C)SP - Certified Security Principles

This course is going to prepare you for security across the entire environment including understanding risk management, identity and access control, network and data security. This is just a short list of everything that we cover within this course, which will include new technologies like IoT and cloud services. This course is intended to prepare you to be a benefit to any company that is attempting to improve its security posture! With this certification, you will be marketable to any company, anywhere in the globe!

Student Testimonials

Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus. Student
Excellent presentation skills, subject matter knowledge, and command of the environment. Student
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect. Student

Click here to print this page »


Recommended minimum one-year of experience with server administration or network administration. General understanding of business processes is beneficial.

Detailed Class Syllabus

Module 1 – Introduction to IT Security

Understanding Security
Building a Security Program
CIA Triad
Governance, Risk, Compliance
State of Security Today

Module 2 – Risk Management

Risk Management
Risk Assessment
Types of Risk, Threats and Vulnerabilities
Mitigating Attacks
Discovering Vulnerabilities and Threats
Responding to Risk

Module 3 – Understanding of Cryptography

Understanding Cryptography
Symmetric Encryption
Asymmetric Encryption

Module 4 – Understanding Identity and Access Management

Identity Management
Authentication Techniques
Single Sign-on
Access Control Monitoring

Module 5 – Managing Data Security

Virtualization Principles
Key Components Mapped to Cloud Layer
Key Security Concerns
Other Technologies Used in the Cloud
The Layers
Relevant CCM Controls

Module 6 – Data Security

Different Types of Storage
Encryption Options
Data Management

Module 7 – Managing Server/Host Security

The Operating Systems
Hardening the OS
Physical security
Virtualization and Cloud Technologies

Module 8 – Application Security for Non-Developers

Application Security Principle
Software Development Life Cycle
OWASP Top 10
Hardening Web Applications
Patch/Update/Configuration Management

Module 9 – Understanding Mobile Device Security (IoT)

What Devices are we talking about?
What is the risk?
Hardening Mobile/IoT Devices
Corporate Management

Module 10 – Managing Day to Day Security

Company Responsibilities
Product Management
Business Continuity Basics
Incident Response
Why Train?

Module 11 – Understating Compliance and Auditing

Benefits of Compliance
Assurance Frameworks
What is Auditing