Maxtrain.com - [email protected] - 513-322-8888 - 866-595-6863
Security Principles are your first line of defense, but often the last box checked! The IT world never stands still! Therefore, neither can IT security. It does not matter if we are talking about the implementation of IoT devices or cloud services, security is important. According to a recent study, the top source of security incidents within a company are the current employees!
The Certified Security Principles, C)SP, course is going to prepare you for security across the entire environment including understanding risk management, identity and access control, network and data security. This is just a short list of everything that we cover within this course, which will include new technologies like IoT and cloud services. This course is intended to prepare you to become a benefit to any company that is attempting to improve its security posture!
We suggest that you master the concepts in the C)SP before moving into 300 level in the Management, Response and Recovery, or Auditing Career Paths. This 5 Day Instructor Led course will introduce you to many of the key concepts you will need to succeed in the other courses.
The Certified Security Principles candidate will not only be able to competently take the C)SP exam but will also understand the principle security knowledge to keep companies’ IP and IT infrastructure safe.
The Certified Security Principles exam is taken online through Mile2’s Learning Management System and is accessible on you Mile2.com account.
A minimum grade of 80% is required for certification.
Self-Study Package includes (1-year access):
Mile2 is Accredited by the NSA-CNSS, Approved on Homelands Security NICCS Framework, and is on the FBI’s Tier 1-3 Certification Training Chart.
a. Understanding Security
c. Building a Security Program
d. CIA Triad
e. Governance, Risk, Compliance
f. State of Security Today
a. Risk Management
b. Risk Assessment
c. Types of Risk, Threats and Vulnerabilities
d. Mitigating Attacks
e. Discovering Vulnerabilities and Threats
f. Responding to Risk
a. Understanding Cryptography
b. Symmetric Encryption
c. Asymmetric Encryption
f. Cryptography in Use
a. Identity Management
b. Authentication Techniques
c. Single Sign-on
d. Access Control Monitoring
Module 5 – Managing Data Security
a. Virtualization Principles
b. Key Components Mapped to Cloud Layer
c. Key Security Concerns
d. Other Technologies Used in the Cloud
e. The Layers
f. Relevant CCM Controls
a. Different Types of Storage
b. Encryption Options
c. Data Management
a. The Operating Systems
b. Hardening the OS
c. Physical security
d. Virtualization and Cloud Technologies
a. Application Security Principle
b. Software Development Life Cycle
c. OWASP Top 10
d. Hardening Web Applications
e. Patch/Update/Configuration Management
a. What Devices are we talking about?
b. What is the risk?
c. Hardening Mobile/IoT Devices
d. Corporate Management
a. Company Responsibilities
b. Product Management
c. Business Continuity Basics
d. Incident Response
e. Why Train?
a. Benefits of Compliance
b. Assurance Frameworks
c. What is Auditing