|
|
Zeile 1: |
Zeile 1: |
| == [[Security_by_Candlelight/CISSP|Security by Candlelight/CISSP]] Contributions and Discussions for '''Network Security'''==
| | {{Vorlage:SbC}} |
| | |
| {|width="100%" | |
| |valign="top" width="220px"|
| |
| | |
| {| | |
| | <small>
| |
| '''Can I get there by Candlelight'''?<br>
| |
| How many miles to Babylon?<br>
| |
| Three score and ten.<br>
| |
| Can I get there by candlelight?<br>
| |
| Aye, and back again.<br>
| |
| If your feet are nimble and light<br>
| |
| You'll get there by candlelight.</small>
| |
| <small><div align="right">-- Nursery Rhyme</div></small>
| |
| |}
| |
| | |
| |valign="top" style="padding-left: 0.5em;"|
| |
| | |
| [[Bild:433081 candle light 1.jpg|right|thumb|Security bei Kerzenschein]]
| |
| | |
| Starting in January 2013 Security by Candlelight focuses on the Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)®.
| |
| | |
| The CISSP certification is a well respected, vendor neutral certification from the International Information Systems Security Certification Consortium or [https://www.isc2.org/ (ISC)²]
| |
| | |
| The CISSP covers 10 Domains (or in other words fields of knowledge):
| |
| * Access Control
| |
| * '''Telecommunications and Network Security'''
| |
| * Information Security Governance and Risk Management
| |
| * Software Development Security
| |
| * Cryptography
| |
| * Security Architecture and Design
| |
| * Operations Security
| |
| * Business Continuity and Disaster Recovery Planning
| |
| * Legal, Regulations, Investigations and Compliance
| |
| * Physical (Environmental) Security
| |
| | |
| '''Location:''' The "[[Location|Library]]" at the Metalab in Vienna: [[Lage|Map]]
| |
| | |
| '''Hosted by:''' Michael "[[Benutzer:MiKa|MiKa]]" Kafka and René "[[Benutzer:Lynx|Lynx]] Pfeiffer
| |
| | |
| |}
| |
|
| |
|
| == Contributions and Discussions for the Domain '''Telecommunications and Network Security''' == | | == Contributions and Discussions for the Domain '''Telecommunications and Network Security''' == |
Security by Candlelight
Can I get there by Candlelight?
How many miles to Babylon?
Three score and ten.
Can I get there by candlelight?
Aye, and back again.
If your feet are nimble and light
You'll get there by candlelight.
-- Nursery Rhyme
|
|
Security sometimes seems like a hard and long journey
But properly equipped it will be just like snapping with your fingers. I'm afraid we will not have a "Babylon Candle" to get us there but at least it will be much more fun to travel in a group and talk about the things and wonders we see along the road.
A Meeting Place for Security Enthusiasts at the Metalab in Vienna
- Open for everyone, no special skills required. Just be curious, playful and interested.
- Bring your own Ideas, not your own beer - we have plenty of beer/Club Mate in the fridge. We want your input and active participation (not to say your soul) - don't be shy :)
- Security by Candlelight is not a workshop or a lecture type of event (although it appears to be sometimes) but a discussion and exchange about different aspects of security.
- We want to cover hacking and defending systems, we want to talk about physical, network and application security. We want to discuss about social hacking and security awareness, we want to do things and try some cool hacks on our own.
- Our goal is to meet two times a month at the Metalab Library in a relaxed setting with changing hosts and topics, with presentations, workshops or discussion rounds.
Location: The "library" at the Metalab in Vienna: Map
Twitter: @MetaLabSbC
SbC Mailing List Subscribe here
|
Contributions and Discussions for the Domain Telecommunications and Network Security
Please add your contributions like recommended reads, links or very short texts (max two or three lines) here. Longer texts shold be uploaded as PDF or any other neutral format and linked here with a short description. Please, always add a signature (--~~~~)! --MiKa 19:25, 28. Dez. 2012 (CET)