![]() |
Information Security Professional
|
Class DescriptionCovers information security thoroughly, including access control, application security, business continuity, cryptography, risk management, legal issues, physical security, and telecommunications and network security. This class helps to prepare students for the Certified Information Systems Security Professional (CISSP) credential, which is essential for high-level information security professionals. Students are strongly encouraged to practice with the Transcender prep tests before taking the exam, and access to those tests will be included in the class.
Prerequsites: Students should have Network+ and Security+ level understanding
of networking and security. Previous experience of hacking is helpful
but not required.
TextbookCISSP All-in-One Exam Guide, Fifth Edition, by Shon Harris ISBN-10: 0071602178 Buy from Amazon
Optional Supplementary Textbook (source of lectures) |
Schedule | ||||
---|---|---|---|---|
Date | Topic | |||
Mon, June 13 9:30 - 12:30 & 1:30 - 4:30 | Ch 3: Information Security and Risk Management Ch 4: Access controls | |||
Tue, June 14 9:30 - 12:30 & 1:30 - 4:30 | Ch 5: Security Architecture and Design Ch 6: Physical and Environmental Security Wardriving | |||
Wed, June 15 9:30 - 12:30 & 1:30 - 4:30 | Ch 7: Telecommunications and Network Security Ch 8: Cryptography Social Event 5 - 7 | |||
Thu, June 16 9:30 - 12:30 & 1:30 - 4:30 | Ch 9: Business Continuity and Disaster Recovery Planning Ch 10: Legal, Regulations, Compliance and Investigations Ch 11: Application Security OWASP's Top Ten Web Application Risks | |||
Fri, June 17 9:30 - 12:30 | Ch 12: Operations Security |
Lectures | |
---|---|
Introduction to CNIT 125 | |
Encrypted email setup guide | |
3: Information Security and Risk Management | Word doc |
4: Access controls | Word doc |
5: Security Architecture and Design | Word doc |
6: Physical and Environmental Security | Word doc |
7: Telecommunications and Network Security | Word doc |
8: Cryptography | Word doc |
9: Business Continuity and Disaster Recovery Planning | Word doc |
10: Legal, Regulations, Compliance and Investigations | Word doc |
11: Application Security | Word doc |
OWASP's Top Ten Web Application Risks | |
12: Operations Security | Word doc |
The lectures are in Word and PowerPoint formats. If you do not have Word or PowerPoint you will need to install the Free Word Viewer 2003 and/or the Free PowerPoint Viewer 2003. |