Beruflich Dokumente
Kultur Dokumente
KEEP YOUR
ORGANIZATION SECURE
Cybersecurity professionals are scarce. (ISC)2 research shows an estimated
1.8 million cybersecurity jobs will go unfilled by 2022. But by creating
a clear career advancement path, you can reverse this trend. In fact,
enterprises who certify and train their staff are more likely to retain critical
human resources. And (ISC)2 is here to make sure your investment pays off.
We help you certify, train, develop and retain your greatest asset –
your staff. Use our proven Enterprise Solutions to prepare and motivate
the individuals essential to protecting your organization.
| 2
Enterprise Solutions for Cybersecurity
Certification and Training
Every organization has unique certification and training needs, and cookie-cutter
solutions fall short of meeting them. That’s why (ISC)2’s offerings can be tailored
to your budget, schedule and cybersecurity requirements. Count on our team
of account executives to recommend solutions that validate expertise, keep
cybersecurity skills sharp and prove credibility to partners and clients.
(ISC)² Certifications
You may know (ISC)² for our acclaimed CISSP certification, but that’s just
the beginning. We offer everything you need for enterprise cybersecurity
certification and training. Organizations all over the world rely on us to certify,
train and educate a diverse and changing workforce. Explore the (ISC)2
certifications that support your corporate goals.
3
Industry-Leading Cybersecurity Certifications for All
Levels of Your Organization
Risk management demands a company culture fully entrenched in security. Anyone who touches
administrative functions in your systems or sensitive data must validate their cybersecurity
expertise. Leverage our portfolio of industry-leading cybersecurity certifications to cover a wide
range of experience and skill levels. Consider these advantages.
55
(ISC)2 Direct: Training Solutions
for Your Enterprise
Think of us as your one-stop source for cybersecurity training, education and professional
development. As the creator and keeper of the Common Body of Knowledge (CBK) for
all (ISC)² certifications, we develop official courseware and deliver official training to your
enterprise requirements.
• Learns from authorized, certified (ISC)² instructors who make the content highly
relatable
• Receives comprehensive exam prep to maximize content retention and performance
through real-world learning activities and scenarios
• Gains deep understanding of the most current exam topic areas covering all domains
of knowledge
• Gets full support with official (ISC)² study tools, including the student handbook, flash
cards and practice exam items*
• Has all the tools to prepare for and take the real exam
With (ISC)2 Direct, you also can choose programs aligned with your goals and team
training needs.
• Use courseware developed by the creator and keeper of the certification’s Common Body
of Knowledge (CBK)
• Ensure your trainer truly understands the course content and a how to deliver the materials
effectively.
• Make training convenient for your employees and save on travel costs
• Go beyond exam prep and increase teambuilding and problem solving
• Train a large group of employees at the same time
• Customize course activities to relate to organizational challenges
(ISC)2 account executives will work with you to set up a customized program that can deliver
cost savings based on volume.
7
Reasons to Partner with (ISC)2 for Your Team’s Training
In addition to working with official training providers who use our official courseware, we offer
our own training programs that can be tailored to your cybersecurity certification training
needs. From self-paced to instructor-led, (ISC)² has training options to fit every schedule and
learning style. When you partner with us, we guide you with dedicated support every step of
the way.
Dedicated Support
A dedicated (ISC)2 account executive serves as your training advisor. They ensure your
training program fits your budget and certification requirements – helping you get the best
return on your organization’s investment.
Up-to-Date Content
As the creator and keeper of the Common Body of Knowledge (CBK) for all our certifications,
we make sure your organization always has access to the most up-to-date courseware.
• Training seminars taught at the leading training centers around the world
• More options for class times and locations
• Tailored solutions based on regionalized markets
• Opportunity to buy bundles of (ISC)2 training along with other industry-
relevant certification and educational training courses
• Custom versions of the course including immersive "Bootcamp" reviews
and other bundled training packages developed by certain Official Training
Providers.
• Education guarantees, reports, and customized enterprise solutions to meet
your organization’s training and certification needs.
9
Convenient Delivery Methods
Pursue the (ISC)² Direct learning methods that match your organization’s needs.
| 10
Education Guarantee Protects
Your Investment
If your employee has completed Official (ISC)²
CBK Training but does not pass the exam, they can
attend a classroom-based or online instructor-led
seminar at no additional cost to your organization.
Top 5 Benefits
of Getting Your
Employees 1 Protect against threats in an
increasingly complex cyber world.
2
(ISC)2 Trained
and Certified Support professional development
and retention.
12
CISSP Training Course
Course Objectives
After completing this course, the student will be able to:
• Understand and apply fundamental concepts and methods related to the fields of
information technology and security
• Align overall organizational operational goals with security functions and
implementations
• Understand how to protect assets of the organization as they go through their lifecycle
• Understand the concepts, principles, structures and standards used to design,
implement, monitor and secure operating systems, equipment, networks, applications
and those controls used to enforce various levels of confidentiality, integrity and
availability
• Implement system security through the application of security design principles and
application of appropriate security control mitigations for vulnerabilities present in
common information system types and architectures
• Understand the importance of cryptography and the security services it can provide in
today’s digital and information age
• Understand the impact of physical security elements on information system security and
apply secure design principles to evaluate or recommend appropriate physical security
protections
• Understand the elements that comprise communication and network security coupled
with a thorough description of how the communication and network systems function
• List the concepts and architecture that define the associated technology and
implementation systems and protocols at Open Systems Interconnection (OSI) model
layers 1-7
• Identify standard terms for applying physical and logical access controls to environments
related to their security practice
• Appraise various access control models to meet business security requirements
• Name primary methods for designing and validating test and audit strategies that
support business requirements
• Enhance and optimize an organization’s operational function and capacity by applying
and utilizing appropriate security controls and countermeasures
• Recognize risks to an organization’s operational endeavors and assess specific threats,
vulnerabilities and controls
• Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC)
and how to apply security to it; identify which security control(s) are appropriate for the
development environment; and assess the effectiveness of software securit
14
SSCP Training Course
Course Objectives
Note: Course will be updated in November 2018
• Understand the different Access Control systems and how they should be
implemented to protect the system and data using the different levels of
confidentiality, integrity and availability
• Understand the processes necessary for working with management and information
owners, custodians and users so that proper data classifications are defined. This will
ensure the proper handling of all hard copy and electronic information as it is applied
by the Security Operations and Administration.
• Identify, measure and control losses associated with adverse events, and review,
analyze, select and evaluate safeguards for mitigating risk
• Identify how to handle Incident Response and Recovery using consistent, applied
approaches including the use of the Business Continuity Plan (BCP) and Disaster
Recovery Plan (DRP) concepts to mitigate damages, recover business operations,
avoid critical business interruption, and apply emergency response and
post-disaster recovery
• Identify and differentiate key cryptographic concepts and how to apply them,
implement secure protocols, key management concepts, key administration and
validation, and Public Key Infrastructure as it applies to securing communications in
the presence of third parties
• Define and identify the Networks and Communications Security needed to secure
network structure, data transmission methods, transport formats, and the security
measures used to maintain integrity, availability, authentication and confidentiality of
the information being transmitted
• Identify and define technical and non-technical attacks and how an organization
can protect itself from these attacks including the concepts in endpoint device
security, cloud infrastructure security, securing big data systems and securing virtual
environments
16
CCSP Training Course
Course Objectives
After completing this course, the student will be able to:
• Describe the physical and virtual components of and identify the principle
technologies of cloud based systems
• Define the roles and responsibilities of customers, providers, partners, brokers and
the various technical professionals that support cloud computing environments
• Identify and explain the five characteristics required to satisfy the NIST definition of
cloud computing
• Differentiate between various as a Service delivery models and frameworks that are
incorporated into the cloud computing reference architecture
• Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring
compliance with regulatory agencies and working with authorities during legal
investigations
• Contrast between forensic analysis in corporate data center and cloud computing
environments
• Evaluate and implement the security controls necessary to ensure confidentiality,
integrity and availability in cloud computing
• Identify and explain the six phases of the data lifecycle
• Explain strategies for protecting data at rest and data in motion
• Describe the role of encryption in protecting data and specific strategies for key
management
• Compare a variety of cloud-based business continuity / disaster recovery strategies
and select an appropriate solution to specific business requirements
• Contrast security aspects of Software Development Lifecycle (SDLC) in standard data
center and cloud computing environments
• Describe how federated identity and access management solutions mitigate risks in
cloud computing systems
• Conduct gap analysis between baseline and industry-standard best practices
• Develop Service Level Agreements (SLAs) for cloud computing environments
• Conduct risk assessments of existing and proposed cloud-based environments
• State the professional and ethical standards of (ISC)² and the Certified Cloud Security
Professional
18
CAP Training Course
Course Objectives
Note: Course will be updated in October 2018
• Describe the historical legal and business considerations that required the
development of the Risk Management Framework (RMF), including related mandates
• Identify key terminology and associated definitions
• Describe the RMF components, including the starting point inputs (architectural
description and organization inputs)
• Describe the core roles defined by the RMF, including primary responsibilities and
supporting roles for each RMF step
• Describe the core federal statutes, OMB directives, information processing standards
(FIPS) and Special Publications (SP), and Department of Defense and Intelligence
Community instructions that form the legal mandates and supporting guidance
required to implement the RMF
• Identify and understand the related processes integrated with the RMF
• Identify key references related to RMF Step 1 – Categorize Information Systems
• Identify key references related to RMF Step 2 – Select Security Controls
• Identify key references related to RMF Step 3 – Implement Security Controls
• Identify key references related to RMF Step 4 – Assess Security Controls
• Identify key references related to RMF Step 5 – Authorize Information System
• Identify key references related to RMF Step 6 – Monitor Security Controls
20
CSSLP Training Course
Course Objectives
After completing this course, the student will be able to:
• Identify the software methodologies needed to develop software that is secure and
resilient to attacks
• Incorporate security requirements in the development of software to produce
software that is reliable, resilient and recoverable
• Understand how to ensure that software security requirements are included in the
design of the software, gain knowledge of secure design principles and processes,
and gain exposure to different architectures and technologies for securing software
• Understand the importance of programming concepts that can effectively protect
software from vulnerabilities. Learners will touch on topics such as software coding
vulnerabilities, defensive coding techniques and processes, code analysis and
protection, and environmental security considerations that should be factored into
software.
• Address issues pertaining to proper testing of software for security, including the
overall strategies and plans. Learners will gain an understanding of the different types
of functional and security testing that should be performed, the criteria for testing,
concepts related to impact assessment and corrective actions, and the test data
lifecycle.
• Understand the requirements for software acceptance, paying specific attention to
compliance, quality, functionality and assurance. Participants will learn about pre- and
post-release validation requirements as well as pre-deployment criteria.
• Understand the deployment, operations, maintenance and disposal of software from
a secure perspective. This is achieved by identifying processes during installation and
deployment, operations and maintenance, and disposal that can affect the ability of
the software to remain reliable, resilient and recoverable in its prescribed manner.
• Understand how to perform effective assessments on an organization’s cyber-supply
chain, and describe how security applies to the supply chain and software acquisition
process. Learners will understand the importance of supplier sourcing and being able
to validate vendor integrity, from third-party vendors to complete outsourcing. Finally,
learners will understand how to manage risk through the adoption of standards
and best practices for proper development and testing across the entire lifecycle of
products.
22
HCISPP Training Course
Course Objectives
• Conceptualize the diversity in the healthcare industry. To achieve this, learners will gain
knowledge of the diverse types of healthcare organizations, types of technologies, how
information and data flows and is managed, how data is exchanged, and the levels of
protection required for that data.
• Identify and describe the relevant legal and regulatory requirements regarding healthcare
information. These requirements are necessary to ensure that the organization’s policies
and procedures are in compliance and that all trans-border data exchange procedures are
followed.
• Describe security and privacy concept principles as they relate to the Healthcare industry.
Learners will be able to understand the relationship of security and privacy, and how to
manage and handle all information requiring data protection in the healthcare industry.
• Identify how organizations manage information risk, and what security and privacy
governance means for that information. Learners will be introduced to basic risk
management methods and lifecycles, and the activities that support these concepts.
• Describe risk assessment, and the risk assessment practices and procedures for an
organization.
• Identify concepts for managing third-party relationships. Learners will gain knowledge
regarding concepts pertaining to their use of information, any additional security and
privacy assurances, third-party assessments, third-party security and privacy events, and
recognize the mitigation process of third-party risks.
| 24
Maintaining (ISC)2 Membership and Certification
When your employees achieve (ISC)2 certification, they join one of the world’s largest
communities of cybersecurity professionals. They also gain access to unparalleled global
resources and endless opportunities to refine their craft.
Just as certification must be earned, it also must be maintained. To remain in good standing,
(ISC)2 members are required to:
Earning CPEs
(ISC)2 makes it easy for your employees to grow and earn CPE credits regularly. Our
account executives oversee your organization’s re-certification requirements and notify your
certified members of local CPE opportunities to satisfy requirements that keep skills sharp.
CPE requirements vary by certification. Contact your (ISC)2 account executive for details.
25
(ISC)2 Member Benefits
We offer access to:
| 26
Industry Awards and Recognition
• CCSP and CISSP topped “The Next Big Thing” list as the #1
and #2 certifications Annual Salary Survey respondents plan to
earn in 2018 — Certification Magazine
27
Center for Cyber Safety and Education
The Center for Cyber Safety and Education is the charitable foundation of (ISC)2, a
non-profit trust committed to making the cyber world a safer place for everyone.
The Center works to ensure people across the globe have a positive and safe experience
online through educational programs, scholarships and research. Join our mission as a great
corporate citizen!
| 28
Get Involved: Corporate Social Responsibility
Corporate social responsibility. Your employees want it; your customers expect it. The
Center will work with you to organize a Cyber Safety Program campaign that best suits your
organization. Whether it’s an “Adopt a School” event where your company sponsors Garfield
in the classroom or an educational event, we’ll work together to help your employees make a
real impact in the community.
29
(ISC)2 Vendor Sponsorship Opportunities
Become a Sponsor of (ISC)2 Events
Sponsoring and/or exhibiting at (ISC)² Security Congress or an (ISC)² Secure Summit
provides your company with the opportunity to engage with security professionals.
Join other industry leaders and up-and-coming organizations showcasing their latest
technologies first-hand to attendees. This is your opportunity to demonstrate your cutting-
edge, innovative products and services while networking with thousands of industry experts,
luminaries and peers.
| 30
(ISC)2 Security Briefings - webinar series is a multi-part “deep dive” on a subject over
a pre- determined period. This allows the sponsor to present exclusively on a topic,
getting deeper in the subject matter over a longer period of time.
(ISC)2 Briefings On Demand - This is a pre- recorded version of the Security Briefings
above – NOT live webinars. We will pre-record all the webinars in your series and release
them at the same time into our on-demand archive library (similar to Netflix when they
drop an entire season of a TV show all at once).
(ISC)2 Solutions Summit - Solution providers to present their approach to a certain issue
or problem, talking about the technologies that they use and the approach they take to
solve the challenge at hand.
InfoSecurity Professional Magazine – Published six times of a year and Feature Articles
– Deeper dives into topics that every information security professional confronts during
their career, from the latest threats and solutions to how to manage members of a
security operations center.
Cloud Security Insights - Cloud Security Insights is our newest e-newsletter, focused
on various aspects of cloud security. We’ll feature at least one primary article of original
content related to cloud security trends and perennial topics that assist all security
professionals.
31
ABOUT (ISC)2
(ISC)2 is an international nonprofit membership association
focused on inspiring a safe and secure cyber world. Best known
or the acclaimed Certified Information Systems Security
Professional (CISSP) certification, (ISC)2 offers a portfolio of
credentials that are part of a holistic, programmatic approach to
security. Our membership, more than 138,000 strong, is made
up of certified cyber, information, software and infrastructure
security professionals who are helping to advance the industry.