Progent can provide access to security consultants who have earned CISSP certification. CISSP certification denotes expertise with a worldwide standard for information security. American National Standards Institute has granted the CISSP credential official recognition in the area of information security under ISO/IEC 17024:2003. This represents the first time that an IT certification has earned ANSI approval. CISSP is also formally accepted by the United States DoD in both their Information Assurance Technical and IAM categories. The CISSP has also been approved as a baseline for the United States National Security Agency's Information Systems Security Engineering Professional program to protect the NII.

Progent can provide a CISSP-certified expert to help your enterprise in a broad range of security areas including:

  • Security Management Practices
  • Security Architecture and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption
  • Telecom, LAN and WAN Security
  • Disaster Recovery Preparedness
  • Law, Investigation and Ethics
  • Security Administration Practices
    Security administration involves the determination of an organization's high-value data and the development, documentation, and execution of policies, operations, standards. Administration tools such as data classification and threat assessment can be used to determine possible attacks, classify valuable data, and rate system weaknesses so that effective controls can be implemented.

  • Security Architecture and Paradigms
    This involves the concepts, structures, and guidelines used to design, track, and secure operating systems, hardware, infrastructure, and application software as well as the tools utilized to enforce different levels of availability, integrity, and confidentiality.

  • Access Management Solutions and Methodology
    Access controls are a collection of mechanisms that work cohesively to create a security architecture to guard the high-value data of the information network.

  • Applications Development Security
    This involves the important security principles related to application software development. Software development security outlines the circumstances where programs are planned and developed and explains the vital role application software has in ensuring IT network protection.

  • Operations Security
    Operations security has to do with determining the controls over hardware, media, and the technicians and managers with access privileges to any of these assets. Audit and tracking are the mechanisms and techniques that allow the identification of security-related events and subsequent efforts to identify the key factors and convey the associated data to the designated individual, group, or process.

  • Physical Security
    Site security provides security techniques for the whole physical facility, from the perimeter to the inside office space, including all of the IT system assets.

  • Cryptography
    Cryptography entails the concepts, techniques, and methods of disguising data to ensure its integrity, privacy, and legitimacy.

  • Telecommunications, Network and WAN Security
    This area involves:
    • Network Infrastructure
    • Transmission mechanisms
    • Transport formats
    • Security measures used to provide reliability, consistency, and confidentiality
    • Validation for transmissions over private and public communications networks and media.
  • Disaster Recovery Preparedness
    The Business Continuity Plan covers the protection and restoration of commercial operations after outages.

  • Law, Investigation and Ethics
    This involves:
    • Computer crime regulations
    • The procedures followed and mechanisms used to solve computer crime incidents

Other Credentials Help by Progent's Security Specialists
In addition to offering the services of security specialists with CISSP certifications, Progent can also provide your business with access to CISM-certified security consultants, ISSAP-certified network architecture security consultants, CISA-certified IS security auditing specialists, and GIAC-certified system security engineers.

If you're looking for computer security consulting, telephone Progent at 800-993-9400 or visit Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.

More topics of interest: