CSX Fundamentals Workshop

Size: px
Start display at page:

Download "CSX Fundamentals Workshop"

Transcription

1 CSX Fundamentals Workshop December 2017 Final registration 1 December 2017 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large Chapter in Europe/Africa (2009, 2012, 2013, 2014)

2 Contents 1. Introduction 1. Introduction 1 2. Scope 1 3. Who should attend? 1 4. Why attend 2 5. Where? When? Who will be the Trainer? 2 6. What will you learn? 2 7. Course Summary 3 8. Registration Process 4 9. Frequently Asked Questions Travelling Information 6 Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). Cybersecurity Nexus (CSX) is a new platform for security knowledge and a professional development and certification program in cybersecurity. Launched by ISACA, CSX provides IT security and cybersecurity professionals with the knowledge and technical skills to defend their organization from security breaches and cyber-attacks. A key part of Cybersecurity Nexus is its training workshops and innovative certification tracks. ISACA International notes that while other cyber security certifications assess knowledge in a question-and-answer format, CSX training and exams are conducted in a live, virtual cyber lab environment and test on whether an individual has the skills and technical savvy to do the job. The Certification Tracks CSX certifications are designed to test a candidate s ability to perform tasks of various degrees of complexity within 5 cybersecurity areas: identify protect detect respond recover. This new cybersecurity path begins with the CSX Fundamentals Certificate, which offers a knowledge-based credential on the introductory concepts that frame and define the standards, guidelines and practices of the industry. It also provides insight into the importance of cybersecurity and the integral role of cybersecurity professionals. The next 4 levels of CSX Certifications are based on the knowledge and concepts covered in the CSX Fundamentals Certificate but test competencies in scenarios that become more complex and sophisticated the higher the level. The CSX Fundamentals workshop is offered for the second time in Greece, after the quick sold out of the first course which was held, last November. The course is offered exclusively in Greece by ISACA Athens Chapter with the support of the Hellenic American Union. 2. Scope of the course This workshop is geared toward IT security professionals new to cyber security, recent graduates in IT-relevant fields, and IT professionals looking for a career change to cybersecurity. It prepares you for the CSX Fundamentals Exam covering the foundational areas of cyber security: Cybersecurity objectives and roles The difference between cybersecurity and information security The Principles of Cybersecurity Information Security within Lifecycle management Risks and Vulnerabilities Incident Response 2 ISACA Athens Chapter CSX Fundamentals Workshops

3 3. Who should attend? IT security professionals new to cybersecurity, IT oriented graduates and those IT professionals looking for a career change to cybersecurity. 4. Why attend? By the end of the course you will: Understand basic cybersecurity concepts and definitions Define network security architecture concepts Recognize malware analysis concepts and methodology Identify computer network defense (CND) and vulnerability assessment tools, including open source tools and their capabilities Explain network systems management principles, models, methods, and tools Distinguish system and application security threats and vulnerabilities Classify types of incidents (categories, responses, and timelines for responses) Outline disaster recovery and business continuity planning Comprehend incident response and handling methodologies Understand security event correlation tools, and how different file types can be used for a typical behavior Be aware of the basic concepts, practices, tools, tactics, techniques, and procedures for processing digital forensic data Recognize new and emerging information technology and information security technologies 5. Where? When? Who will be the Trainer? The course will be held at the Hellenic American Union Conference Center, Massalias 22, Athens, on 8-9 December 2017 (Friday, Saturday), from 9.00 to Course leader: Iro Hatzopoulou, CISA, HISP, CCSK, ISEB BCM, CSA STAR Auditor, P2, CSX (F) Iro has graduated from the Aristotle University of Thessaloniki where she participated in projects, at both under- and post- graduate level, of molecular modeling of materials using computer programs. Holds two Master s Degrees the first one in Physics of Materials and the second in Informatics with specialization on Evaluation of Security in Cloud Computing. During her professional carrier she has been employed by some IT oriented companies as IT professional member of the IT Dpt, as Network Responsible, as Security officer and others. Apart from the above, since 2001 she has been an Instructor of various IT related courses. From 2004 till today, she has been a member of the International Certification Body TUV AUSTRIA HELLAS, subsidiary of the TUV AUSTRIA group. She is an active Senior auditor for Management Audits in the fields of Information Security, IT Service Management, Business Continuity, Quality and Quality in Education and an instructor in various specialized topics. ISACA Athens Chapter CSX Fundamentals Workshops 3

4 6. What will you learn? Cybersecurity introduction and overview Cybersecurity architecture principles Cybersecurity definition Objectives of cybersecurity Key business and technology factors Cybersecurity roles and governance Domains of cybersecurity Cybersecurity concepts Risk management terms, concepts and frameworks Common attack types and vectors General process and attributes of cyber attacks Malware Framework and guidance for policies and procedures Cybersecurity control processes Security architecture Perimeter security concepts Security architectures and frameworks The OSI model and TCP/IP communication protocol Defense in depth Firewall concepts and implementations Isolation and segmentation Intrusion detection and prevention systems Antivirus and anti-malware Encryption fundamentals, techniques and applications Security of networks, systems, applications and data Risk analysis, risk assessments and risk mitigation strategies Scanning, assessment and management of vulnerabilities Penetration testing Network management and configuration Port numbers and protocols Risk and controls for remote and wireless access System hardening and virtualization Specialized systems Command line knowledge and tools System development life cycle (SDLC) OWASP top ten application security risk Data classification process and requirements Incident response Distinctions between events and incidents Incident categories and types Security event management Key elements of incident response plans Legal requirements of investigation and evidence preservation Requirements for forensic investigations Business continuity planning and disaster recovery The security implications of the adoption of emerging technologies Trends in the current threat landscape Characteristics and targets of advanced persistent threats (APTs) Mobile device vulnerabilities, threats and risk BYOD and consumerization of IT and mobile devices Risk and benefits of cloud and digital collaboration 4 ISACA Athens Chapter CSX Fundamentals Workshops

5 7. Course Summary Prerequisites Fundamental concepts of IT Security, IT academic background CPEs 16 Languages Greek Planning 8-9 December 2017 (Friday, Saturday), Cost STANDARD RATE 350 per participant for ISACA member 450 per participant for non-isaca member Unemployed ISACA members: 200 per participant Special price sponsored by Isaca Athens Chapter Cost includes course material Cost does not include exam fees This program is subsidized by LAEK/OAED 0,24% (for participants from Greek companies only) Registration fees to be paid until 1 December ISACA Athens Chapter CSX Fundamentals Workshops 5

6 8. Registration Process Step 1 Step 2 Step 3 Fill in the registration form at the end of this document and send it to Hellenic American Union by following the respective guidelines below the registration form. Hellenic American Union will send a registration confirmation receipt via . Send payment amount to Hellenic American Union by following the payment details on the registration form at the end of this document. For bank transfer information please contact the Hellenic American Union. We will send you bank transfer information once we receive your registration form. Please always quote the invoice number which you will receive once you have registered, or alternatively please quote your company s name or the delegates name in the transfer instructions. Step 4 The amount to be credited should be net of commissions. Any commissions/fees for bank deposits or transfers are payable by participants. You will receive a course registration invoice from Hellenic American Union after we receive your payment. Payments: All registrations & payments must be received by the Hellenic American Union the latest by 1 December Invoices are issued by the Hellenic American Union. Cancellations/Substitutions must be made via and sent to training@hau.gr. A full refund can be given for cancellation requests received in writing 10 working days before the course commencement. No refund will be given for cancellation requests after this deadline. A replacement is always welcome at no extra cost! 6 ISACA Athens Chapter CSX Fundamentals Workshops

7 9. Frequently Asked Questions When is the CSX Fundamentals exam? Is there one combined registration process for the CSX exam and the ISACA Athens Chapter s CSX Fundamentals Course? Is attending this ISACA CSX Fundamentals sufficient enough for me to pass this exam successfully The Cybersecurity Fundamentals Certificate exam is available online, at your convenience. Simply schedule the date and time that works best for you and your exam will be remotely proctored. No, there are two separate registration processes because the exam is administered by ISACA International. One registration combining both CSX exam fees and CSX Fundamentals course fees is not possible. Yes What is the date of the next CSX Fundamentals course? Are there any special fees for unemployed members of ISACA Athens Chapter for this course? ISACA Athens Chapter will only run 2 CSX Fundamental Courses each year. Next course dates will be announced after the successful completion of this course. Yes, please refer to the registration form. ISACA Athens Chapter CSX Fundamentals Workshops 7

8 10. Travel Information Accommodation - Recommended hotel For those travelling to Athens or from abroad and need accommodation, we recommend Titania hotel ( In order to take advantage of special rates, please contact Ms Vasiliki Zafiri ( , vzafiri@hau.gr) at the Hellenic American Union. Transportation arrangements We highly recommend using our excellent Athens public transportation (metro). You need to validate your paper ticket at the beginning of your journey. Intergrated tickets (as well as Metro airport tickets) are valid for 90 minutes so you don t need to validate it again if you use another mode of transportation anywhere in Athens within 90 minutes of the first validation. Ticket price is 8 (one way) or 14 (for 2 journeys return ticket). One way ticket for 2 persons is 14 and for 3 persons is 20. Getting to/from the Athens International Airport and the city center, located about 36 km east can be achieved via metro: Take the Blue line (line 3 direction Anthoupoli ) of the metro from Athens International Airport and get off at Syntagma station. Trains run every 30 minutes, 7 days a week from 6:30 a.m. to 11:30 p.m. The trip from/to the Airport to Syntagma metro station (Athens center) lasts 40 minutes. See the Metro timetable to the airport here and also an Athens airport railway station map. For ticket info see Athens Transport tickets and cards. 8 ISACA Athens Chapter CSX Fundamentals Workshops

9 From Syntagma metro station you can: a. either change and take the Red line (line 2 direction Anthoupoli) in order to get off at next stop, Panepistimio metro station (exit National Library) and walk approximately 4-5 minutes towards Omonia square to Titania Hotel (it is just on your right hand side). b. Walk from Syntagma Square to Titania Hotel through Panepistimiou street (it is approximately minutes walk) Red route: from metro Syntagma Station (circled A) and Panepistimio Station (circle) to Hotel (B) and venue (C) Blue route: alternative route from Hotel (B) to venue (C) On last evening at the end of the Exam Preparation Course (at 17:00), you can take the metro from Syntagma directly to the airport. Alternatives: a. By Bus (map: From the Airport take Bus Line X95 Syntagma Athens Airport Express (Orange Line). From Syntagma Square you can either take the Metro (see above) or walk to Titania Hotel. You can also take a bus (most of them are passing by in front of the hotel, while some stop right in front of the hotel). b. By Taxi (Flat fare: 35 Euros) c. By Car (36 km, minutes depending however on traffic) Via Attiki Odos, route 6/Ε94, 31,6 km, 35 min Via Mesogeion Avenue, 20,8 km, 34 min Via Route 64, 26 km, 34 min ISACA Athens Chapter CSX Fundamentals Workshops 9

10 Registration Form I wish to register for the CSX Fundamentals Workshop, 8-9 December Please send this registration form to Hellenic American Union fax nr. (30) , or at training@hau.gr. Registration Fees Isaca Members Non Members Unemployed ISACA members Special price sponsored by Isaca Athens Chapter 350 q 450 q 200 q q I wish to register the workshop for the 0,24 OAED-LAEK subsidy program In order to guarantee a place on the course and the exams, delegates are kindly requested to register until the 1st December PERSONAL DETAILS (Please print clearly) (*mandatory fields for individual registrations only) Family Name First Name Company Position/Title Home address* (individual/personal registrations only) City* Postal Code* Tel* Fax Ε-mail Tax ID Nr./Tax Registration Office* (for individual registrations only) INVOICE DETAILS (all fields are mandatory for company registrations) COMPANY NAME Area of Business Address City Postal Code Tel Fax Tax ID Nr. Tax Registration Office I/We understand and accept the registration and cancellation policies and procedures, and the protection of personal and credit card data policy. Signature/Company stamp Date PAYMENT DETAILS Payments are made to the Hellenic American Union immediately upon registration. Once the Hellenic American Union receives the registration form, we will send you confirmation and payment transfer information. PAYMENT METHOD q Please invoice my company ** For bank transfer information please contact the Hellenic American Union. We will send you bank transfer information Bank Transfer** q VISA q MASTERCARD q once we receive your registration form. Please always quote the invoice number which you will receive once you have registered, or alternatively please quote your company s name or the delegates name in the transfer instructions. An invoice will be sent upon receipt of payment. CANCELLATION POLICY A full refund will be given for cancellations requests received in writing up to 10 working days prior the course starts. Cancellations received within less than 10 working days before the course will not be refunded. A replacement is always welcome. Disclaimer: ISACA Athens Chapter and Hellenic American Union reserve the right to change or cancel any part of the published program due to unforeseen circumstances. In case the event is cancelled, registration fees will be returned in full to the delegates. The Hellenic American Union collects and uses personal information in order to communicate with the members of its public, to provide educational and cultural programs and services, and to improve the quality of services that it offers. The information we have requested in this form will be maintained in digital and/or physical form and used only for the purposes described above. You have the right to reasonable access to the personal information we have on you, to request a copy of this information, and to correct it if inaccurate. To find out more, contact the Hellenic American Union at privacy@hau.gr. In association with * * A recognized Center for Lifelong Learning (ΚεΔιΒιΜ2) that has been granted a license of operation by the National Organization for the Certification of Qualifications and Vocational Guidance (EOPPEP)

11 Information ISACA Athens Chapter For membership please contact: For certifications please contact: LinkedIn Group: ISACA Athens Chapter Twitter: isaca_gr Facebook: ISACA Athens Chapter For further information about the preparation course, please contact: Ηellenic American Union Tel: , Fax: , or ISACA Athens Chapter

CISM Prep Course 2015

CISM Prep Course 2015 CISM Prep Course 2015 20-22 April 2015 Early registration 23 March 2015 Final registration 6 April 2015 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large Chapter

More information

CISA Prep Course 2017

CISA Prep Course 2017 CISA Prep Course 2017 13-15 November 2017 Final registration 6 November 2017 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large Chapter in Europe/Africa (2009,

More information

CISM Prep Course 2018

CISM Prep Course 2018 CISM Prep Course 2018 31 May - 2 June 2018 Early registration 27 April 2018 Final registration 23 May 2018 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large

More information

CISA Prep Course 2016

CISA Prep Course 2016 CISA Prep Course 2016 11-13 April 2016 Early registration 30 March 2016 Final registration 4 April 2016 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large Chapter

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

INFORMATION SYSTEMS AUDITOR EXAM PREPARATION COURSE NICOSIA LIVE ON-LINE. 1 P a g e

INFORMATION SYSTEMS AUDITOR EXAM PREPARATION COURSE NICOSIA LIVE ON-LINE. 1 P a g e CERTIFIED INFORMATION SYSTEMS AUDITOR EXAM PREPARATION COURSE NICOSIA LIVE ON-LINE 1 P a g e COURSE DESCRIPTION The Certified Information Systems Auditor () is a world renowned accreditation awarded by

More information

English for International Business Communication

English for International Business Communication English for International Business Communication Your survival kit for business interaction hellenic american union Massalias 22, 106 80 Athens, T.: 210 36 80 900, F.: 210 3633174 e-mail: hau@hau.gr, http://www.hau.gr

More information

Workshop description

Workshop description Workshop description COBIT5 for Assurance With information and technology at the heart of creating value for enterprises, it is more important than ever for organizations to optimize their IT assurance

More information

English for International Business Communication. Your survival kit for business interaction

English for International Business Communication. Your survival kit for business interaction English for International Business Communication Your survival kit for business interaction This interactive, 60-hour program helps you develop confidence and sophistication in the use of English when

More information

CYBERSECURITY NEXUSTM (CSX) The Premier Source For Cyber Security Knowledge and Expertise

CYBERSECURITY NEXUSTM (CSX) The Premier Source For Cyber Security Knowledge and Expertise CYBERSECURITY NEXUSTM (CSX) The Premier Source For Cyber Security Knowledge and Expertise In enterprise IT, there is a single point where everything that matters in information, technology and business

More information

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

CISA Training.

CISA Training. CISA Training www.austech.edu.au WHAT IS CISA TRAINING? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual

More information

Training Opportunities

Training Opportunities July September 2014 Training Opportunities Meeting Your Training Needs and CPE Requirements Group-Live Course Group Internet-Based Course To learn more or register for any of these events, visit www.gfoa.org.

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

Program Management Professionals (PgMP)

Program Management Professionals (PgMP) An ISO 9001:2015 & ISO 29990:2010 Certified Company PgMP and PMI are registered marks of the Project of the Project Management Institute Inc. Program Management Examination Preparatory Course 02-06 December

More information

RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process

RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process Date 24-25 September 2018 Time: 09:00 17:00 Location Hotel Grand, Tirana, Albania Course director: Mr. Konstantinos P. Triantafyllidis,

More information

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032 ISO/IEC 27032 Lead Manager 23rd - 27th October 2017 Hilton Hotel, Sandton, Johannesburg Master the implementation and management of a Program based on ISO/IEC 27032 Why should you attend? Manager training

More information

Effective COBIT Learning Solutions Information package Corporate customers

Effective COBIT Learning Solutions Information package Corporate customers Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides

More information

COURSE BROCHURE CISA TRAINING

COURSE BROCHURE CISA TRAINING COURSE BROCHURE CISA TRAINING What is CISA? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual within

More information

ISACA Enterprise. Solutions and Resources

ISACA Enterprise. Solutions and Resources ISACA Enterprise Solutions and Resources About ISACA Global association serving 140,000 members and certification holders Members in 180+ countries; 210+ chapters worldwide Developed and maintains the

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

Cybersecurity Auditing in an Unsecure World

Cybersecurity Auditing in an Unsecure World About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity

More information

Program Management Professionals (PgMP)

Program Management Professionals (PgMP) An ISO 9001:2015 & ISO 29990:2010 Certified Company Program Management 10-14 Dec 2017 Dubai, United Arab Emirates 27-JUN-17 Program Management Why Choose this Training Course? Program management is the

More information

TÜV Rheinland Functional Safety Program

TÜV Rheinland Functional Safety Program IICA Functional Safety Engineer Training Safety Instrumented Systems TÜV Rheinland Functional Safety Program IICA Functional Safety Engineer SIS Training TÜV Rheinland Functional Safety Program The IICA

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard Certification Exam Outline Effective Date: April 2013 About CISSP-ISSMP The Information Systems Security Management Professional (ISSMP) is a CISSP who specializes in establishing, presenting, and governing

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

English for International Business Communication

English for International Business Communication Registration Procedures INDIVIDUAL PARTICIPATION On-line: You can enroll by clicking the Buy Online tab at the top of the course description page. You will be asked to login to proceed. You need a valid

More information

IT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur

IT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur IT Audit Essentials Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur IT Audit Essentials Workshop Overview ISACA Malaysia Chapter is

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion

More information

Network Security

Network Security 44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including

More information

COURSES LEADING TO THE BCS CERTIFICATE IN INFORMATION SECURITY MANAGEMENT PRINCIPLES (CISMP)

COURSES LEADING TO THE BCS CERTIFICATE IN INFORMATION SECURITY MANAGEMENT PRINCIPLES (CISMP) COURSES LEADING TO THE BCS CERTIFICATE IN INFORMATION SECURITY MANAGEMENT PRINCIPLES (CISMP) CISMP FROM AMBERHAWK TRAINING LIMITED MAY 2017 CERTIFICATE IN INFORMATION SECURITY MANAGEMENT PRINCIPLES (CISMP)

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course Meeting your training needs and CPE requirements T raining opportunities July-September 2015 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org

More information

TRAINING DAYS 2017 Using the ISA/IEC Standards to Secure Your Control Systems (IC32) Milan, July 3th 4th

TRAINING DAYS 2017 Using the ISA/IEC Standards to Secure Your Control Systems (IC32) Milan, July 3th 4th TRAINING DAYS 2017 Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32) Milan, July 3th 4th DESCRIPTION The move to using open standards such as Ethernet, TCP/IP, and web technologies

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

The Project Management Professional (PMP) Examination Preparatory Course

The Project Management Professional (PMP) Examination Preparatory Course An ISO 9001:2015 & ISO 29990:2010 Certified Company This course is registered with the Project Management Institute (PMI) R.E.P. Program* The Project Management Professional (PMP) 17-21 Sep 2017 Dubai,

More information

October 21-23, 2013 Holly Springs, NC

October 21-23, 2013 Holly Springs, NC NEBB s Cleanroom Performance Testing Certified Professional Seminar and Exam October 21-23, 2013 Holly Springs, NC Introduction: NEBB, in continuance of its policy to enhance education and training within

More information

Professional Evaluation and Certification Board Frequently Asked Questions

Professional Evaluation and Certification Board Frequently Asked Questions Professional Evaluation and Certification Board Frequently Asked Questions 1. About PECB... 2 2. General... 2 3. PECB Official Training Courses... 4 4. Course Registration... 5 5. Certification... 5 6.

More information

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 EC-Council Certified Incident Handler v2 Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 THE CRITICAL NATURE OF INCIDENT HANDLING READINESS An organized and

More information

raining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course

raining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course Meeting your training needs and CPE requirements T raining opportunities April-June 2018 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org

More information

PECB Certified ISO/IEC Lead Auditor

PECB Certified ISO/IEC Lead Auditor When Recognition Matters Lead Auditor 25-29 March 2018 Master the Audit of Rainbow Towers Hotel, Harare Systems (ISMS) based on $1250.00 Who should attend? - Auditors seeking to perform and lead System

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

AVIATION CYBER SECURITY TRAINING

AVIATION CYBER SECURITY TRAINING AVIATION CYBER SECURITY TRAINING STANDARDS IN PRACTICE -DAY TRAINING COURSE ED-0 ED-0A ED-0 ED-04 ED-0 - Aeronautical Information System Security (AISS) Framework Guidance ED-0A - Airworthiness Security

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Certified Cyber Security Specialist

Certified Cyber Security Specialist Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal

More information

Information Security Officer (ISO) Education

Information Security Officer (ISO) Education Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville, Tenn. Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville,

More information

PMP Exam Preparation Training in Dubai. The Project Management Professional (PMP) September 2018 Dubai, United Arab Emirates

PMP Exam Preparation Training in Dubai. The Project Management Professional (PMP) September 2018 Dubai, United Arab Emirates An ISO 9001:2015 & ISO 29990:2010 Certified Company 17-SEP-17 The PMI Registered Education Provider logo and PMP are registered marks of the Project Management Institute, Inc. PMP Exam Preparation The

More information

Radware. Training Policies V001.70

Radware. Training Policies V001.70 Radware Training Policies V001.70 TABLE OF CONTENTS SCOPE & DISCLAIMER...3 QUESTIONS?...3 TRAINING...4 OVERVIEW... 4 DELIVERY OPTIONS... 4 TRAINING ENROLLMENT & REGISTRATION... 5 COURSE EVALUATION... 5

More information

1 st Annual Meeting for Abacus Latin America Members

1 st Annual Meeting for Abacus Latin America Members 1 st Annual Meeting for Abacus Latin America Members March 14-15, 2019 Hilton Garden Inn Montevideo, Uruguay The Meeting Abacus Worldwide brings firms together on a global scale but our Regional Meetings

More information

PMP Certification Preparatory Course

PMP Certification Preparatory Course PMP Certification Preparatory Course Client Relation Officer Ewa Kazimierczuk Tel. 508 018 380 ewa.kazimierczuk@pl.ey.com Dates: Warszawa, 8-10 October 2018 5-6 November 2018 Price: 5000 PLN net or 1140

More information

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco

More information

2 nd Annual Meeting for Abacus North America Members

2 nd Annual Meeting for Abacus North America Members 2 nd Annual Meeting for Abacus North America Members April 30 May 1, 2019 The Ritz-Carlton Atlanta Atlanta, Georgia USA The Meeting Abacus Worldwide brings firms together on a global scale but our Regional

More information

PMP Certification Preparatory Course

PMP Certification Preparatory Course PMP Certification Preparatory Course Why Project Management Professional (PMP ) Certification? In today's flexible organization, the boundaries between functions are becoming less defined. You are most

More information

2018 CALENDAR OF ACTIVITIES

2018 CALENDAR OF ACTIVITIES 2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals

More information

Green Building/LEED AP Building Design & Construction Exam Preparation

Green Building/LEED AP Building Design & Construction Exam Preparation Green Building/LEED AP Building Design & Construction Exam Preparation Be among the first to master the new green building principles in the region February 16 17 and May 11 12, 2011 American University

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central

More information

CMI QUALIFICATIONS IN MANAGEMENT & LEADERSHIP (LEVEL 3, 5 AND 7)

CMI QUALIFICATIONS IN MANAGEMENT & LEADERSHIP (LEVEL 3, 5 AND 7) CMI QUALIFICATIONS IN MANAGEMENT & LEADERSHIP (LEVEL 3, 5 AND 7) GLOBAL REACH The BIBF plays a vital role in the training and human capital development in the region. The BIBF qualifies over 20,000 learners

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

Configuration, Installation, Commissioning, Troubleshooting, Operation & Maintenance

Configuration, Installation, Commissioning, Troubleshooting, Operation & Maintenance ISO 9001:2008 Certified ISO 29990:2010 Certified (Certificate No:1007049195) ISO 29990 (Certificate No: 1078694951) Foundation Fieldbus Troubleshooting, Operation & Maintenance 29 May - 02 June 2016 Muscat

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

Become a Certified Association Executive through the CAE Program

Become a Certified Association Executive through the CAE Program How do the fees work Each course in the CAE Program has a CSAE member and non-member rate. There is also a one-time materials fee applicable when registering for your first course. Full details and the

More information

QuickBooks Online Security White Paper July 2017

QuickBooks Online Security White Paper July 2017 QuickBooks Online Security White Paper July 2017 Page 1 of 6 Introduction At Intuit QuickBooks Online (QBO), we consider the security of your information as well as your customers and employees data a

More information

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT WELCOME TO ISACA 2015 Claudio CILLI, CISA, CISM, CRISC, CGEIT cilli@di.uniroma1.it http://dsi.uniroma1.it/~cilli WHO IS ISACA? ABOUT ISACA The trusted source of guidance, networking and career development

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting

More information

ACCREDITED HEALTH & SAFETY SHORT COURSES

ACCREDITED HEALTH & SAFETY SHORT COURSES ACCREDITED HEALTH & SAFETY 2018 ACCREDITED HEALTH & SAFETY INTRODUCTION Our services benefit any organization dedicated to the development and enhancement of skills and knowledge through training. Frontline

More information

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager 2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager NIST Cybersecurity Framework (CSF) Executive Order 13636 Improving Critical Infrastructure Cybersecurity tasked the National

More information

CompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018

CompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+)   17 Sep 2018 Course Outline CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Application for Certification

Application for Certification Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the

More information

IT Auditing and IT Fraud Detection

IT Auditing and IT Fraud Detection IT Auditing and IT Fraud Detection Page 1 of 7 Why Attend In today s world, IT fraud prevention and investigation have become an everyday part of corporate life and auditors must gain expertise in this

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified EC-Council C T Certified I A Threat Intelligence Analyst CERTIFIED THREAT INTELLIGENCE ANALYST PROGRAM BROCHURE 1 Predictive Capabilities for Proactive Defense! Cyber threat incidents have taken a drastic

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course Meeting your training needs and CPE requirements T raining opportunities July-September 2018 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org

More information

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security

More information

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com DFARS Compliance SLAIT Consulting SECURITY SERVICES Mike D Arezzo Director of Security Services Introduction 18+ year career in Information Technology and Security General Electric (GE) as Software Governance

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

30 September - 3 October 2018* Kempinski Hotel, Mall of the Emirates, Dubai, UAE

30 September - 3 October 2018* Kempinski Hotel, Mall of the Emirates, Dubai, UAE 30 September - 3 October 2018* OFFER 32 FOR Save up to $1000 by booking early! www.institutelm.com Who Should Attend? This cutting-edge course has been tailor made for professionals in the Middle East

More information

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

ISACA s CSX Cybersecurity Practitioner Certification CPE Policy Table of Contents

ISACA s CSX Cybersecurity Practitioner Certification CPE Policy Table of Contents 1 Table of Contents MAINTAINING YOUR CSX CYBERSECURITY PRACTITIONER CERTIFICATION... 3 CERTIFICATION REQUIREMENTS... 3 AUDITS OF CPE HOURS... 4 RECORDKEEPING... 4 QUALIFYING LEARNING ACTIVITIES... 4 NOTIFICATION

More information

Oil & Gas Industry Quality Management System Auditor/ Lead Auditor Training

Oil & Gas Industry Quality Management System Auditor/ Lead Auditor Training An Intensive 2-Week Training Course Oil & Gas Industry Quality Management System Auditor/ Lead Auditor Training 27 Oct - 07 Nov 2019, Dubai 24-OCT-18 This course is Designed, Developed, and will be Delivered

More information

Certification Council of Medical Auditors, Inc. Recertification Handbook

Certification Council of Medical Auditors, Inc. Recertification Handbook Certification Council of Medical Auditors, Inc. Recertification Handbook No part of this publication may be reproduced, transmitted, or copied by any means without the written permission of the Certification

More information

Networking Fundamentals Training

Networking Fundamentals Training Networking Fundamentals Training INNOVATIVE ACADEMY s Best Computer Networking Training in Bangalore is designed so Innovative to help you clear the Comp-TIA s N+ Certification. You will gain excellent

More information

raining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course

raining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course Meeting your training needs and CPE requirements T raining opportunities April-June 2015 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

A Level ICT Transition Pack

A Level ICT Transition Pack Sawtry Village Academy Extended Certificate Level 3 in IT- Single Award Diploma Level 3 in IT Double Award A Level ICT Transition Pack A Level ICT- Skills for the real business world In today s world,

More information

ASH Group Information and FAQ's

ASH Group Information and FAQ's TABLE OF CONTENTS 1. WHAT DO THE BADGES LOOK LIKE?... 2 2. REGISTRATION TYPE DEFINITION... 2 3. WHAT IS A GROUP ADMINISTRATOR?... 2 4. HOW DO I SUBMIT MY GROUP S REGISTRATIONS?... 3 5. WHAT ARE THE REGISTRATION

More information

NEBB Basic Building Systems Commissioning Certified Professional Seminar and Exams

NEBB Basic Building Systems Commissioning Certified Professional Seminar and Exams NEBB Basic Building Systems Commissioning Certified Professional Seminar and Exams March 19-22, 2014 Atlanta, GA INTRODUCTION Enrollment is limited. Available openings will be filled on a first come-first

More information

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic

More information