Overview:
This Logical Security course trains students in all areas of the security Common Body of Knowledge (CBK). They will learn about security policy development, secure software development procedures, network vulnerabilities, attack types and corresponding countermeasures, cryptography concepts and their uses, disaster recovery plans and procedures, risk analysis, crucial laws and regulations, forensics basics, computer crime investigation procedures, physical security, and much, much more. They will explore the contents and concepts that make up the diverse domains and learn how they work together to provide true “in-depth” defense.The CISSP exam is rigorous, covering ten security domains essential for the protection of information systems, corporations and national infrastructures. Understanding that security is an enterprise wide problem, these domains provide the candidate with a broad understanding of the technical, managerial and human factors that must coordinate effectively to keep information and systems secure. These domains include:
Using this course, students prepare for the exam, while at the same time obtaining essential security knowledge that can be immediately used to improve organizational security. This knowledge enhances services and products, secures business functions and infrastructures, provides better implementation processes, and can be used to restructure critical programs and procedures to help keep companies up-to-date on today’s business and security strategies, technologies, and best practices.
This course has been designed to provide all the materials needed for 4 full days of instructor led classroom training.
Shon Harris, CISSP, MCSE, is the president of Logical Security, a security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor and an author. She has authored two best selling CISSP books, was a contributing author to the book, Hacker’s Challenge, and a contributing author to the book Gray Hat Hacking. Shon has taught computer and information security to a wide range of clients, some of which have included RSA, Department of Defense, Department of Energy, National Security Agency (NSA), Bank of America, Defense Information Systems Agency (DISA), BMC, and many more.
Shon consults for several Fortune 500 companies in the U.S. Her competencies range from setting up risk management programs and developing enterprise security architectures to constructing enterprise-wide security programs that connects security and business needs in a synergist manner.
Additionally, Shon writes security articles for Information Security Magazine and Windows 2000 Magazine and other leading industry journals. She recently published the fourth edition of her first book and brought to market an innovative consulting and training model in 2008.
Shon was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.
Michael J Lester holds a Master’s Degree in Information Systems Security from Boston University (a National Security Agency [NSA] “Center of Excellence”) as well as around 20 industry certifications including CISSP, CISA, CCE #876, Security+, MCSE:Security, CCSE+, and ITIL. He was an author for “Gray Hat Hacking: The Ethical Hacker’s Handbook 1st Edition”, McGraw Hill Publishing (ISBN # 0072257091), a book on advanced penetration testing techniques, and many other articles and presentations.
He has written courseware and lectured on Microsoft security, penetration testing, Linux/UNIX security, and infrastructure security. He is the chief instructor for Shon Harris’s Logical Security LLC. (author “CISSP All in One Guide”, McGraw Hill Publishing), and he teaches and develops courses on CISSP, hacking/pen-testing, digital forensics/eDiscovery, CISA, and others. Microsoft employed Michael as a Subject Matter Expert (SME) to create and tech edit the exams for Windows Server 2008 (Longhorn) Microsoft Certified IT Professional (MCITP) certifications.
In his consulting work he has worked for household name organizations including, Bridgestone/Firestone, Warner Bros., Department of Defense, Northrop Grumman, Novo Nordisk, and the U.S. House of Representatives. For these clients he has stood up entire security programs, regulatory compliance programs (OCC, SOX, HIPAA, GLBA), Payment Card Industry Data Security Standards (PCI DSS) compliance programs, and performed similar audits. He has performed vulnerability assessments and penetration tests, and is sought after for his document writing work (policies, standards, procedures, and guidelines). He also has experience implementing the ITIL, CoBIT, and ISO 17799 frameworks.
Super Early:
Ends Mar 15 |
Early:
Ends May 1 |
Regular: |
Late: |
Onsite: |
$4500 |
$4600 |
$4800 |
$5000 |
$5300 |
Black Hat USA 2009
July 25-30
Caesars Palace
Las Vegas, NV
Training July 25-28
Briefings July 29-30
Black Hat USA Briefings Main page is online now.
Find out about our 2009 venue, Caesars Palace.
Black Hat Webcasts
On the third Thursday of every month, Black Hat does a free infosec webcast. Meet security thought leaders and get your questions answered.
Can't make it to our live webcast events? Subscribe to the Black Hat Webcast RSS feed and take the webcasts with you in podcast form.
Upcoming Topics
Black Hat Social
LinkedIn
LinkedIn members can join our Black Hat Group and post news articles of interest to the community, make connections and discuss security topics.
Facebook
We have a Facebook fan page now. Please check us out there - share your ideas, your photos, and your videos with us.
Flickr
Check out our Black Hat photostream. Comment. Contribute. Got great pix? Share with the community.
Twitter
Find out what's going on with Black Hat in real time by following us on Twitter. Meet other Black Hat speakers and attendees, share what matters to you.
Delicious
When something in the news catches our eye at Black Hat HQ, we post the link on Delicious.