CISSP 2013 Domain: Security Architecture and Design New Horizons Jordan
Price: TBA
  • Duration: 3 Hours

Course details

Computer administrators have a variety of mechanisms that can be used to secure modern enterprise environments. Several access control standards and models have been created by the international community to secure both personnel access and information recovery within an enterprise environment. This course examines hardware and software systems, memory storage types, security models, and security controls. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

  • recognize the components of a basic information system architecture
  • identify the considerations involved in implementing security architecture
  • recognize key CPU operational factors involved in secure addressing
  • match system operating states to their descriptions
  • differentiate between machine types
  • identify the purpose of the resource manager
  • classify memory types as either RAM or ROM
  • match storage types to their descriptions
  • plan a secure computer network
  • determine the network resources required for a given scenario
  • match the phases of the evaluation process to their descriptions
  • recognize the essential features of operating system protection
  • match the access control mechanism to it's description
  • recognize the methods used to evaluate security in a networking environment
  • identify the key features of security models
  • match key peer-to-peer security issues with their descriptions
  • describe the main security issues associated with grid computing
  • describe the key challenges related to securing data in the cloud
  • identify the questions a potential user of cloud data storage needs to ask when conducting a risk assessment
  • propose an operating system security solution for a given scenario
  • evaluate security in a networking environment
  • determine the appropriate security model for a given scenario
  • describe the security challenges presented by distributed systems
Updated on 19 February, 2018

About New Horizons Jordan

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. For 30 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer ctheirses and certifications. they’re now the world’s largest independent IT training company, and they continue to lead:
  • 300 computer training centers in 70 countries (and counting)
  • Largest Guaranteed-to-Run ctheirse schedule in the world
  • Ranked in the top 5% of the industry for training quality and customer satisfaction
  • Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
  • Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
  • World’s largest Cisco-authorized training partner
See all New Horizons Jordan courses
Are you from New Horizons Jordan ? Claim your course!
Courses you can instantly connect with... Do an online course on CISSP starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or