Home

 

 

About Us

 

 

Contact

 

 

Information Request

 

 

Seminars and Teleseminars

 

     
 

 

Redmond
Worldwide


Continuity solutions
that work!
 
     
 
     
 



Ms. Michael C. Redmond

CEO

PMP, CEM, MBCP, FBCI, MBA, PhD

 

 

News

 

Cyber Security

 

Educational CD Series:

$195

In cooperation with Industry best-practices and a wealth of corporate experience, Redmond Worldwide has released this CD library.

Note:

6 CDs Plus Workbook

6 Continuing Ed Points from DRII

 

 

 

 

 

 

 

 

 

 

Cyber Security Planning Training CD's

Brought to you by
DR. Michael C. Redmond, PhD
Redmond Worldwide

 

Session One

  • About Cyber Terrorist Learning About The Enemy

  • Tools of Their Trade

  • Equipment Used to Attack

  • Personnel and Training

 

Session Two

  • Access Control and Identification

  • Security Management Controls

    Physical security

    Computer security

  • Identification and authentication (I&A)

  • Authorization

  • Accountability

  • Access Control Techniques

  • Discretionary Access Control

  • Mandatory Access Control

  • Telecommunication

  • Policy

  • Application security

  • Common exploits

  • Security testing for applications
     

Session Three

  • Incident Reporting And Response Planning And Recovery Plans

  • Information Security and Risk Management

  • Basic principles of Information Security

    Confidentiality, integrity, availability

    Risk management

    Types of controls

    Security classification for information

    Access control

    Cryptography

  • Information security as a process

    Security planning

    Incident response plans

    Change management

    Disaster recovery planning

  • Steps in the risk management process

    Establish the context

    Identification

    Assessment

    Risk Mitigation Plan

    Implementation

    Review and evaluation of the plan

  • Areas of risk management

    Enterprise risk management

    Project Management


Session Four

  • Operations Security

  • Counter Intelligence

  • Information Security (INFOSEC)

  • Transmission Security (TRANSEC)

  • Communications Security (COMSEC)

  • Signal Security (SIGSEC)

  • Systems Security

  • Physical (Environmental) Security

  • Elements

  • Design
     

Session Five

  • Security Architecture and Design

  • Access control list (ACL)

  • Capability-based security

  • Multi-level security (MLS)

  • Role-based access control (RBAC)

  • Lattice-based access control (LBAC)

  • Modeling

  • Telecommunications and Network Security

  • Intrusion Detection

  • Types of Intrusion-Detection systems

  • Passive system vs. reactive system

  • IDS evasion techniques

 

Cyber Security Practices

Brought to you by
DR. Michael C. Redmond, PhD
Redmond Worldwide

The material presented in this Cyber Security Series is based on Cyber Security Professional Practices as they apply to Continuity Planning. To assist you in understanding how to develop a full program or fully assess an existing program, the Standards will be combined with other standards, guidelines and industry specific best practices as well as entities experiences and insights.

  • Homeland Security Act (includes) Federal Information Security Management Act (FISMA)1996 Health Insurance Portability and Accountability Act

  • Gramm-Leach-Bliley Act

  • Information Technology Act, 2000 (IT Act, 2000), India

  • Law No. 9,983 of July 2000, Brazil

  • ESISAC Cyber Security Standards and Implementation Plan,

  • ISO 15408

  • ISO 17799

  • ISO 27001

  • IFMA_NERC_21Oct2005

  • NERC 1300 ;CIP-002-1 through CIP-009-1 (CIP=Critical Infrastructure Protection).

  • Information Security Forum (ISF) SoGP

  • Operations Security (JP 3-13.3), U.S. DoD Operations Security Doctrine

  • Sarbanes-Oxley

  • Health Insurance Portability and Accountability Act (HIPAA)

  • IEEE P1074

  • Gramm-Leach-Bliley Act

  • PCI Data Security Standard (PCI DSS)

 

 
     
 
  Copyright 2005-2013 Redmond Worldwide All rights reserved