Global CBT
Custom CISSP
Training
Seminars
Seats Are Limited
Register Now!
Products






To Register
For A
Seminar


Content
Outline

Topic Outline
ClientssampleCourse LibrariesDEMOOnline Catalog
  



Custom CISSPTM
5-Day Certification Seminar

When was the last time you had a Data Security Audit?

Who handles your Security Planning & Implementation currently?

Who is in charge of handling incident reports and computer forensics?

As a company changes with every additional employee, piece of hardware,and software, changes build upon themselves making it increasingly difficult to determine what your assets are, who has access to them, and where they reside. This leaves a company very vulnerable to catastrophic events brought about by:

* Disgruntled Employees
* Sinister Competitors
* Netspionage
* Random Hackers
* Cute Emails Carrying Lethal Viruses
* Physical Destruction

Exactly how long can you afford to wait?

Also.... if you are in the Healthcare, Financial, or Banking Industry, we know how critical it is for you to become compliant per legislation for the Health Insurance Portability & Accountablity Act(HIPAA), and Gramm Leach-Bliley Act)(GLB).

So...exactly how long can you afford to wait in acquiring the Information Security Training that you need?

Becoming a Certified Information Systems Security Professional(CISSP) will give you all the necessary information and training in the 10 Domains pertaining to becoming a Certified Information Systems Security Professional as well as the base knowledge critical for the HIPAA and GLB Acts.

With almost a 600% increase over the past two years in computer security incidents, computer crime is now truly an epidemic in progress.

You can't afford to wait any longer!

Why is there so much hype about information security these days? Consider the trend illustrated below from statistics compiled by the respected CERT® Coordination Center at the Carnegie Mellon Software Engineering Institute:
With almost a 600% increase over the past two years in computer security incidents, computer crime is now truly an epidemic in progress. Adding to the urgency of the situation, compliance with legislation such as the Health Insurance Portability and Accountability Act (HIPAA) and the Gramm-Leach-Bliley (GLB) Act
is now a very serious concern for many organizations in the Health Care or Financial/Banking related industries.

Organizations are struggling with trying to quickly train internal IT staff for new security-related tasks and responsibilities. As for hiring new security professionals as consultants or for internal staff, many organizations are at a loss to know how to readily identify capable InfoSec talent.

Meanwhile, Rome burns.

Opportunity and Job Security by the Numbers.

Today, employers expect current staff to become knowledgeable on security planning and implementation, and are actively looking for new hires that bring a desirable combination of security experience and certification. A recent Qaurterly IT Compensation Survey by Foote Partners*, LLC shows that over 85% of the top 100 companies consider security a top initiative for the upcoming 12 months. The same survey shows that security is the #1 area for corporate IT budget growth, and is also #1 for planned projects this year. While the Foote survey showed that bonus premium pay for all tech certifications is up by 4%, security certifications such as CISSP are leading the way in bonus potential. Of any security-related certifications available today, the CISSP has long been recognized as the highest premier standard of all.

* More information about this and other Foote Partners Salary Surveys may be found at www.footepartners.com.
How can Global CBT and Certified Tech Trainers help me achieve CISSP certification?
This highly effective custom program delivers on two fronts:

* Review of the 10 Security Domains. Our seminar provides solid and comprehensive review of the 10 Security Domains by using the highest-qualified instructors and training materials.

* Intensive exam prep by a technical exam expert. Our seminar teaches the skills necessary to achieve CISSPTM certification and gain a competitive advantage in today's IT industry.


A combination of lectures, breakout sessions, and personal mentoring are balanced to produce maximum knowledge transfer and CISSP exam preparation. Our courses incorporate Certified Tech Trainers' Adaptive Study MethodologyTM (ASMTM, TM), ensuring each attendee's learning experience to be personally optimized for success. Through the use of after-hours computerized testing and instructor review, our instructors can identify and target potential weaknesses in each student's individual grasp of key objectives.
Featuring...
At Course Completion
At the end of the course students should be prepared for (ISC)2's CISSP Exam. We do not process Exam applications. It is the candidate's responsibility to successfully register for his or her exam directly with (ISC)2
Prerequisites
The CISSP certification and exam are used to establish a candidate's proficiency in ten separate topic areas, or domains, of information security. Visit www.isc2.org for complete information on exam prerequisites recommendations and how to register for an exam. Certified Tech Trainers do not provide computers for student use. While not required, we recommend that each student bring his or her own internet-ready computer for after-hours testing and review.
To Register For A Seminar








This material is not sponsored by, endorsed by, or affiliated with (ISC)2. (ISC)2SM, CISSPTM, the CISSP logo, and the (ISC)2 logo are trademarks, servicemarks, or registered trademarks or service marks of International Information Systems Security Consortium, Inc. in the United States and certain other countries.All other trademarks are trademarks of their respective owners.