This presentation distills the best industry guidance into a hands-on approach to designing application architectures. Along the way, we'll examine the key decisions that must be made when choosing our architectural styles and designing our layers and show how those decisions turn into real shippable code on a project.
This document provides information about Fortinet and FortiGate network security appliances. It introduces Fortinet as a company specializing in network and information security, founded in 2000. It then describes some of Fortinet's key products and certifications, including FortiGate, FortiAnalyzer, and FortiManager. The document goes on to explain the FortiGate UTM concept and firewall role. It lists some FortiGate series and highlights key FortiOS features. The remainder provides instructions for deploying a FortiGate virtual machine in VMware Workstation, including network configuration steps.
The document discusses recent trends in information technology. It begins by introducing the author, Anwar Fathalla Ahmed, and his background working in information security.
It then outlines some of the key concepts in information security, including defining security, the components that make up an information system, and how to balance security and access. Critical characteristics of information are discussed, such as availability, accuracy, and confidentiality. Models for conceptualizing the security of an information system are presented.
This document provides an overview of cryptography concepts including:
- A brief history of cryptography from early ciphers like the Caesar cipher to modern computer-based cryptography.
- Key cryptography concepts like public/private key algorithms, hashing, and digital signatures.
- Modern applications of cryptography including encryption of data at rest, in transit, and end-to-end encryption.
- Emerging technologies like quantum cryptography are discussed along with notes of skepticism about current real-world applications.
- International regulations and the needs of law enforcement are also covered at a high level.
Domain 1: Security and Risk Management
(e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity
Cornerstone Information Security Concepts
Legal and Regulatory Issues
Security and 3rd Parties
Ethics
Information Security Governance
Access Control Defensive Categories and Types
Risk Analysis
Types of Attackers
Domain 3: Security Engineering - Review
Virtualization and Distributed Computing
System Vulnerabilities, Threats and Countermeasures
Cornerstone Cryptographic Concepts
History of Cryptography
Types of Cryptography
Cryptographic Attacks
Implementing Cryptography
Domain 3: Security Engineering
Virtualization and Distributed Computing
System Vulnerabilities, Threats and Countermeasures
Cornerstone Cryptographic Concepts
History of Cryptography
Types of Cryptography
Cryptographic Attacks
Implementing Cryptography
How to prepare for the CISSP Exam. A presentation created by the (ISC)2 Hellenic Chapter to assist and instruct those in Greece interested in pursuing the CISSP Certification.
The (ISC)2 Hellenic Chapter Team
This presentation distills the best industry guidance into a hands-on approach to designing application architectures. Along the way, we'll examine the key decisions that must be made when choosing our architectural styles and designing our layers and show how those decisions turn into real shippable code on a project.
This document provides information about Fortinet and FortiGate network security appliances. It introduces Fortinet as a company specializing in network and information security, founded in 2000. It then describes some of Fortinet's key products and certifications, including FortiGate, FortiAnalyzer, and FortiManager. The document goes on to explain the FortiGate UTM concept and firewall role. It lists some FortiGate series and highlights key FortiOS features. The remainder provides instructions for deploying a FortiGate virtual machine in VMware Workstation, including network configuration steps.
The document discusses recent trends in information technology. It begins by introducing the author, Anwar Fathalla Ahmed, and his background working in information security.
It then outlines some of the key concepts in information security, including defining security, the components that make up an information system, and how to balance security and access. Critical characteristics of information are discussed, such as availability, accuracy, and confidentiality. Models for conceptualizing the security of an information system are presented.
This document provides an overview of cryptography concepts including:
- A brief history of cryptography from early ciphers like the Caesar cipher to modern computer-based cryptography.
- Key cryptography concepts like public/private key algorithms, hashing, and digital signatures.
- Modern applications of cryptography including encryption of data at rest, in transit, and end-to-end encryption.
- Emerging technologies like quantum cryptography are discussed along with notes of skepticism about current real-world applications.
- International regulations and the needs of law enforcement are also covered at a high level.
Domain 1: Security and Risk Management
(e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity
Cornerstone Information Security Concepts
Legal and Regulatory Issues
Security and 3rd Parties
Ethics
Information Security Governance
Access Control Defensive Categories and Types
Risk Analysis
Types of Attackers
Domain 3: Security Engineering - Review
Virtualization and Distributed Computing
System Vulnerabilities, Threats and Countermeasures
Cornerstone Cryptographic Concepts
History of Cryptography
Types of Cryptography
Cryptographic Attacks
Implementing Cryptography
Domain 3: Security Engineering
Virtualization and Distributed Computing
System Vulnerabilities, Threats and Countermeasures
Cornerstone Cryptographic Concepts
History of Cryptography
Types of Cryptography
Cryptographic Attacks
Implementing Cryptography
How to prepare for the CISSP Exam. A presentation created by the (ISC)2 Hellenic Chapter to assist and instruct those in Greece interested in pursuing the CISSP Certification.
The (ISC)2 Hellenic Chapter Team