Progent offers access to security experts who have qualified for CISSP certification. CISSP certification recognizes mastery of a global standard for data security. American National Standards Institute has granted the CISSP credential formal recognition in the area of information security under ISO/IEC 17024:2003. This represents the first example where an information technology accreditation has been given ANSI approval. CISSP is formally approved by the United States Department of Defense (DoD) in both their Information Assurance Technical and Managerial (IAM) disciplines. CISSP has in addition been approved as a standard for the United States NSA's Information Systems Security Engineering Professional initiative to protect the NII.

Progent can give you access to a CISSP-certified expert to help your business in a variety security fields including:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
  • Crime Law, Investigation and Ethics
  • Security Management Practices
    Security administration involves the determination of a company's most important information and the development, recording, and execution of policies, operations, standards. Administration techniques such as information categorization and risk assessment can be used to identify potential attacks, classify assets, and evaluate system weaknesses so that appropriate controls can be implemented.

  • Security Architecture and Models
    This involves the principles, framework, and standards followed to build, track, and protect OS platforms, equipment, networks, and applications as well as the tools used to enforce various levels of availability, consistency, and privacy.

  • Access Control Systems and Processes
    Access controls are a set of mechanisms that operate cohesively to create a security architecture to protect the assets of the IT network.

  • Software Development Security
    This addresses the important security concepts associated with application software development. Software development security defines the environment where programs are planned and developed and elucidates the vital part application software has in providing information system security.

  • Operations Security
    Operations security involves identifying the controls over hardware, data storage, and the technicians and administrators with access rights to these assets. Audit and tracking are the mechanisms and facilities that enable the identification of security-relevant events and consequent efforts to discover the key elements and report the pertinent information to the appropriate individual, team, or mechanism.

  • Physical Security
    Site security addresses protection techniques for the whole physical facility, from the perimeter to the inside office space, including all of the IT network assets.

  • Data Encryption
    Data Encryption involves the principles, means, and processes of disguising data to preserve its integrity, confidentiality, and legitimacy.

  • Telecom, LAN and WAN Security
    This area involves:
    • Network Structures
    • Transmission mechanisms
    • Transport protocols
    • Security techniques used to provide reliability, consistency, and confidentiality
    • Authentication for traffic over private and public networks and media.
  • Business Continuity Planning
    The Business Continuity Plan (BCP) addresses the preservation and restoration of commercial operations after network disruptions.

  • Law, Investigation and Ethics
    This has to do with:
    • Information system crime laws
    • The procedures followed and mechanisms utilized to solve computer crime activity

Other Credentials Help by Progent's Security Specialists
In addition to offering the services of security specialists with CISSP certifications, Progent can also provide your business with access to CISM-certified security consultants, ISSAP-certified network architecture security consultants, CISA-certified IS security auditing specialists, and GIAC-certified system security engineers.

To learn more about Progent's security support services, call Progent at 800-993-9400 or see Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.

More topics of interest: