Progent offers the services of security professionals who have earned CISSP certification. CISSP certification denotes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has granted the CISSP certification official recognition in the field of information security under ISO/IEC 17024:2003. This is the first example where an IT certification has been given ANSI approval. CISSP is also formally approved by the United States Department of Defense (DoD) in their IAT and Managerial categories. The CISSP has also been accepted as a baseline for the U.S. NSA's Information Systems Security Engineering Professional (ISSEP) initiative to secure the NII.

Progent can give you access to a CISSP-certified professional to help your enterprise in a broad range of security areas such as:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Control Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption
  • Telecom, Network and Internet Security
  • Business Continuity Preparedness
  • Crime Law, Investigation and Ethics
  • Security Management Practices
    Security administration involves the determination of a company's most important information and the development, documentation, and carrying out of policies, operations, standards. Management techniques that include data categorization and risk analysis can be utilized to identify possible attacks, categorize valuable data, and evaluate system vulnerabilities so that effective controls can be implemented.

  • Security Infrastructure and Paradigms
    This covers the principles, structures, and standards followed to build, monitor, and protect OS platforms, hardware, networks, and applications plus the tools used to enforce various degrees of robustness, integrity, and confidentiality.

  • Access Management Solutions and Methodology
    Access controls are a set of technologies that work together to create a security infrastructure to protect the assets of the IT system.

  • Software Development Security
    This involves the key security principles related to application development. Applications development security defines the circumstances where programs are designed and produced and elucidates the critical part application software has in providing information network protection.

  • Secure Operations
    Operations security involves identifying the management of equipment, media, and the technicians and managers with access rights to these resources. Audit and tracking are the mechanisms and facilities that allow the identification of security-related activity and consequent actions to identify the essential elements and convey the pertinent data to the designated individual, group, or mechanism.

  • Site Security
    Physical security provides security techniques for the whole physical facility, from the perimeter to the inside office space, including all of the information network resources.

  • Data Encryption
    Data Encryption entails the concepts, means, and methods of disguising data to ensure its integrity, privacy, and legitimacy.

  • Telecommunications, LAN and WAN Security
    This area involves:
    • Network Infrastructure
    • Transmission mechanisms
    • Transport protocols
    • Security techniques used to provide availability, consistency, and confidentiality
    • Verification for transmissions over private and public communications networks and media.
  • Disaster Recovery Planning
    The Business Continuity Plan (BCP) covers the preservation and restoration of commercial activity after outages.

  • Law, Investigation and Ethics
    This has to do with:
    • Information system crime laws
    • The procedures taken and technologies used to investigate computer crime activity

Other Credentials Help by Progent's Security Specialists
In addition to offering the services of security specialists with CISSP certifications, Progent can also provide your business with access to CISM-certified security consultants, ISSAP-certified network architecture security consultants, CISA-certified IS security auditing specialists, and GIAC-certified system security engineers.

For more information about Progent's network security consulting expertise, call Progent at 800-993-9400 or refer to Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.

More topics of interest: