CISSP Domain – Security Architecture and Design

This course is included in our On-demand training solution.

Overview

Computer administrators have a variety of mechanisms that can be used to secure modern enterprise environments. Several access control standards and models have been created by the international community to secure both personnel access and information recovery within an enterprise environment. This course examines hardware and software systems, memory storage types, security models, and security controls. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

Target Audience

Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers

Prerequisites

Expected Duration

120 min.

Course Objectives

Architecture Frameworks

  • recognize the components of a basic information system architecture
  • identify the considerations involved in implementing security architecture
  • Addressing and States

  • recognize key CPU operational factors involved in secure addressing
  • match system operating states to their descriptions
  • Machine Types and Functions

  • differentiate between machine types
  • identify the purpose of the resource manager
  • Storage Types

  • classify memory types as either RAM or ROM
  • match storage types to their descriptions
  • Computer Network Operation

    Certification, Accreditation, and OS Protection

  • match the phases of the evaluation process to their descriptions
  • recognize the essential features of operating system protection
  • match the access control mechanism to it’s description
  • Security Evaluation Standards

  • recognize the methods used to evaluate security in a networking environment
  • Security Models

  • identify the key features of security models
  • Ensuring Network Security

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?