Archiv:Security bei Kerzenschein/CISSP: Unterschied zwischen den Versionen
MiKa (Diskussion | Beiträge) (→Contributions and Discussions: added "Material") |
Pepi (Diskussion | Beiträge) K (Pepi verschob die Seite Security bei Kerzenschein/CISSP nach Archiv:Security bei Kerzenschein/CISSP: No activity for 3 years) |
||
(Eine dazwischenliegende Version von einem anderen Benutzer wird nicht angezeigt) | |||
Zeile 54: | Zeile 54: | ||
{| border="2" cellspacing="0" cellpadding="2" width="100%" style="border-collapse:collapse;" | {| border="2" cellspacing="0" cellpadding="2" width="100%" style="border-collapse:collapse;" | ||
|width="25"| # ||width="280"| Date || Topic and Host(s) | |width="25"| # ||width="280"| Date || Topic and Host(s) | ||
|- | |||
| #02 || [[Security_by_Candlelight/CISSP/CBK_Review_02|2013-03-05 Tue 19:00]] || TBA | |||
|- | |||
| #01 || [[Security_by_Candlelight/CISSP/CBK_Review_01|2013-02-05 Tue 19:00]] || '''CISSP CBK:''' Definitions, Terms and Vocabulary | |||
|- | |- | ||
| #00 || [[Security_by_Candlelight/CISSP/SBC13_CISSP_CBK_Review_00|2013-01-22 Tue 19:00]] || '''Revival of Security by Candlelight: CISSP CBK Zero Day''' <br>Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review. Based on a Creative Commons Training by Alfred Ouyang<br> | | #00 || [[Security_by_Candlelight/CISSP/SBC13_CISSP_CBK_Review_00|2013-01-22 Tue 19:00]] || '''Revival of Security by Candlelight: CISSP CBK Zero Day''' <br>Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review. Based on a Creative Commons Training by Alfred Ouyang<br> |
Aktuelle Version vom 19. Oktober 2016, 15:15 Uhr
CISSP Portal
|
The CISSP certification is a well respected, vendor neutral certification from the International Information Systems Security Certification Consortium or (ISC)²
Location: The "Library" at the Metalab in Vienna: Map Hosted by: Michael "MiKa" Kafka and René "Lynx" Pfeiffer Twitter: @MetaLabSbC |
What to expect
With the CISSP CBK Review we want to establish a study-group or a workshop to learn the details of information systems security and security management togehter in a group. The focus is not on technical details like SQL-injections, Cross-Site-Scripting or buffer overflows etc... instead we focus on high-level topics which are theoretical, abstract and annoyingly formal.
This will not be a classical training with an instructor who teaches you everything necessary. You will need to devote a lot of time for self-study, reading and learning inbetween the meetings.
Who should come?
We recommend these events to security specialists and those who want to become one.
The material is serious business and only suited for those who have a deep interest and are willing to work and learn hard. It is lengthy, highly thoretical and requires quite a bit of prerequisites to fully understand and appreciate the topics.
Duration/Dates
The recommended duration of the source material is 5 Days. We plan to cover the topics in aprx. 20 meetings, 2 hours each (plus discussion time). Target is every first and third Tuesday each month. Final decision will be made at our "Zero Day" and this text will be updated.
It is highly recommended to cover the suggested reading and links between our meetings which will be roughly two times a month.
Material
The series of meetings is based on the Creative Commons Licensed Training by Alfred Ouyang.
Creative Commons Material can be accessed here:
http://opensecuritytraining.info/CISSP-Main.html
I recommend to start with References/CISSP_Glossary_v1.1.docx
Recommended Textbook:
CISSP All-in-One Exam Guide, 5th Edition, by Shon Harris (6th Edition is current)
- McGraw-Hill Osborne Media; (February 8, 2010)
- ISBN-10: 0071602178 - ISBN-13: 978-0071602174
Contributions and Discussions
- Material
- Access Control
- Telecommunications and Network Security
- Information Security Governance and Risk Management
- Software Development Security
- Cryptography
- Security Architecture and Design
- Operations Security
- Business Continuity and Disaster Recovery Planning
- Legal, Regulations, Investigations and Compliance
- Physical (Environmental) Security
- Glossary
CISSP CBK Meetings
# | Date | Topic and Host(s) |
#02 | 2013-03-05 Tue 19:00 | TBA |
#01 | 2013-02-05 Tue 19:00 | CISSP CBK: Definitions, Terms and Vocabulary |
#00 | 2013-01-22 Tue 19:00 | Revival of Security by Candlelight: CISSP CBK Zero Day Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review. Based on a Creative Commons Training by Alfred Ouyang Hosted by MiKa. Location: The Library. CISSP Portal |