About Us






Information Request



Seminars and Teleseminars





Continuity solutions
that work!

Ms. Michael C. Redmond







Cyber Security


Educational CD Series:


In cooperation with Industry best-practices and a wealth of corporate experience, Redmond Worldwide has released this CD library.


6 CDs Plus Workbook

6 Continuing Ed Points from DRII











Cyber Security Planning Training CD's

Brought to you by
DR. Michael C. Redmond, PhD
Redmond Worldwide


Session One

  • About Cyber Terrorist Learning About The Enemy

  • Tools of Their Trade

  • Equipment Used to Attack

  • Personnel and Training


Session Two

  • Access Control and Identification

  • Security Management Controls

    Physical security

    Computer security

  • Identification and authentication (I&A)

  • Authorization

  • Accountability

  • Access Control Techniques

  • Discretionary Access Control

  • Mandatory Access Control

  • Telecommunication

  • Policy

  • Application security

  • Common exploits

  • Security testing for applications

Session Three

  • Incident Reporting And Response Planning And Recovery Plans

  • Information Security and Risk Management

  • Basic principles of Information Security

    Confidentiality, integrity, availability

    Risk management

    Types of controls

    Security classification for information

    Access control


  • Information security as a process

    Security planning

    Incident response plans

    Change management

    Disaster recovery planning

  • Steps in the risk management process

    Establish the context



    Risk Mitigation Plan


    Review and evaluation of the plan

  • Areas of risk management

    Enterprise risk management

    Project Management

Session Four

  • Operations Security

  • Counter Intelligence

  • Information Security (INFOSEC)

  • Transmission Security (TRANSEC)

  • Communications Security (COMSEC)

  • Signal Security (SIGSEC)

  • Systems Security

  • Physical (Environmental) Security

  • Elements

  • Design

Session Five

  • Security Architecture and Design

  • Access control list (ACL)

  • Capability-based security

  • Multi-level security (MLS)

  • Role-based access control (RBAC)

  • Lattice-based access control (LBAC)

  • Modeling

  • Telecommunications and Network Security

  • Intrusion Detection

  • Types of Intrusion-Detection systems

  • Passive system vs. reactive system

  • IDS evasion techniques


Cyber Security Practices

Brought to you by
DR. Michael C. Redmond, PhD
Redmond Worldwide

The material presented in this Cyber Security Series is based on Cyber Security Professional Practices as they apply to Continuity Planning. To assist you in understanding how to develop a full program or fully assess an existing program, the Standards will be combined with other standards, guidelines and industry specific best practices as well as entities experiences and insights.

  • Homeland Security Act (includes) Federal Information Security Management Act (FISMA)1996 Health Insurance Portability and Accountability Act

  • Gramm-Leach-Bliley Act

  • Information Technology Act, 2000 (IT Act, 2000), India

  • Law No. 9,983 of July 2000, Brazil

  • ESISAC Cyber Security Standards and Implementation Plan,

  • ISO 15408

  • ISO 17799

  • ISO 27001

  • IFMA_NERC_21Oct2005

  • NERC 1300 ;CIP-002-1 through CIP-009-1 (CIP=Critical Infrastructure Protection).

  • Information Security Forum (ISF) SoGP

  • Operations Security (JP 3-13.3), U.S. DoD Operations Security Doctrine

  • Sarbanes-Oxley

  • Health Insurance Portability and Accountability Act (HIPAA)

  • IEEE P1074

  • Gramm-Leach-Bliley Act

  • PCI Data Security Standard (PCI DSS)


  Copyright 2005-2013 Redmond Worldwide All rights reserved