Specifications | Sandy Silva |
Business section |

Specifications | Sandy Silva |
Business section |
Specifications | Sandy Silva |
Outline | COURSE DESCRIPTION INDEX rsa training centers RSA Certified Security Professional CERTIFICATION Executive Overview Concepts and Principles |
Suggested Link Details/Purchase | |
Content | 80 © Copyright 2012 EMC Corporation. All rights reserved. 04/2012 EMC2, EMC, RSA, RSA Security, Archer, NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries Course Outline Module 1: Application Security: An Introduction Module 2: Systems Access Control • Control of access to computer services and data on the basis of business requirements • Access control policy Module 3: Operating Systems Access Control • Automatic terminal identification • Terminal logon procedures • User IDs • Password management • Event alarming and escalation • Terminal time out • Limited connection time • Biometrics • RSA SecurID® Tokens • Single use password devices • Multi-factor authorization • Single sign-on/reduced sign-on Module 4: Network Access Control • Control of connections to network services to ensure that connected users or computer services do not compromise the security of any other networked services • Limited services • Enforced path • Control restrictions by IP address • User authentication • Node authentication • Remote diagnostic port protection • Network segregation • Network connection control • Network routing control • Security in network services • User certificates • VPN Module 5: Application Access Control • Logical access controls to protect application systems and data from unauthorized access • Information access restriction • Separation of duties • Monitoring — user privilege violations • Unique IDs for tasks • Information access restriction • Sensitive system isolation • Access control to program source libraries Module 6: User Access Management • Formal procedures to control allocation of access rights to IT systems and services • Authorization/Approvers (data owners, Information Stewards/Custodians) • User registration • Privilege management • User password management • Review of user access rights • Procedures to remove inactive IDs and IDs that are no longer needed • Maker/checker process • RBAC Module 7: Monitoring Systems Access and Use • Monitoring systems to ensure conformity with access policy and standards • Monitoring systems to detect unauthorized activities • Monitoring systems to determine the effectiveness of adopted security measures • Event logging • Clock synchronization • Centralized log storage and protection • Log file entries standards Module 8: Operational Procedures and Responsibilities • Established responsibilities and procedures for the management and operation of all computers and networks • Documented operating procedures • Operational change control procedures and requirements • Incident management procedures • Segregation of duties • Separation of development and operational facilities • External facilities management Module 9: Audit Controls and Tools • Controls to safeguard operational systems and audit tools during system audits • Minimization of interference to and from the system audit process • Protection of the integrity and preventing the misuse of audit tools • Other protection requirements for system audit tools • Secure storage of audit reports • Access to audit reports • Audit occurrence policies, for example, those that must occur annually, triggers for audits, and so forth TECHNICAL SPECIFICATIONS: All courses are SCORM 1.2-compliant. Courses can be integrated into a client’s Learning Management System or delivered as an on-demand service. MINIMUM REQUIREMENTS: Computer: • Screen Resolution: 1280x720 • Standard Operating System: – Mac OSX 10.x or above – Windows XP or above Web Browser: • Microsoft internet Explorer 6.0 SP3 or above • Mozilla Firefox 3.0 or above • Mac: Safari 4.0 or above Flash Player: • Adobe Flash Player v10.0 or above (preferred) [Courses will work with v8 and 9 but not v7.] Audio: • Highly recommended [If sound is unavailable, user can follow on-screen transcript.] |
Navigation | Previous Page / Next Page |
Suggested Link Details/Purchase | |
Following Datasheets | h7070-vplex-family-ds_1 (4 pages) h7138-workload-resiliency-vplex-wp_1 (19 pages) h7148-optimized-infrastructure-smart-metering-wp (26 pages) h7298-it-journey-private-cloud-wp_1 (24 pages) h7330-virtual-sap-symmetrix-vmware-wp (29 pages) h7423-university-arizona-cp_1 (2 pages) h7424-optimizing-oracle-dba-ep (9 pages) h7470-concord-hospital-cs (2 pages) h8021-it-journey-virtual-desktop-wp_1 (18 pages) h8123-oracle-rac-symmetrix-fast-vp-vsphere-wp_1 (57 pages) |
Check in e-portals![]() |
World-H-News Products Extensions Partners Automation Jet Parts |
Sitemap Folder | group1 group2 group3 group4 group5 group6 group7 group8 group9 group10 group11 group12 group13 group14 group15 group16 group17 group18 group19 group20 group21 group22 group23 group24 group25 group26 group27 group28 group29 group30 group31 group32 group33 group34 group35 group36 group37 group38 group39 group40 group41 group42 group43 group44 group45 group46 group47 group48 group49 group50 group51 group52 group53 group54 group55 group56 group57 group58 group59 group60 group61 group62 group63 group64 group65 group66 group67 group68 group69 group70 group71 group72 group73 group74 group75 group76 group77 group78 group79 group80 group81 group82 group83 group84 group85 group86 group87 group88 group89 group90 group91 group92 group93 group94 group95 group96 group97 group98 group99 group100 Prewious Folder Next Folder |