Progent offers access to security professionals who have earned CISSP certification. CISSP certification denotes expertise with an international standard for data security. ANSI (American National Standards Institute) has awarded the CISSP certification formal accreditation in the area of information security under ISO/IEC 17024:2003. This represents the first example where an information technology accreditation has earned ANSI recognition. CISSP is also approved by the United States DoD in their Information Assurance Technical (IAT) and Managerial (IAM) categories. The CISSP has in addition been approved as a standard for the U.S. National Security Agency's Information Systems Security Engineering Professional program to secure the NII.

Progent can give you access to a CISSP-certified professional to help your enterprise in a broad range of security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Cryptography
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Preparedness
  • Crime Law, Investigation and Ethics
  • Security Administration Practices
    Security administration involves the identification of a company's high-value data and the creation, documentation, and execution of policies, procedures, standards. Management tools that include information categorization and risk assessment can be used to identify possible threats, classify valuable data, and evaluate system vulnerabilities so that appropriate controls can be implemented.

  • Security Architecture and Paradigms
    This concerns the concepts, framework, and guidelines used to build, monitor, and secure OS platforms, hardware, networks, and application software plus the tools utilized to enforce different degrees of robustness, consistency, and privacy.

  • Access Control Solutions and Methodology
    Access management systems are a collection of technologies that work cohesively to create a security infrastructure to protect the assets of the IT system.

  • Applications Development Security
    This addresses the important security principles associated with application development. Software development security defines the circumstances where programs are planned and developed and explains the critical role application software has in ensuring information system protection.

  • Secure Operations
    Operations security involves identifying the controls over equipment, data storage, and the operators and managers with access privileges to any of these resources. Audit and tracking are the mechanisms and techniques that permit the awareness of security-relevant events and subsequent efforts to identify the key factors and report the pertinent information to the appropriate individual, group, or mechanism.

  • Site Security
    Physical security provides security mechanisms for the whole physical facility, from the outside perimeter to the desk, including all of the information network assets.

  • Cryptography
    Data Encryption entails the concepts, techniques, and processes of cloaking information to preserve its consistency, privacy, and authenticity.

  • Telecom, Network and Internet Security
    This area concerns:
    • Network Structures
    • Transmission mechanisms
    • Transport protocols
    • Security techniques implemented to ensure availability, consistency, and confidentiality
    • Verification for traffic over private and public networks and media.
  • Disaster Recovery Planning
    This covers the protection and restoration of business operations after network disruptions.

  • Law, Investigation and Ethics
    This involves:
    • Computer crime regulations
    • The procedures followed and technologies used to investigate computer crime incidents

Other Credentials Help by Progent's Security Specialists
In addition to offering the services of security specialists with CISSP certifications, Progent can also provide your business with access to CISM-certified security consultants, ISSAP-certified network architecture security consultants, CISA-certified IS security auditing specialists, and GIAC-certified system security engineers.

If you're looking for network security consulting expertise, telephone Progent at 800-993-9400 or refer to Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.

More topics of interest: