Progent can provide the services of security professionals who have earned CISSP accreditation. CISSP certification recognizes expertise with a worldwide standard for data security. American National Standards Institute has granted the CISSP certification official accreditation in the area of data security under ISO/IEC 17024:2003. This is the first time that an IT certification has been given ANSI recognition. CISSP is formally approved by the United States DoD in their IAT and Managerial (IAM) categories. CISSP has also been adopted as a baseline for the United States National Security Agency's Information Systems Security Engineering Professional (ISSEP) initiative to safeguard the NII.

Progent can give you access to a CISSP-certified professional to help your business in a variety security fields including:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
  • Law, Investigation and Ethics
  • Security Administration Procedures
    Security administration entails the identification of an organization's most important information and the creation, recording, and implementation of policies, operations, standards. Administration tools that include information classification and threat assessment can be utilized to determine potential attacks, classify valuable data, and evaluate system vulnerabilities so that effective measures can be implemented.

  • Security Infrastructure and Models
    This concerns the concepts, structures, and guidelines used to design, track, and secure operating systems, equipment, networks, and applications plus the controls utilized to enforce different degrees of availability, consistency, and confidentiality.

  • Access Control Solutions and Methodology
    Access management systems are a collection of technologies that work cohesively to create a security architecture to protect the high-value data of the information system.

  • Applications Development Security
    This addresses the key security concepts that apply to application development. Applications development security defines the circumstances where software is designed and developed and elucidates the critical role application software plays in providing information network protection.

  • Operations Security
    Operations security involves identifying the controls over hardware, data storage, and the technicians and managers with access privileges to these assets. Audit and monitoring are the mechanisms and facilities that enable the identification of security-relevant activity and consequent efforts to discover the essential factors and report the pertinent data to the appropriate individual, team, or mechanism.

  • Site Security
    Site security addresses protection techniques for the entire facility, from the outside perimeter to the inside office space, including all of the information system resources.

  • Cryptography
    Cryptography involves the concepts, means, and methods of cloaking data to ensure its consistency, confidentiality, and legitimacy.

  • Telecommunications, Network and Internet Security
    This area concerns:
    • Network Structures
    • Transmission methods
    • Transport protocols
    • Security techniques used to ensure availability, consistency, and confidentiality
    • Authentication for traffic over private and public networks and media.
  • Disaster Recovery Planning
    The Business Continuity Plan covers the protection and recovery of commercial operations after outages.

  • Law, Investigation and Ethics
    This involves:
    • Information system crime regulations
    • The measures followed and mechanisms utilized to investigate computer crime activity

Other Credentials Help by Progent's Security Specialists
In addition to offering the services of security specialists with CISSP certifications, Progent can also provide your business with access to CISM-certified security consultants, ISSAP-certified network architecture security consultants, CISA-certified IS security auditing specialists, and GIAC-certified system security engineers.

If you're looking for security expertise, call Progent at 800-993-9400 or visit Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.

More topics of interest: