lessphp fatal error: load error: failed to find /eno2-website/wp-content/themes/theme49141/bootstrap/less/bootstrap.lesslessphp fatal error: load error: failed to find /eno2-website/wp-content/themes/theme49141/style.less Calendar | Eno Security

Calendar

Nov
11
Mon
2019
CASP+ Certification Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Nov 11 @ 8:30 am – Nov 15 @ 5:00 pm

CASP+ Certification Training Bootcamp

CASP+ Certification Training Bootcamp | CompTIA Advanced Security Practitioner Training Course Hands-on

Learn advanced security administration tools and techniques while preparing for the CASP+ exam (CAS-003) in this hands-on CASP+ Certification Training Bootcamp course

You have experience in the increasingly crucial field of information security, and now you're ready to take that experience to the next level. CASP+ - CompTIA Advanced Security Practitioner (exam CAS-003) is the course you will need to take if your job responsibilities include securing complex enterprise environments. In this CASP+ Certification Training Bootcamp course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened.

Today's IT climate demands individuals with demonstrable skills, and the information and activities in this CASP+ Certification Training Bootcamp course can help you develop the skill set you need to confidently perform your duties as an advanced security professional. This CASP+ Certification Training Bootcamp course is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments.

CASP+ Certification Training Bootcamp - Objectives

After completing this CASP+ Certification Training Bootcamp course, attendees will be able to:

• Support IT governance in the enterprise with an emphasis on managing risk.
• Leverage collaboration tools and technology to support enterprise security.
• Use research and analysis to secure the enterprise.
• Integrate advanced authentication and authorization techniques.
• Implement cryptographic techniques.
• Implement security controls for hosts.
• Implement security controls for mobile devices.
• Implement network security.
• Implement security in the systems and software development lifecycle.
• Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture.
• Conduct security assessments.
• Respond to and recover from security incidents.


 
SHARE

Nov
18
Mon
2019
CISA Certification Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Nov 18 @ 8:30 am – Nov 21 @ 5:00 pm

CISA Certification Training Bootcamp

CISA Certification Training Bootcamp or Certified Information Systems Auditor Training Course Hands-on

In this CISA Certification Training Bootcamp or Certified Information Systems Auditor Training course, you'll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security. Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams. Along with our custom course material, you will receive a free copy of the CISA Review Manual 2013.

This CISA Certification Training Bootcamp or Certified Information Systems Auditor Training course can be a component of our 8570.1 Training Solution that can also include assessments, certification preparation and program management, post training and testing, 8570 compliancy tracking and reporting, and continuing education. Learn more about our 8570 Training Solution by contacting us at 1-888-DOD-8570.

CISA Certification Training Bootcamp - Objectives

This official CISA Certification Training Bootcamp seminar has a total of seven primary sections. All seven sections will collectively help you prepare for the CISA certification exam while also enhancing your overall competencies in auditing, controlling, monitoring and assessing information technology and business systems. The seven primary sections you will cover are the following:

• General Information Regarding the Exam
• CISA Domain 1: The Process of Auditing Information Systems
• CISA Domain 2: Governance and Management of IT
• CISA Domain 3: Information Systems Acquisition, Development, and Implementation
• CISA Domain 4: Information Systems Operations, Maintenance and Service Management
• CISA Domain 5: Protection of Information Assets
• Exam Practice / Preparation (Sample Exam)

Participants in the CISA Certification Training Bootcamp program will be provided instruction designed to provide the following:

• An understanding of the format and structure of the CISA certification exam.
• A knowledge of the various topics and technical areas covered by the exam.
• Practice with specific strategies, tips, and techniques for taking and passing the exam.
• Opportunities to execute practice questions with debriefs of answers.


 
SHARE

CSSLP Certification Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Nov 18 @ 8:30 am – Nov 22 @ 5:00 pm

CSSLP Certification Training Bootcamp

CSSLP Certification Training Bootcamp | Certified Secure Software Lifecycle Professional Training Course – Hands-on

Learn the best practices, policies, and procedures to ensure a security initiative across all phases of application development in this official (ISC)2 CSSLP Certification Training Bootcamp or Certified Secure Software Lifecycle Professional Training course.

This CSSLP Certification Training Bootcamp or Certified Secure Software Lifecycle Professional Training course is designed to take you through all aspects of the secure software lifecycle incorporating planning, designing, developing, acquiring, testing, deploying, maintaining, and managing software. With CSSLP Certification Training Bootcamp, you will also learn a series of software methodologies to develop software that is secure and resilient to attacks while meeting software requirements for compliance, quality, functionality and assurance through design principles and processes.

With CSSLP Certification Training Bootcamp or Certified Secure Software Lifecycle Professional Training, participants will gain programming concepts that can effectively protect software from vulnerabilities. You will gain skills to manage risk through the adoption of standards and best practices for the proper development, testing, and learning to employ tools and resources necessary to mitigate risk across the entire lifecycle of products all while preparing for the official (ISC)2 CSSLP exams.

CSSLP Certification Training Bootcamp - Objectives

This (ISC)² authorized CSSLP Certification Training Bootcamp seminar is based on the eight CSSLP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the CSSLP exam and enhancing their overall competencies in secure software development.

• Domain 1: Secure Software Concepts
• Domain 2: Secure Software Requirements
• Domain 3: Secure Software Design
• Domain 4: Secure Software Implementation/Programming
• Domain 5: Secure Software Testing
• Domain 6: Secure Software Lifecycle Management
• Domain 7: Software Deployment, Operations, and Maintenance
• Domain 8: Supply Chain and Software Acquisition


 
SHARE

Dec
2
Mon
2019
CAP Certification Training Bootcamp @ Reston - Instructor-led/Online EST
Dec 2 @ 8:30 am – Dec 4 @ 5:00 pm

CAP Certification Training Bootcamp

CAP Certification Training Bootcamp or Certified Authorization Professional Training Course Hands-on

Gain the knowledge and skills needed to accurately and effectively apply cost-effective and appropriate security controls based on risk and best practices with this CAP Certification Training Bootcamp or Certified Authorization Professional Training.

CAP Certification Training Bootcamp; Achieving Certified Authorization Professional (CAP) certification validates your qualifications, skills, and experience in applying, assessing, and maintaining information system security using the new National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). On the path to CAP certification, you will gain the knowledge and skills needed to accurately and effectively apply cost-effective and appropriate security controls based on risk and best practices. The CAP certification is accepted by private and government sectors, and in some organizations, it is required for specific jobs (i.e., DoD Directive 8570).

In this CAP Certification Training Bootcamp or Certified Authorization Professional Training course, you will gain an understanding of the new authorization process and prepare for the CAP certification exam, based on the new SP 800-37 process and the new (ISC)2 Common Body of Knowledge (CBK).

CAP Certification Training Bootcamp - Objectives

The goal of the CAP Certification Training Bootcamp or Certified Authorization Professional Training course is to prepare professionals for the challenging CAP exam by covering the objectives of the exam as defined in the (ISC2) common body of knowledge. CAP certification candidates are expected to have a broad range of skills across certification and accreditation concepts and functions. Our CAP Certification Training Bootcamp program will provide you with a quick and proven method for mastering this huge range of knowledge.

After completing this CAP Certification Training Bootcamp course, attendees will be able to:

• New processes and concepts, including:
• Authorization process (NIST SP 800-37, revision 1)
• Risk assessment process (NIST SP 800-30)
• Risk Management Framework (NIST SP 800-39)
• Incident response and contingency planning (NIST SP 800-65 and SP 800-34)
• Information System Continuous Monitoring(NIST SP 800-53A SP 800-137)
• Individual and organization (Office of Management and Budget, Department of Homeland Security, NIST, and National Security Agency) roles, responsibilities, requirements, and reports
• CAP certification exam preparation
• Common, system-specific, hybrid, and compensating controls
• CyberScope and CyberStat
• Security Content Automation Protocol (SCAP) and methods for media sanitization
• Effective strategies for process implementation and test-taking


 
SHARE

Certified Information Privacy Professional and Technologist Training Bootcamp (CIPP/US, CIPT) @ Reston/Dulles - Instructor-led/Online EST
Dec 2 @ 8:30 am – Dec 4 @ 5:00 pm

Certified Information Privacy Professional and Technologist Training Bootcamp (CIPP/US, CIPT)

Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT) Course with Intensive Hands-on Labs

Learn the principles of information privacy and privacy in technology while preparing for the CIPP/US and CIPT examinations.

In this Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT) course, you will gain foundational knowledge on concepts of privacy and data protection laws and practice. You will learn common principles and approaches to privacy as well as understand the major privacy models employed around the globe. An introduction to information security concepts and information security management and governance will be covered including frameworks, controls, and identity and access management. You will also learn about online privacy as it relates to using personal information on websites and other Internet-related technologies.

The structure of US law, the enforcement of US privacy and security laws, and information management from a US perspective will be discussed as well as the limitations on private-sector collection and usage of data. This Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT) course will also provide an introduction to workplace privacy considerations and US state laws related to marketing, financial data, data security and breach notification.

This three-day Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT) program covering the principals of information privacy and privacy technology in the US private-sector includes:

• Official IAPP CIPP and CIPT participant guides
• Official IAPP CIPP textbook and CIPT textbooks ("Introduction to IT Privacy" and "Privacy in Technology")
• Official IAPP CIPP and CIPT practice tests
• IAPP CIPP/US and CIPT certification exam vouchers
• IAPP membership for one year

Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT) - Objectives

After completing this Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT) course, attendees will be able to:

• Common principles and approaches to privacy
• Jurisdictions and industries
• Safeguarding personal information
• Online privacy
• US privacy environment
• Private-sector collection and data usage limitations
• Workplace privacy
• State privacy laws
• Regulations and standards impacting privacy in IT
• Privacy in systems and applications
• Online privacy issues
• De-identifying and anonymizing personally identifiable information
• Cloud computing


 
SHARE.

CISM Certification Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Dec 2 @ 8:30 am – Dec 5 @ 5:00 pm

CISM Certification Training Bootcamp

The CISM Certification Training Bootcamp program is an intensive four-day review program to prepare individuals who are planning to sit for the Certified Information Security Manager (CISM) exam issued by ISACA. CISM students will focus on the key exam topics covered in the CISM Review Manual 15th Edition and participate in class lectures, group discussions/activities, exam practice and answer debriefs. The CISM Certification Training Bootcamp course is intended for individuals with familiarity with and experience in information security management.

This CISM Certification Training Bootcamp course is packed with study tips and practical information, making it a great resource for the student who is planning to sit for the CISM certification exam. Aside from helping students prepare for the CISM exam, this CISM Certification Training Bootcamp or Certified Information Security Manager course will directly help those aspiring to become managers or key figures in the information security industry. For instance, students who attend this course can expect to develop a core fundamental understanding of information security as a whole, along with the relationship between information security programs and broader business goals or objectives.

CISM Certification Training Bootcamp - Objectives

This official CISM Certification Training Bootcamp seminar has a total of six primary sections. All six sections will collectively help you prepare for the CISM certification exam while also enhance your overall competencies in information security management. The six primary sections you will cover are the following:

• CISM Domain 1: Information Security Governance
• CISM Domain 2: Information Risk Management
• CISM Domain 3: Information Security Program Development and Management
• CISM Domain 4: Information Security Incident Management

Participants in the CISM training program will be provided instruction designed to provide the following:

• An understanding of the format and structure of the CISM certification exam.
• A knowledge of the various topics and technical areas covered by the exam.
• Practice with specific strategies, tips, and techniques for taking and passing the exam.
• Opportunities to execute practice questions with debriefs of answers.


 
SHARE

Systems Forensics, Investigation and Response Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Dec 2 @ 8:30 am – Dec 6 @ 5:00 pm

Systems Forensics, Investigation and Response Training Bootcamp

Systems Forensics, Investigation and Response Training Course with Hands-on Exercises

Examines the fundamentals of system forensics with this Systems Forensics, Investigation and Response Training

Systems Forensics, Investigation and Response Training; Computer crimes call for forensics specialists, people who know how to find and follow the evidence. This Systems Forensics, Investigation and Response Training course examines the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills.

Systems Forensics, Investigation and Response Training Bootcamp - Objectives

After completing this Systems Forensics, Investigation and Response Training Bootcamp course, attendees will be able to:

• The role of computer forensics in responding to crimes and solving business challenges
• System forensics issues, laws, and skills
• Purpose and structure of a digital forensics lab
• Evidence life cycle
• Procure evidence in physical and virtualized environments
• Impact of sequestration on the evidence-gathering process
• Collect evidence in network and email environments
• Automated digital forensic analysis
• Report investigative findings of potential evidentiary value
• Constraints on digital forensic investigations


 
SHARE.

VoIP Security Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Dec 2 @ 8:30 am – Dec 4 @ 5:00 pm

VoIP Security Training Bootcamp

VoIP Security Training Bootcamp In-Depth Course with Intensive Hands-on Labs

VoIP Security training Bootcamp course is planned and designed to provide the participants with a detailed technical perspective on VoIP security and its underlying technology and protocol enablers. The VoIP Security Training bootcamp course covers specifics on how to properly assess, audit and mitigate your security risks.

VoIP Security Training Bootcamp - Objectives

After completing this VoIP Security Training Bootcamp course, attendees will be able to:

• Understand VoIP
• Learn VoIP security issues
• Identify VoIP security features
• Understand the threats and security holes with VoIP call control protocols H.323, SIP, and MGCP
• Identify SIP Security Features and learn how to configure and administer those features
• Learn H.323 security issues including Port usage risk, firewall inspection, and NAT configurations
• Examine VoIP best practices to support risk mitigation
• Examine VoIP management tools and best practices to support risk mitigation
• Learn how NAT and Firewalls impact call setup, media streams, latency, and application level gateway
• Understand SIP NAT Traversal
• Examine how to overcome NAT issues using STUN, TURN, and ICE
• Examine cryptographic protocols, Datagram Transport Layer Security (DTLS) protocol, Secure Real-time Transport Protocol (SRTP) protocol and Session Description Protocol Security Descriptions (SDES) protocol


 
SHARE.

Windows Exploitation and Analysis Training (WEA) Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Dec 2 @ 8:30 am – Dec 6 @ 5:00 pm

Windows Exploitation and Analysis Training (WEA) Bootcamp - Introduction

Windows Exploitation and Analysis Training (WEA) Course with hands-on labs

This five-days Windows Exploitation and Analysis Training (WEA) Bootcamp teaches the essentials of remote network exploitation to help students develop strategies to protect and defend their networks and critical information. Students learn how to analyze remote Windows networks, locate user credentials, and expand their access across a network.

Windows Exploitation and Analysis Training (WEA) Bootcamp provides an in-depth look at the essentials of remote network exploitation, from scanning and enumeration of a network space to performing client-side attacks. This Windows Exploitation and Analysis Training (WEA) Bootcamp course is for computer network professionals, software developers, and security professionals who are responsible for protecting Windows networks and data from threats.

Windows Exploitation and Analysis Training (WEA) Bootcamp - Objectives

After completing this Windows Exploitation and Analysis Training (WEA) Bootcamp Course, attendees will be able to:

• Apply open source tools (Metasploit and Armitage) to identify key target information
• Documenting data in a target template
• Analyze and interpret research data to determine an operational strategy
• Craft and deploy phishing emails to obtain target browser data
• Explore techniques associated with collecting data and expanding access


 
SHARE

Dec
9
Mon
2019
Cloud Security Training Fundamentals Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Dec 9 @ 8:30 am – Dec 10 @ 5:00 pm

Cloud Security Training Fundamentals

Cloud Security Training Fundamentals Bootcamp Course with Intensive Hands-on Labs

Our goal with Cloud Security Training Fundamentals Bootcamp Course is to arm security teams with the knowledge they need to assess risks in moving to the cloud. Managers, auditors, and systems and network administrators will also benefit, as we will delve into the technologies available for securing cloud-based assets while covering all the policies, processes and compliance considerations that go along with this major technology shift.

Cloud Security Training Fundamentals - Objectives

After completing this Cloud Security Training Fundamentals Bootcamp Course, attendees will be able to:

• Build a risk-based assessment program for cloud providers' controls
• Understand the key areas to focus on in cloud contracts
• Evaluate the various layers of cloud infrastructure
• Develop a cloud disaster recovery and business continuity plan
• Perform vulnerability assessments in a cloud environment
• Integrate encryption and identity management services in a cloud environment
• Improve your incident response and monitoring capabilities in the cloud


 
SHARE

CSSLP Certification Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Dec 9 @ 8:30 am – Dec 13 @ 5:00 pm

CSSLP Certification Training Bootcamp

CSSLP Certification Training Bootcamp | Certified Secure Software Lifecycle Professional Training Course – Hands-on

Learn the best practices, policies, and procedures to ensure a security initiative across all phases of application development in this official (ISC)2 CSSLP Certification Training Bootcamp or Certified Secure Software Lifecycle Professional Training course.

This CSSLP Certification Training Bootcamp or Certified Secure Software Lifecycle Professional Training course is designed to take you through all aspects of the secure software lifecycle incorporating planning, designing, developing, acquiring, testing, deploying, maintaining, and managing software. With CSSLP Certification Training Bootcamp, you will also learn a series of software methodologies to develop software that is secure and resilient to attacks while meeting software requirements for compliance, quality, functionality and assurance through design principles and processes.

With CSSLP Certification Training Bootcamp or Certified Secure Software Lifecycle Professional Training, participants will gain programming concepts that can effectively protect software from vulnerabilities. You will gain skills to manage risk through the adoption of standards and best practices for the proper development, testing, and learning to employ tools and resources necessary to mitigate risk across the entire lifecycle of products all while preparing for the official (ISC)2 CSSLP exams.

CSSLP Certification Training Bootcamp - Objectives

This (ISC)² authorized CSSLP Certification Training Bootcamp seminar is based on the eight CSSLP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the CSSLP exam and enhancing their overall competencies in secure software development.

• Domain 1: Secure Software Concepts
• Domain 2: Secure Software Requirements
• Domain 3: Secure Software Design
• Domain 4: Secure Software Implementation/Programming
• Domain 5: Secure Software Testing
• Domain 6: Secure Software Lifecycle Management
• Domain 7: Software Deployment, Operations, and Maintenance
• Domain 8: Supply Chain and Software Acquisition


 
SHARE

ICS Security Training and SCADA Systems Security Training Bootcamp @ Reston - Instructor-led/Online EST
Dec 9 @ 8:30 am – Dec 13 @ 5:00 pm

ICS Security Training and SCADA Systems Security Training Bootcamp

ICS Security Training and SCADA Systems Security Training Bootcamp Course with Intensive Hands-on Labs

This ICS Security Training and SCADA Systems Security Training bootcamp Course covers everything from field based attacks to automated vulnerability assessments for SCADA networks. Learn the best practices for security SCADA networks and systems inside and out. ENO shows you how to defend against both internal and external attackers to provide holistic security for critical industrial automation systems.

ICS Security Training and SCADA Systems Security Training - Objectives

Upon completing this ICS Security Training and SCADA Systems Security Training course, learners will be able to meet these objectives:

• Better understand various industrial control systems and their purpose, application, function, and dependencies on network IP and industrial communications
• Work with control network infrastructure design (network architecture concepts, including topology, protocols, and components) and their relation to IEC 62443 and the Perdue Model.
• Run Windows command line tools to analyze the system looking for high-risk items
• Run Linux command line tools (ps, ls, netstat, ect) and basic scripting to automate the running of programs to perform continuous monitoring of various tools
• Work with operating systems (system administration concepts for Unix/Linux and/or Windows operating systems)
• Better understand the systems’ security lifecycle
• Better understand information assurance principles and tenets (confidentiality, integrity, availability, authentication, non-repudiation)
• Use your skills in computer network defense (detecting host and network-based intrusions via intrusion detection technologies)
• Implement incident response and handling methodologies
• Map different ICS technologies, attacks, and defenses to various cybersecurity standards including NIST Cyber Security Framework, ISA/IEC 62443, ISO/IEC 27001, NIST SP 800-53, Center for Internet Security Critical Security Controls, and COBIT 5


 
SHARE

Windows Forensic Analysis Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Dec 9 @ 8:30 am – Dec 13 @ 5:00 pm

Windows Forensic Analysis Training Bootcamp

Windows Forensic Analysis Training Bootcamp Course with Hands-on labs

Windows Forensic Analysis Training Bootcamp focuses on building in-depth digital forensics knowledge of the Microsoft Windows operating systems. You can't protect what you don't know about, and understanding forensic capabilities and artifacts is a core component of information security. Learn to recover, analyze, and authenticate forensic data on Windows systems.

Understand how to track detailed user activity on your network and how to organize findings for use in incident response, internal investigations, and civil/criminal litigation. Use your new skills for validating security tools, enhancing vulnerability assessments, identifying insider threats, tracking hackers, and improving security policies. Whether you know it or not, Windows is silently recording an unimaginable amount of data about you and your users. Windows Forensic Analysis Training teaches you how to mine this mountain of data.

Windows Forensic Analysis Training Bootcamp - Objectives

After completing this Windows Forensic Analysis Training Bootcamp Course, attendees will be able to:

• Conduct in-depth forensic analysis of Windows operating systems and media exploitation focusing on Windows 7, Windows 8/8.1, Windows 10, and Windows Server 2008/2012
• Identify artifact and evidence locations to answer critical questions, including application execution, file access, data theft, external device usage, cloud services, geo-location, file download, anti-forensics, and detailed system usage
• Focus your capabilities on analysis instead of how to use a specific tool
• Extract key answers and build an in-house forensic capability via a variety of free, open-source, and commercial tools provided within the SANS Windows SIFT Workstation


 
SHARE

Dec
16
Mon
2019
CISSP Certification Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Dec 16 @ 8:30 am – Dec 20 @ 5:00 pm

CISSP Certification Training Bootcamp

CISSP Certification Training Bootcamp or Certified Information Systems Security Professional Training Course Hands-on

Gain core knowledge and experience to successfully implement and manage security programs in this official (ISC)2 CISSP Certification Training Bootcamp or Certified Information Systems Security Professional Training course

This CISSP Certification Training Bootcamp course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge). With CISSP Certification Training Bootcamp, you will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

With CISSP Certification Training Bootcamp, you will learn how to determine who or what may have altered data or system information, potentially affecting the integrity of those asset and match an entity, such as a person or a computer system, with the actions that entity takes against valuable assets, allowing organizations to have a better understanding of the state of their security posture. Policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets are also covered in this CISSP Certification Training Bootcamp or Certified Information Systems Security Professional Training course.

CISSP Certification Training Bootcamp - Objectives

Our official CISSP Certification Training Bootcamp course reviews the eight CISSP certification domains featured in the (ISC)² Common Body of Knowledge (CBK). Reviewing the CBK will help students successfully prepare for the CISSP exam while also develop their overall competencies in information security.

Additional information on what you can expect to learn while reviewing each domain is found below.

• Domain 1: Security and Risk Management
• Domain 2: Asset Security
• Domain 3: Security Engineering
• Domain 4: Communications and Network Security
• Domain 5: Identity and Access Management
• Domain 6: Security Assessment and Testing
• Domain 7: Security Operations
• Domain 8: Software Development Security


 
SHARE

SSCP Certification Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Dec 16 @ 8:30 am – Dec 20 @ 5:00 pm

SSCP Certification Training Bootcamp

SSCP Training and Certification Training Course with Hands-on Exercises

Learn to implement, monitor and administer IT infrastructure in accordance with information security policies in this official (ISC)2 SSCP Certification Training Bootcamp course

The SSCP Certification Training Bootcamp or Systems Security Certified Practitioner (SSCP) credential and training seminar is ideal for those who require proven technical skills and practical security knowledge in hands-on operational IT roles. More specifically, SSCP will teach you to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.

Led by an (ISC)² authorized instructor, the training and included course material for this official SSCP Certification Training Bootcamp seminar provides students with a comprehensive review of the information security knowledge and skills needed to be successful in IT operational roles. Additionally, this course will also help students successfully prepare for the SSCP exam as it covers all seven domains in the CCSP Common Body of Knowledge (CBK).

SSCP Certification Training Bootcamp - Objectives

This (ISC)² authorized SSCP Certification Training Bootcamp seminar is based on the seven SSCP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the SSCP exam and enhance their overall competencies in cyber security.

• Domain 1: Access Controls
• Domain 2: Security Operations and Administration
• Domain 3: Risk Identification, Monitoring, and Analysis
• Domain 4: Incident Response and Recovery
• Domain 5: Cryptography
• Domain 6: Networks and Communications Security
• Domain 7: Systems and Application Security


 
SHARE

0