Access Control
- General Concepts
- Authentication
- Principles
- Types and Categories
- Reference Monitor
- Techniques
- Models
- Passwords
- Smart Cards
- Biometrics
- Access Control Systems
- Administration
- Residuals
- Accountability
- Summary
Telecommunications and Network Security
- OSI Reference Model
- ISO/OSI Layers and Characteristics
- Topologies
- LAN Access Methods
- Wireless
- System and Security Management
- Internet Protocols and Security
- Firewall Terms and Types
- Web Security
- Common Attacks
- Remote Access Security
- Summary
Information Security Governance and Risk Management
- Key Concepts
- Definitions
- Key Concepts
- Risk Management
- Risk Assessment
- Useful Formulas
- 3rd Party Governance
- Information Classification
- Roles and Responsibilities
- Written Guidance
- Policies and Standards
- Employment Policies
- Employee Education Programs
- Change Management
- Summary
Software Architecture and Design
- Problems
- Databases
- Query Language
- Object Oriented
- Applications Beyond the Database
- Definitions
- Application System Development
- Controls
- Compiled vs. Interpreted
- Vulnerabilities
- Botnets
- Summary
Cryptography
- Definitions
- Cryptanalysis Terms
- Symmetric Encryption
- Asymmetric Encryption
- Hybrid Encryption
- Public Key Infrastructures
- Hash Functions
- Digital Signatures
- Protocol Based
- Pretty Good Privacy
- Cracking Techniques
- Summary
Security Architecture and Design
- Abstract Levels
- Computer Hardware
- Operating Systems
- Processors
- Types of Storage
- Information Security Architecture
- Open and Closed Systems
- Access Controls
- Architectural Foundation
- Modes of Operation
- Certification and Accreditation
- Evaluation Criteria
- Security Models
- Summary
Operations Security
- Threats in an Operating Environment
- Control Categories
- Accountability
- Trusted Recovery
- Management and Administrative Control
- Due Care and Diligence
- Hardware and Software Controls
- Email and Fax
- Privilege
- Physical Access
- Monitoring Techniques
- Problem Management
- Threats and Vulnerabilities
- Defence in Depth
- Summary
Business Continuity and Disaster Recovery
- The Basics
- Reasons for BCP
- Key Concepts
- Definitions
- Business Continuity Life Cycle
- Project Initiation
- Business Impact Analysis
- Assessing Risk
- Recovery Strategies
- Off-Site Requirements
- Data Redundancy
- System Backups
- Plan Development
- Testing and Maintenance
- Stages in an Incident
- Summary
Legal Requirements and Investigations
- Ethics
- Code of Ethics
- Laws
- Intellectual Property
- Proprietary Rights
- Liability
- Computer Crime
- Computer Crime Laws
- Computer Investigation
- Investigation Steps
- Computer Forensics
- Evidence Admissibility
- Summary
Physical and Environmental Security
- Physical Security
- Crime Prevention
- Site Design and Configuration
- Boundary Protection
- Computing Facility Requirements
- Fire Prevention
- Fire Suppression
- Fire Classes
- Media Protection
- Access Controls
- Physical Security
- Summary
£295.00Original price was: £295.00.£99.00Current price is: £99.00.