Archiv:Security bei Kerzenschein/CISSP: Unterschied zwischen den Versionen

aus Metalab Wiki, dem offenen Zentrum für meta-disziplinäre Magier und technisch-kreative Enthusiasten.
Zur Navigation springenZur Suche springen
K (Pepi verschob die Seite Security bei Kerzenschein/CISSP nach Archiv:Security bei Kerzenschein/CISSP: No activity for 3 years)
 
(15 dazwischenliegende Versionen von 3 Benutzern werden nicht angezeigt)
Zeile 1: Zeile 1:
== [[Security_by_Candlelight|Security by Candlelight]] CISSP Portal==
+
{{Vorlage:SbC_CISSP|subtitle=Portal}}
 
 
{|width="100%"
 
|valign="top" width="220px"|
 
 
 
{|
 
| <small>
 
'''Can I get there by Candlelight'''?<br>
 
  How many miles to Babylon?<br>
 
  Three score and ten.<br>
 
  Can I get there by candlelight?<br>
 
  Aye, and back again.<br>
 
  If your feet are nimble and light<br>
 
  You'll get there by candlelight.</small>
 
<small><div align="right">-- Nursery Rhyme</div></small>
 
|}
 
 
 
|valign="top" style="padding-left: 0.5em;"|
 
 
 
[[Bild:433081 candle light 1.jpg|right|thumb|Security bei Kerzenschein]]
 
 
 
Starting in January 2013 Security by Candlelight focuses on the Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)®.
 
 
 
The CISSP certification is a well respected, vendor neutral certification from the International Information Systems Security Certification Consortium or [https://www.isc2.org/ (ISC)²]
 
 
 
The CISSP covers 10 Domains (or in other words fields of knowledge):
 
* Access Control
 
* Telecommunications and Network Security
 
* Information Security Governance and Risk Management
 
* Software Development Security
 
* Cryptography
 
* Security Architecture and Design
 
* Operations Security
 
* Business Continuity and Disaster Recovery Planning
 
* Legal, Regulations, Investigations and Compliance
 
* Physical (Environmental) Security
 
 
 
''' Location: ''' The "[[Location|Library]]" at the Metalab in Vienna: [[Lage|Map]]
 
 
 
'''Hosted by:''' Michael "[[Benutzer:MiKa|MiKa]]" Kafka and René "[[Benutzer:Lynx|Lynx]] Pfeiffer
 
 
 
|}
 
  
 
== What to expect ==
 
== What to expect ==
Zeile 54: Zeile 13:
 
The material is serious business and only suited for those who have a deep interest and are willing to work and learn hard. It is lengthy, highly thoretical and requires quite a bit of prerequisites to fully understand and appreciate the topics.  
 
The material is serious business and only suited for those who have a deep interest and are willing to work and learn hard. It is lengthy, highly thoretical and requires quite a bit of prerequisites to fully understand and appreciate the topics.  
  
== Duration ==
+
== Duration/Dates ==
  
The recommended duration of the source material is 5 Days. We plan to cover the topics in aprx. 20 meetings, 2 hours each (plus discussion time).
+
The recommended duration of the source material is 5 Days. We plan to cover the topics in aprx. 20 meetings, 2 hours each (plus discussion time). Target is every first and third Tuesday each month. Final decision will be made at our "Zero Day" and this text will be updated.
  
 
It is highly recommended to cover the suggested reading and links between our meetings which will be roughly two times a month.
 
It is highly recommended to cover the suggested reading and links between our meetings which will be roughly two times a month.
Zeile 72: Zeile 31:
 
'''Recommended Textbook:'''  
 
'''Recommended Textbook:'''  
  
CISSP All-in-One Exam Guide, 5th Edition, by Shon Harris
+
CISSP All-in-One Exam Guide, 5th Edition, by Shon Harris (6th Edition is current)
 
* McGraw-Hill Osborne Media; (February 8, 2010)
 
* McGraw-Hill Osborne Media; (February 8, 2010)
 
* ISBN-10: 0071602178 - ISBN-13: 978-0071602174
 
* ISBN-10: 0071602178 - ISBN-13: 978-0071602174
 +
 +
== Contributions and Discussions ==
 +
 +
* [[Security_by_Candlelight/CISSP/Material|Material]]
 +
* [[Security_by_Candlelight/CISSP/Access_Control|Access Control]]
 +
* [[Security_by_Candlelight/CISSP/Network_Security|Telecommunications and Network Security]]
 +
* [[Security_by_Candlelight/CISSP/Governance|Information Security Governance and Risk Management]]
 +
* [[Security_by_Candlelight/CISSP/Software_Development|Software Development Security]]
 +
* [[Security_by_Candlelight/CISSP/Cryptography|Cryptography]]
 +
* [[Security_by_Candlelight/CISSP/Security_Architecture|Security Architecture and Design]]
 +
* [[Security_by_Candlelight/CISSP/Operations_Security|Operations Security]]
 +
* [[Security_by_Candlelight/CISSP/Business_Continuity|Business Continuity and Disaster Recovery Planning]]
 +
* [[Security_by_Candlelight/CISSP/Legal_and_Compliance|Legal, Regulations, Investigations and Compliance]]
 +
* [[Security_by_Candlelight/CISSP/Physical_Security|Physical (Environmental) Security]]
 +
* [[Security_by_Candlelight/CISSP/Glossary|Glossary]]
  
 
== CISSP CBK Meetings ==
 
== CISSP CBK Meetings ==
Zeile 81: Zeile 55:
 
|width="25"| # ||width="280"| Date ||  Topic and Host(s)  
 
|width="25"| # ||width="280"| Date ||  Topic and Host(s)  
 
|-
 
|-
| #00 || [[Security_bei_Kerzenschein/CISSP/SBC13_CISSP_CBK_Review_00|2013-01-22 Tue 19:00]] || '''Revival of Security by Candlelight:''' <br>Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review. Based on a Creative Commons Training by Alfred Ouyang<br>
+
| #02 || [[Security_by_Candlelight/CISSP/CBK_Review_02|2013-03-05 Tue 19:00]] || TBA
Hosted by [[User:MiKa|MiKa]]. Location: The Library. [[Security_bei_Kerzenschein/CISSP|CISSP Portal]]
+
|-
 +
| #01 || [[Security_by_Candlelight/CISSP/CBK_Review_01|2013-02-05 Tue 19:00]] || '''CISSP CBK:''' Definitions, Terms and Vocabulary
 +
|-
 +
| #00 || [[Security_by_Candlelight/CISSP/SBC13_CISSP_CBK_Review_00|2013-01-22 Tue 19:00]] || '''Revival of Security by Candlelight: CISSP CBK Zero Day''' <br>Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review. Based on a Creative Commons Training by Alfred Ouyang<br>
 +
Hosted by [[User:MiKa|MiKa]]. Location: The Library. [[Security_by_Candlelight/CISSP|CISSP Portal]]
 
|-
 
|-
 
|}
 
|}

Aktuelle Version vom 19. Oktober 2016, 15:15 Uhr

CISSP Portal

Can I get there by Candlelight?
How many miles to Babylon?
Three score and ten.
Can I get there by candlelight?
Aye, and back again.
If your feet are nimble and light
You'll get there by candlelight.
-- Nursery Rhyme


Security bei Kerzenschein/CISSP
433081 candle light 1.jpg
Status: active
Thema: All things pertinent to physical and IT-Security
Gestartet: 19.03.2007
Organisator: Lynx, MiKa
Homepage: Security_bei_Kerzenschein
IRC/Matrix: #metalab at irc.freenode.net
Treffen: biweekly
Zielgruppe: People interested in improving the security of all kinds.
Inhalt: Yes, by candlelight. Really!
Zuletzt aktualisiert: 2016-10-19


Starting in January 2013 Security by Candlelight focuses on the Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)®.

The CISSP certification is a well respected, vendor neutral certification from the International Information Systems Security Certification Consortium or (ISC)²

The CISSP covers 10 domains (or in other words fields of knowledge):
  • Access Control
  • Telecommunications and Network Security
  • Information Security Governance and Risk Management
  • Software Development Security
  • Cryptography
  • Security Architecture and Design
  • Operations Security
  • Business Continuity and Disaster Recovery Planning
  • Legal, Regulations, Investigations and Compliance
  • Physical (Environmental) Security

Location: The "Library" at the Metalab in Vienna: Map

Hosted by: Michael "MiKa" Kafka and René "Lynx" Pfeiffer

Twitter: @MetaLabSbC

SbC Mailing List Subscribe here


What to expect

With the CISSP CBK Review we want to establish a study-group or a workshop to learn the details of information systems security and security management togehter in a group. The focus is not on technical details like SQL-injections, Cross-Site-Scripting or buffer overflows etc... instead we focus on high-level topics which are theoretical, abstract and annoyingly formal.

This will not be a classical training with an instructor who teaches you everything necessary. You will need to devote a lot of time for self-study, reading and learning inbetween the meetings.

Who should come?

We recommend these events to security specialists and those who want to become one.

The material is serious business and only suited for those who have a deep interest and are willing to work and learn hard. It is lengthy, highly thoretical and requires quite a bit of prerequisites to fully understand and appreciate the topics.

Duration/Dates

The recommended duration of the source material is 5 Days. We plan to cover the topics in aprx. 20 meetings, 2 hours each (plus discussion time). Target is every first and third Tuesday each month. Final decision will be made at our "Zero Day" and this text will be updated.

It is highly recommended to cover the suggested reading and links between our meetings which will be roughly two times a month.

Material

The series of meetings is based on the Creative Commons Licensed Training by Alfred Ouyang.

Creative Commons Material can be accessed here:

http://opensecuritytraining.info/CISSP-Main.html

I recommend to start with References/CISSP_Glossary_v1.1.docx

Recommended Textbook:

CISSP All-in-One Exam Guide, 5th Edition, by Shon Harris (6th Edition is current)

  • McGraw-Hill Osborne Media; (February 8, 2010)
  • ISBN-10: 0071602178 - ISBN-13: 978-0071602174

Contributions and Discussions

CISSP CBK Meetings

# Date Topic and Host(s)
#02 2013-03-05 Tue 19:00 TBA
#01 2013-02-05 Tue 19:00 CISSP CBK: Definitions, Terms and Vocabulary
#00 2013-01-22 Tue 19:00 Revival of Security by Candlelight: CISSP CBK Zero Day
Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review. Based on a Creative Commons Training by Alfred Ouyang

Hosted by MiKa. Location: The Library. CISSP Portal