Minnesota and California
877 568-4324
security@ecinetworks.com

ECI – EMSP Information Technology Security Professional

Infrastructure and Innovation

ECI – EMSP Information Technology Security Professional

Course description

Our ITSP course provides the information and training as a security specialist and professional. The materials and information is equivalent to the standard CISSP but with added modules to focus on the newer industry requirements and skill sets.

Our management course is designed to prepare the student to the professional world of IT security. Get instruction from our experts with real-world experience as you cover all the material you need. Our study guide contains relevant, up-to-date information and includes summary charts, insightful data, and practice exams. Along with your custom course material, you will receive access to our VRLabCloud for study and testing of real world scenarios.

What You’ll Learn in Class

In-depth coverage of the ten domains required to pass our exam:

  1. Operations Security
  2. Access Control
  3. Cryptography
  4. Security Architecture and Design
  5. Telecommunications and Network Security
  6. Disaster Recovery and Business Continuity Planning
  7. Legal, Regulations, Compliance, and investigations
  8. Application Security
  9. Information Security and Risk Management
  10. Physical (Environmental) Security

Who Needs to Attend

IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers, and other security professionals whose positions require computer security training.

Prerequisites

Systems administration experience, familiarization with TCP/IP, and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts and standards.

Training

This course package will train the student in the current and historical methodologies for precise and accurate computer security rules and procedures.

Course Content

  1. Introduction
    • Course Overview
    • Requirements
    • Lab Review
  1. Operations Security
    • Operation Security Principles, Techniques, and Mechanisms
    • Principles and Practices of Good Security
    • Resource Protection mechanisms and Techniques
    • Attacks and Prevention methods
  1. Access control
    • Authentication
    • Authorization
    • Accountability
    • Threats to Access Control
  1. Cryptography
    • History of Cryptography
    • Symmetric Encryption
    • Asymmetric Encryption
    • Hashing and Digital Signatures
    • Public Key Infrastructure
    • Cryptographic Attacks
  1. Security Architecture and Design
    • Computer Architecture
    • Rings of Protection
    • Security Models
    • System Evaluation
  1. Telecommunications and Network Security
    • The OSI Model
    • The TCP-IP Model
    • WAN Protocols
    • Routing
    • Wireless Systems
    • Fault Tolerance
  1. Disaster Recovery and Business Continuity Planning
    • Disaster recovery Planning
    • Business Impact Analysis
    • Business Continuity Planning
    • Backup and Off-Site Facilities
    • Testing Contingency Plans
  1. Legal, Regulations, Compliance, Investigations
    • Laws and Ethics
    • Computer Crime
    • Incident Response and Forensics
  1. Application Security
    • Database Security
    • System Development
    • Software Development Methods
    • Threats and Vulnerabilities
  1. Information Security and Risk Management
    • Security Management
    • Risk Analysis
    • Classification Controls
  1. Physical (Environmental) Security
    • Threats to Physical Security
    • Administrative Controls
    • Environmental and Safety Controls
    • Physical and Technical Controls
  1. Test Review and Preparation
    • Test Review
    • Test Registration
    • Test Preparation
    • Certification Maintenance