(ISC)2 CISSP® CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL INTRODUCTION

During this fast-paced, two-day session, you will cover the eight domains of the (ISC)2 CISSP CBK. This fact-filled course will assist in your review of the CBK topics and deepen your knowledge of information security. Each day of the presentation is divided into various domains of the CBK. These domains will cover essential topics such as current security challenges, problem resolution, application security, network security, infrastructure planning, legal considerations, international privacy, investigations, and forensics among other topics.

The instructor will utilize (ISC)2 course materials to guide you through the most pertinent information to understand prior to taking the examination or enhancing your current CISSP credential. The two-day session will conclude with a practice exam.

Presentation:The facilitator will explain content to participants using PowerPoint to guide the presentation. Multiple examples will be used to clarify points.

Short Lecture/Discussion:The facilitator will engage participants in conversation by asking questions and encouraging them to respond. Participants will be encouraged to provide examples from their experience.

Computers: The course will not require the course participants to have laptops or computer devices during the class presentation.

Trainer: Kevin L Jackson
Max participants: 50
Cost: $1600

This is a Two Day Course
October 7-8, 2019

Course Objectives

This course covers security computing essentials and innovations from a high level and introduces many topics that may be immediately applied in the workplace. Topics include:

  • Planning better security in the enterprise
  • Differentiating newer types of security in applications
  • Differentiating newer types of security in networks
  • Differentiating newer types of security in cloud computing
  • Understanding types of cloud deployment models and hosting options
  • Determining how IT-based organizational roles are helpful with transitioning and managing IT operations
  • Identifying vendor roles, responsibilities, and organizational skill requirements
  • Understanding privacy and compliance across geographic boundaries and jurisdictions
  • Monitoring strategies for information systems security
  • Understanding future trends

The CISSP Introduction is ideal for those working in positions such as, but not limited to:

Security Consultant Security Analyst
Security Manager Security Systems Engineer
IT Director/Manager Chief Information Security Officer
Security Auditor Director of Security
Security Architect Network Architect
Programmers

Requisite Skills

  • Participants should have demonstrated competency in security management on a large, enterprise-wide scale.
  • Participants should possess skills in project management, risk management, creating and delivering a security awareness program, and managing a business continuity planning program.
  • Also, a participant should have a far more well-rounded and complete comprehension of information security than other popular management credentials.
  • Participants should have knowledge of architecture and solving issues with chief security architects or analysts, or work as independent consultants (or in similar capacities), enhancing functionality between the C-suite and upper managerial level and the implementation of a security program.
  • The participant generally either consults on, develops, designs, or analyzes an organization’s overall security plan.

After Completing This Course, the Participant Will Be Able To:

  • Identify key terminology and associated definitions related to cloud technology. Be able to establish a common terminology for use within your team or workgroup.
  • Understand the legal and contractual considerations, security implications, and privacy and compliance regulations as they apply to system security implementation.
  • Build a business case for security adoption, and be able to determine with business units the benefits of the cloud and cloud migration strategies.
  • Identify, understand, and construct basic security components.
  • Identify security-relevant functions within information technology systems and relationships between security functions resident within multiple systems in the environment.
  • Generate comprehensive sets of security requirements and allocate security function responsibility between multiple systems or system components

Course Outline

Day 1: Certified Information Systems Security Professional CBK® Introduction

  • Course Introduction
  • Domain 1: New and existing practices in Security and Risk Management
  • Domain 2: New and existing practices in Asset Security
  • Domain 3: New and existing practices in Security Engineering
  • Domain 4: New and existing practices in Communication and Network Security

Day 2: Certified Information Systems Security Professional CBK® Introduction

  • Domain 5: New and existing practices in Identity and Access Management
  • Domain 6: New and existing practices in Security Assessment and Testing
  • Domain 7: New and existing practices in Security Operations
  • Domain 8: New and existing practices in Software Development Security
  • Wrap-up Quiz and Discussion

Agenda

Monday Oct 7, 2019

Start 10:00
Lunch 12:15 – 13:00 (Lunch is provided)
Break 14:35 – 14:45
End 17:00

Tuesday Oct 8, 2019

Start 10:00
Lunch 12:15 – 13:00 (Lunch is provided)
Break 14:35 – 14:45
End 17:00

Meet the Trainer

Kevin L. Jackson

Kevin L. Jackson is the Founder and CEO of GovCloud Network, a management consulting firm specializing in helping corporation adapt to the new cloud computing environment. Through his “Cloud Musings” blog, Mr. Jackson has been recognized as one of Cloud Computing Journal “World’s 30 Most Influential Cloud Bloggers” (2009, 2010), a Huffington Post Top 100 Cloud Computing Experts on Twitter (2013) and the author of a FedTech Magazine “Must Read Federal IT Blog” (2012, 2013). In 2012, he was also named a “Cyber Security Visionary” by U.S. Black Engineer and Information Technology magazine. His first book, GovCloud: Cloud Computing for the Business of Government was published by Government Training Inc. and released in March 2011. His second book, released in 2012 by the same publisher, is titled “GovCloud II: Implementation and Cloud Brokerage Services”. He is also a co-author of the Intelligence and National Security Alliance whitepaper “Cloud Computing: Risks, Benefits, and Mission Enhancement for the Intelligence Community”. Kevin Jackson was most recently a contributor to Hudson Whitman,’s “Cybersecurity in our Digital Lives” and his next book” Practical Cloud Security: A Cross-Industry View “(ISBN13: 9781498729437), with Dr. Melvin Greer will be released in second quarter 2016.

Kevin has been deeply involved in the broad collaborative effort between industry and the U.S. National Institute of Standards and Technology on the broad adoption of cloud computing technologies. He has been certified as an instructor by the National Cloud Technologist Association and the Cloud Credential Council and holds a Certificate of Cloud Security Knowledge from the Cloud Security Alliance. Mr. Jackson developed and delivered both half-day executive training seminars and four-day cloud computing training classes to multiple US Army Commands in the US, Europe and Korea. Mr. Jackson is currently pursuing a Ph.D. in Applied Information Technology at the George Mason University Volgenau School of Engineering and serves as a Cybersecurity Fellow at The National Cybersecurity Institute at Excelsior College.

Mr. Jackson retired from the U.S. Navy in 1994, earning specialties in Space Systems Engineering, Carrier Onboard Delivery Logistics and carrier-based Airborne Early Warning and Control. While active, he also served with the National Reconnaissance Office, Operational Support Office, providing tactical support to Navy and Marine Corps forces worldwide. His corporate experience includes VP & General Manager Cloud Services NJVC, VP Federal Systems at Sirius Computer Solutions, Worldwide Sales Executive, Mobile, Wireless & Voice at IBM, Vice President Global IT Project Office at JP Morgan Chase, and CTO at SENTEL Corporation.