to prepare professionals for the challenging CISSP knowledge. TARGET AUDIENCE Experienced security professionals who want to expand their knowledge and experience can attend our course. OBJECTIVES OBJECTIVES TARGET AUDIENCE This course is not for beginners. Delegates should already have a working knowledge of IT Security. Note that even after successful completion of the exam, only those who can demonstrate 5 years of experience in 2 of the 10 Four years of direct full-time security professional work experience in two or one-year waiver of the professional experience requirement for holding an additional credential on the (ISC)2 approved list. Others will be able to call themselves an Associate of (ISC)2 for CISSP Associate until they gain the 5 years of experience. Access Business Management Conferencing (ABMC) International, Tel No.: +254 20 50 41 700, +254 772 222004/5/7 Email: info@intl-abmc.com, Web: www.intl-abmc.com
  • 3. COURSE SYNOPSIS The 8 CISSP Domains: » Security and Risk Management » Asset Security » Security Engineering » Communication and Network Security » Identity and Access Management » Security Assessment and Testing » Security Operations » Software Development Security The CISSP® Training Boot Camp is to prepare professionals for the challenging Certified Information Systems Security Professional (CISSP®) exam. CISSP’s are expected to have a broad understanding of security including policy development, management, as well as technical understanding of a wide range of security controls across all disciplines within IT security. In this specially extended 5-days holistic course, delegates will get intensive training designed to help you pass the exam on your first try. CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL Completing our CISSP® Training Boot Camp will provide you with valuable knowledge and skills including the ability to: » Competently identify and handle security threats » Gain credentials as a leading security professional for current and future employment » Thoroughly understand the 8 essential core domain of the CISSP® Common Body of Knowledge.
  • 4. 1. Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity) » » Security governance principles » Compliance » Legal and regulatory issues » Professional ethics » Security policies, standards, procedures and guidelines » Business continuity requirements » Personnel security policies » Risk management concepts » Threat modeling » Risk considerations » Security education, training, and awareness CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL CISSP Fast Track – Course Outline 2. Asset Security (Protecting Security of Assets) 4. Communication and Network Security (Designing and Protecting Network Security) » Secure network architecture design (e.g. IP & non-IP protocols, segmentation) » Secure network components » Secure communication channels » Network attacks » » Ownership (e.g. data owners, system owners) » Protect privacy » Appropriate retention » Data security controls » Handling requirements (e.g. markings, labels,storage) 3. Security Engineering (Engineering and Management of Security) » Engineering processes using secure design principles » Security models fundamental concepts » Security evaluation models » Security capabilities of information systems » Security architectures, designs, and solution elements vulnerabilities » Web-based systems vulnerabilities » Mobile systems vulnerabilities » Embedded devices and cyber-physical systems vulnerabilities » Cryptography » Site and facility design secure principles » Physical security Access Business Management Conferencing (ABMC) International, Tel No.: +254 20 50 41 700, +254 772 222004/5/7 Email: info@intl-abmc.com, Web: www.intl-abmc.com
  • 5. 5. Identity and Access Management (Controlling Access and Managing Identity) » Physical and logical assets control » » Identity as a service (e.g. cloud identity) » Third-par ty identity services (e.g. on-premise) » Access control attacks » Identity and access provisioning lifecycle (e.g. provisioning review) CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL CISSP Fast Track – Course Outline 6. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) 8. Software Development Security (Understanding, Applying, and Enforcing Software Security) » Security in the software development lifecycle » Development environment security controls » » Acquired software security impact » Assessment and test strategies » Security process data (e.g. management and operational controls) » Security control testing »Test outputs (e.g. automated, manual) » Security architectures vulnerabilities 7. Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery) » Investigations suppor t and requirements » Logging and monitoring activities » Provisioning of resources » Foundational security operations concepts » Resource protection techniques » Incident management » Preventative measures » Patch and vulnerability management » Change management processes » Recovery strategies » Disaster recovery processes and plans » Business continuity planning and exercises » Physical security » Personnel safety concerns Access Business Management Conferencing (ABMC) International, Tel No.: +254 20 50 41 700, +254 772 222004/5/7 Email: info@intl-abmc.com, Web: www.intl-abmc.com
  • 6. MEET OUR EXPERT IT CHIEF TRAINER CORE COMPETENCIES ABMC International IT Chief Trainer, has more than 14 years’experience in Information Security. He has held several senior positions in various industries, including IT Services, Financial Services Sector, Consulting, Public Sector and Academia. He has designed and taught university courses in Information Security, including in the Masters of Information Technology Security program of the University of Ontario Institute Of Technology (UOIT), Ontario, Canada. His a regular speaker in ICT Security & Risk Management forums and conferences. He holds Masters and Doctoral degrees in Computer Science and a Bsc in Electrical Engineering. He has presented on many subjects on information security and written about information security metrics. He has published a number of security management papers, including co-authoring a chapter in the Information Security Management Handbook (5ed), a key reference Guide for the CISSP exams. His also listed in the Who is Who in Black Canada, 2006 edition. He is an active member in the African Diaspora community and a featured speaker in a number of events. CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL » Strategic Planning & Governance, Risk and Compliance » Information security management, consulting, operations and academic teaching: » IT operations, service delivery and account management » IT planning and program management » IT risk managemen t & Training » Security Operations Centre design, implementation & operations t Summary of Experience Information Security » Managed senior information security professionals: interviewed, hired, counseled, coached and mentored facilitated training & development; reviewed performance and determined performance ratings; did compensation reviews, helped in the design of recruitment & retention strategies » Managed IT security operations a major bank - intrusion monitoring, ethical hacking, incident response and antivirus management Security operations » Implemented an information protection centre (IPC) for IT security operations at a major bank
  • 7. CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) COURSE CONTRACT REGISTRATION FORM 27TH FEBRUARY - 3RD FEBRUARY 2017 - NAIROBI, KENYA SEND YOUR REGISTRATION FORM TO ATTENTION Email: info@intl-abmc.com BOOK ONE DELEGATE = USD 2,290 COMPUTER BASED EXAM FEE USD 650 excl VAT Exam option, delegate can choose to sit the exam after the course using our exam voucher from PEARSONVUE CENTRE Dr. /Mr. /Mrs. /Miss: Department: Cell No: Position: Email: Dr. /Mr. /Mrs. /Miss: Department: Cell No: Position: Email: Dr. /Mr. /Mrs. /Miss: Department: Cell No: Position: Email: AUTHORIZATION: THIS BOOKING IS INVALID WITHOUT A SIGNATURE & COMPANY STAMP Signatory must be authorized to sign on behalf of contracting organization Name: Job Title Email Dir.Line/ Cell: Organization: Postal Address:. Telephone: Facsimile: Physical Address: Signature: DATE BOOKED / / CANCELLATIONS AND TRANSFERS The conference documentation and a 50% refund will be granted for cancellations received not less than 21 days before the event only if the company ABMC is notified in writing. The full fee is payable thereafter. A full refund will only be granted for cancellations received 21 days or more in writing. A substitute is welcome. Please do notify this office of the change. RIGHT OF ADMISSION RESERVED Payments should be done BEFORE the event SEND THIS FORM TO BOOK TO info@intl -abmc.com SAROVA STANLEY HOTEL sarovastanley@sarovahotels.com Telephone: +254 20 2757000 http://www.sarovahotels.com/contact-us.html BOOK THREE DELEGATE & ABOVE = USD 1,990