C)SP - Certified Security Principles

This course is going to prepare you for security across the entire environment including understanding risk management, identity and access control, network and data security. This is just a short list of everything that we cover within this course, which will include new technologies like IoT and cloud services. This course is intended to prepare you to be a benefit to any company that is attempting to improve its security posture! With this certification, you will be marketable to any company, anywhere in the globe!

Student Testimonials

Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus. Student
Excellent presentation skills, subject matter knowledge, and command of the environment. Student
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect. Student

Click here to print this page »

Prerequisites


Recommended minimum one-year of experience with server administration or network administration. General understanding of business processes is beneficial.

Detailed Class Syllabus


Module 1 – Introduction to IT Security


Understanding Security
Responsibilities
Building a Security Program
CIA Triad
Governance, Risk, Compliance
State of Security Today

Module 2 – Risk Management


Risk Management
Risk Assessment
Types of Risk, Threats and Vulnerabilities
Mitigating Attacks
Discovering Vulnerabilities and Threats
Responding to Risk

Module 3 – Understanding of Cryptography


Understanding Cryptography
Symmetric Encryption
Asymmetric Encryption
Hashing
PKI

Module 4 – Understanding Identity and Access Management


Identity Management
Authentication Techniques
Single Sign-on
Access Control Monitoring

Module 5 – Managing Data Security


Virtualization Principles
Key Components Mapped to Cloud Layer
Key Security Concerns
Other Technologies Used in the Cloud
The Layers
Relevant CCM Controls

Module 6 – Data Security


Different Types of Storage
Encryption Options
Data Management

Module 7 – Managing Server/Host Security


The Operating Systems
Hardening the OS
Physical security
Virtualization and Cloud Technologies

Module 8 – Application Security for Non-Developers


Application Security Principle
Software Development Life Cycle
OWASP Top 10
Hardening Web Applications
Patch/Update/Configuration Management

Module 9 – Understanding Mobile Device Security (IoT)


What Devices are we talking about?
What is the risk?
Hardening Mobile/IoT Devices
Corporate Management

Module 10 – Managing Day to Day Security


Company Responsibilities
Product Management
Business Continuity Basics
Incident Response
Why Train?

Module 11 – Understating Compliance and Auditing


Benefits of Compliance
Assurance Frameworks
What is Auditing