NTG Clarity Training Centre
SECURITY:
Advanced Firewalls
Advanced Penetration Testing
BILL C-6 (PIPEDA)
CISSP Exam & CBK Seminar
» About CBK
· CBK Review Seminar
··> 10 CBK Domains
· Background
- About the Exam
- Schedule
- Registration
- Contact Us
CompTIA Security +
Security Management - Policies, Standards and Procedures
Systems Security Certified Practitioner (SSCP)
COMING SOON
Cisco Security
Cisco Secure PIX Firewalls Advanced (CSPFA)
Microsoft Windows Security 2000
Network +
Oracle Databse Security
Security Corporate Info for Management
SQL Server Security
Unix Security

Certified Information Systems Security Professional (CISSP)
Common Body of Knowledge (CBK) Review

The Ten CBK Domains and Their Subsections

  1. Security Management Practices
    • Concepts & Objectives
    • Risk Management
    • Policies and Procedures
    • Information Classification
    • Information Security Roles and Responsibilities
    • Information Security Awareness
    • Handling Incidents
  2. Access Control Systems & Methodology
    • Concepts
    • Issues
    • Identification & Authentication
    • Single Sign On
    • Centralized Access Control Methodologies
    • Decentralized/Distributed Access Control Methodologies
    • Access Control Technologies
    • Access Control Monitoring
  3. Law, Investigations, Ethics
    • Laws and Regulations
    • Conducting Investigations
    • Information Ethics

    TOP

  4. Physical Security
    • Facilities Management
    • Personnel Security
    • Physical Controls
  5. Business Continuity & Disaster Recovery Planning
    • Business Continuity Concepts
    • Disaster Recovery Concepts
    • Recovery Planning Process
    • Program Management
    • Vulnerability Assessment
    • Plan Development & Maintenance
    • Plan Testing
    • Prevention
  6. Security Architecture & Models
    • Computer Science and Architecture
    • Security and Control Concepts
    • Security Models
    • Evaluation Criteria
    • Host Based Security
    • Client Server Security
    • Network Architecture
    • Network Security
    • IP Security Architecture

    TOP

  7. Cryptography
    • History
    • Definitions
    • Applications & Uses of Cryptography
    • Protocols and Standards
    • Basic Technologies
    • Encryptions Systems
    • Symmetric / Asymmetric Cryptography
    • Digital Signatures
    • E-mail Security Using Encryption
    • Internet Security Using Encryption
    • Key Management
    • Public Key Infrastructure (PKI)
    • Cryptanalysis & Attacks
    • Export Issues
  8. Telecommunications & Network Security
    • Communications Security Management
    • Network Protocols
    • Identification & Authentication
    • Data Communications
    • Internet & Web Security
    • Attack Methods
    • Multimedia Security
    • Incident Response Management

    TOP

  9. Applications & Systems Development
    • Definitions
    • Security Goals & Threats
    • System Life Cycle
    • Security Architecture
    • Change Control
    • Application Development & Security Measures
    • Databases and Data Warehousing
    • Knowledge Based Systems
  10. Operations Security
    • Resources
    • Privileges
    • Control Mechanisms
    • Potential Abuses
    • Appropriate Controls
    • Principles

    TOP

Legal Disclaimer.
©2003 NTG Clarity Networks Inc.