Progent offers the services of security experts who have earned CISSP certification. CISSP certification recognizes mastery of an international standard for information security. ANSI has awarded the CISSP credential formal accreditation in the field of data security under ISO/IEC 17024:2003. This is the first example where an IT credential has earned ANSI approval. CISSP is formally approved by the U.S. Department of Defense (DoD) in their Information Assurance Technical (IAT) and Managerial disciplines. CISSP has in addition been adopted as a standard for the U.S. NSA's Information Systems Security Engineering Professional (ISSEP) area of concentration to secure the NII.

Progent can provide a CISSP-certified expert to help your organization in a variety security fields including:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography
  • Telecom, LAN and Internet Security
  • Business Continuity Preparedness
  • Law, Investigation and Ethics
  • Security Administration Practices
    Security management involves the determination of an organization's information assets and the creation, recording, and carrying out of policies, procedures, and guidelines. Administration tools such as data classification and risk assessment can be used to determine potential threats, classify assets, and evaluate system weaknesses so that effective measures can be implemented.

  • Security Infrastructure and Paradigms
    This concerns the principles, structures, and standards used to build, monitor, and secure operating systems, hardware, infrastructure, and application software as well as the controls utilized to police different degrees of availability, integrity, and privacy.

  • Access Control Solutions and Processes
    Access management systems are a collection of technologies that operate in unison to create a security infrastructure to guard the high-value data of the information system.

  • Applications Development Security
    This involves the important security concepts that apply to application software development. Applications development security defines the environment where software is designed and produced and explains the vital part application software has in ensuring information network protection.

  • Operations Security
    Operations security has to do with identifying the management of hardware, data storage, and the technicians and administrators with access rights to these resources. Audit and monitoring are the mechanisms and techniques that allow the identification of security-relevant events and follow-on actions to discover the essential elements and report the associated information to the appropriate individual, team, or process.

  • Site Security
    Physical security addresses protection techniques for the entire facility, from the perimeter to the desk, including all of the IT system resources.

  • Cryptography
    Data Encryption involves the concepts, techniques, and methods of disguising information to preserve its consistency, privacy, and legitimacy.

  • Telecommunications, Network and Internet Security
    This area concerns:
    • Network Infrastructure
    • Transmission methods
    • Transport protocols
    • Security techniques used to ensure availability, consistency, and privacy
    • Authentication for traffic over private and public networks and media.
  • Business Continuity Preparedness
    This covers the protection and recovery of business activity after network disruptions.

  • Crime Law, Investigation and Ethics
    This concerns:
    • Computer crime regulations
    • The measures followed and mechanisms used to investigate information system crime incidents

Other Credentials Help by Progent's Security Specialists
In addition to offering the services of security specialists with CISSP certifications, Progent can also provide your business with access to CISM-certified security consultants, ISSAP-certified network architecture security consultants, CISA-certified IS security auditing specialists, and GIAC-certified system security engineers.

If you're trying to find security consulting, phone Progent at 800-993-9400 or go to Contact Progent.














© 2002- 2017 Progent Corporation. All rights reserved.

More topics of interest: