14.12.2012 Views

EMBAJADA DE LOS ESTADOS UNIDOS DE AMERICA Bogota ...

EMBAJADA DE LOS ESTADOS UNIDOS DE AMERICA Bogota ...

EMBAJADA DE LOS ESTADOS UNIDOS DE AMERICA Bogota ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

� Module 47: Investigating Defamation over Websites and Blog Postings<br />

� Module 48: Investigating Social Networking Websites for Evidences<br />

� Module 49: Investigation Search Keywords<br />

� Module 50: Investigative Reports<br />

� Module 51: Becoming an Expert Witness<br />

� Module 52: How to Become a Digital Detective<br />

� Module 53: Computer Forensics for Lawyers<br />

� Module 54: Law and Computer Forensics<br />

� Module 55: Computer Forensics and Legal Compliance<br />

� Module 56: Security Policies<br />

� Module 57: Risk Assessment<br />

� Module 58: Evaluation and Certification of Information Systems<br />

� Module 59: Ethics in Computer Forensics<br />

� Module 60: Computer Forensic Tools<br />

� Module 61: Windows Based Command Line Tools<br />

� Module 62: Windows Based GUI Tools<br />

� Module 63: Forensics Frameworks<br />

� Module 64: Forensics Investigation Templates<br />

� Module 65: Computer Forensics Consulting Companies<br />

5.9 CURSO CISSP<br />

CONTENIDO <strong>DE</strong>L CURSO<br />

� Access Control - a collection of mechanisms that work together to create security<br />

architecture to protect the assets of the information system.<br />

� Application Development Security - addresses the important security concepts that<br />

apply to application software development. It outlines the environment where software<br />

is designed and developed and explains the critical role software plays in providing<br />

information system security.<br />

� Business Continuity and Disaster Recovery Planning – for the preservation and recovery<br />

of business operations in the event of outages.<br />

� Cryptography - the principles, means, and methods of disguising information to ensure<br />

its integrity, confidentiality and authenticity.<br />

� Information Security Governance and Risk Management - the identification of an<br />

organization’s information assets and the development, documentation, and<br />

implementation of policies, standards, procedures, and guidelines. Management tools<br />

such as data classification and risk assessment/analysis are used to identify threats,<br />

classify assets, and to rate system vulnerabilities so that effective controls can be<br />

implemented.<br />

� Legal, Regulations, Investigations and Compliance - Computer crime laws and<br />

regulations. The measures and technologies used to investigate computer crime<br />

incidents<br />

� Operations Security - used to identify the controls over hardware, media, and the<br />

operators and administrators with access privileges to any of these resources. Audit and

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!