Home » 2014 » October (Page 2)
Oct 8

Domains of CISSP: Business Continuity and Disaster Recovery Planning

October 8th, 2014 by

The Business Continuity and Disaster Recovery Planning domain addresses the preservation of the business in face of major disruptions to normal business operations. Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP) involve the preparation, testing, and updating of specific actions to protect critical business processes from the effects of major system and network failures.[...] Read More

Oct 7

Domains of CISSP: Information Security and Risk Management

October 7th, 2014 by

The Information Security and Risk Management domain involves the identification of an organization’s information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability. Management tools such as data classification, risk assessment, and risk analysis are used to identify the threats, classify assets, and rate their vulnerabilities so that effective security controls can be implemented.[...] Read More

Oct 7

ITIL® Virtual Classroom Training Has Many Benefits

October 7th, 2014 by

ITIL Online Virtual TrainingAs technology has taken on a more significant role in many businesses both large and small, the need for methods to manage, maintain, and support technology within these businesses has become a major area of concern. Moreover, the role of technology in many businesses has become essential regarding daily business operations.[...] Read More

Oct 6

Domains of CISSP: Legal, Regulations, Compliance and Investigations

October 6th, 2014 by

The Legal, Regulations, Compliance and Investigations domain addresses computer crime laws and regulations, the investigative measures and techniques which can be used to determi[...] Read More

Oct 4

Domains of CISSP: Physical (Environmental) Security

October 4th, 2014 by

The Physical (Environmental) Security domain addresses the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information. These resources include people, the facility in which they work, and the data, equipment, support systems, media, and supplies they utilize.[...] Read More

Oct 1

How Project Management Training Streamlines Processes

October 1st, 2014 by

Project Management TrainingWhen a promising project starts going wrong, it can be pretty difficult to recover unless you’re willing to adopt unconventional methods. One of the most effective-yet-underutilized means of saving projects from failure is project management training.[...] Read More