Zum Inhalt springen

Archiv:Security bei Kerzenschein/CISSP: Unterschied zwischen den Versionen

MiKa (Diskussion | Beiträge)
CISSP CBK Meetings: fixed link to CISSP portal
Pepi (Diskussion | Beiträge)
K Pepi verschob die Seite Security bei Kerzenschein/CISSP nach Archiv:Security bei Kerzenschein/CISSP: No activity for 3 years
 
(14 dazwischenliegende Versionen von 3 Benutzern werden nicht angezeigt)
Zeile 1: Zeile 1:
== [[Security_by_Candlelight|Security by Candlelight]] CISSP Portal==
{{Vorlage:SbC_CISSP|subtitle=Portal}}
 
{|width="100%"
|valign="top" width="220px"|
 
{|
| <small>
'''Can I get there by Candlelight'''?<br>
  How many miles to Babylon?<br>
  Three score and ten.<br>
  Can I get there by candlelight?<br>
  Aye, and back again.<br>
  If your feet are nimble and light<br>
  You'll get there by candlelight.</small>
<small><div align="right">-- Nursery Rhyme</div></small>
|}
 
|valign="top" style="padding-left: 0.5em;"|
 
[[Bild:433081 candle light 1.jpg|right|thumb|Security bei Kerzenschein]]
 
Starting in January 2013 Security by Candlelight focuses on the Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)®.
 
The CISSP certification is a well respected, vendor neutral certification from the International Information Systems Security Certification Consortium or [https://www.isc2.org/ (ISC)²]
 
The CISSP covers 10 Domains (or in other words fields of knowledge):
* Access Control
* Telecommunications and Network Security
* Information Security Governance and Risk Management
* Software Development Security
* Cryptography
* Security Architecture and Design
* Operations Security
* Business Continuity and Disaster Recovery Planning
* Legal, Regulations, Investigations and Compliance
* Physical (Environmental) Security
 
''' Location: ''' The "[[Location|Library]]" at the Metalab in Vienna: [[Lage|Map]]
 
'''Hosted by:''' Michael "[[Benutzer:MiKa|MiKa]]" Kafka and René "[[Benutzer:Lynx|Lynx]] Pfeiffer
 
|}


== What to expect ==
== What to expect ==
Zeile 54: Zeile 13:
The material is serious business and only suited for those who have a deep interest and are willing to work and learn hard. It is lengthy, highly thoretical and requires quite a bit of prerequisites to fully understand and appreciate the topics.  
The material is serious business and only suited for those who have a deep interest and are willing to work and learn hard. It is lengthy, highly thoretical and requires quite a bit of prerequisites to fully understand and appreciate the topics.  


== Duration ==
== Duration/Dates ==


The recommended duration of the source material is 5 Days. We plan to cover the topics in aprx. 20 meetings, 2 hours each (plus discussion time).
The recommended duration of the source material is 5 Days. We plan to cover the topics in aprx. 20 meetings, 2 hours each (plus discussion time). Target is every first and third Tuesday each month. Final decision will be made at our "Zero Day" and this text will be updated.


It is highly recommended to cover the suggested reading and links between our meetings which will be roughly two times a month.
It is highly recommended to cover the suggested reading and links between our meetings which will be roughly two times a month.
Zeile 72: Zeile 31:
'''Recommended Textbook:'''  
'''Recommended Textbook:'''  


CISSP All-in-One Exam Guide, 5th Edition, by Shon Harris
CISSP All-in-One Exam Guide, 5th Edition, by Shon Harris (6th Edition is current)
* McGraw-Hill Osborne Media; (February 8, 2010)
* McGraw-Hill Osborne Media; (February 8, 2010)
* ISBN-10: 0071602178 - ISBN-13: 978-0071602174
* ISBN-10: 0071602178 - ISBN-13: 978-0071602174
== Contributions and Discussions ==
* [[Security_by_Candlelight/CISSP/Material|Material]]
* [[Security_by_Candlelight/CISSP/Access_Control|Access Control]]
* [[Security_by_Candlelight/CISSP/Network_Security|Telecommunications and Network Security]]
* [[Security_by_Candlelight/CISSP/Governance|Information Security Governance and Risk Management]]
* [[Security_by_Candlelight/CISSP/Software_Development|Software Development Security]]
* [[Security_by_Candlelight/CISSP/Cryptography|Cryptography]]
* [[Security_by_Candlelight/CISSP/Security_Architecture|Security Architecture and Design]]
* [[Security_by_Candlelight/CISSP/Operations_Security|Operations Security]]
* [[Security_by_Candlelight/CISSP/Business_Continuity|Business Continuity and Disaster Recovery Planning]]
* [[Security_by_Candlelight/CISSP/Legal_and_Compliance|Legal, Regulations, Investigations and Compliance]]
* [[Security_by_Candlelight/CISSP/Physical_Security|Physical (Environmental) Security]]
* [[Security_by_Candlelight/CISSP/Glossary|Glossary]]


== CISSP CBK Meetings ==
== CISSP CBK Meetings ==
Zeile 81: Zeile 55:
|width="25"| # ||width="280"| Date ||  Topic and Host(s)  
|width="25"| # ||width="280"| Date ||  Topic and Host(s)  
|-
|-
| #00 || [[Security_bei_Kerzenschein/CISSP/SBC13_CISSP_CBK_Review_00|2013-01-22 Tue 19:00]] || '''Revival of Security by Candlelight:''' <br>Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review. Based on a Creative Commons Training by Alfred Ouyang<br>
| #02 || [[Security_by_Candlelight/CISSP/CBK_Review_02|2013-03-05 Tue 19:00]] || TBA
|-
| #01 || [[Security_by_Candlelight/CISSP/CBK_Review_01|2013-02-05 Tue 19:00]] || '''CISSP CBK:''' Definitions, Terms and Vocabulary
|-
| #00 || [[Security_by_Candlelight/CISSP/SBC13_CISSP_CBK_Review_00|2013-01-22 Tue 19:00]] || '''Revival of Security by Candlelight: CISSP CBK Zero Day''' <br>Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review. Based on a Creative Commons Training by Alfred Ouyang<br>
Hosted by [[User:MiKa|MiKa]]. Location: The Library. [[Security_by_Candlelight/CISSP|CISSP Portal]]
Hosted by [[User:MiKa|MiKa]]. Location: The Library. [[Security_by_Candlelight/CISSP|CISSP Portal]]
|-
|-
|}
|}