Online And On-Site Computer Training Across The USA. CISSP CASP Security+ A+ MCDBA MCST MCSE CCNA CCNP CCVP CCSP PMP ITIL Web Design Certification Courses
YOUR TRUSTED, ON-SITE, ONLINE, AND HOME-STUDY TRAINING PARTNER
Have you told someone about RTEK 2000 today?
Online, On-Demand Training at Affordable Price for CISSP Certification.
Product ID: RTK-CISSP-OL
- Repeat as many times as you want;
- Full Audio, Video, and Demonstration components;
- Accessable from anywhere over the Internet;
- Learn at your place
- Schedule at your own pace and time!
"...The training class is excellent. The extra information - web site references, tips, techniques, and other general information - really made the difference. The classroom-like presentations are superb
. I give this product a high endorsement."
R. Bundy. CTO, Co-Founder. www.SocalNETug.org
The Shon Harris CISSP Series brings together all the materials, tools, and study aids you need to pass the CISSP exam. Whether you are a security professional, a seasoned engineer, or are looking for a career change - this is the solution to bring your career to new heights!
Our objective is to not just prepare you for CISSP Certification, but to also provide you with the practical, detailed understanding and knowledge of security topics that will be of valued use to you and your company. Our product focuses not only on the areas necessary for the CISSP examination, but also on a more detailed and practical perspective that will give you competitive skills in the real world as well.
Our superior technology based course curriculum, strictly adheres to all of (ISC)² & CompTIA Security+ exam objectives and is presented to you by leading certification instructors who are concise and engaging in their delivery. You will learn both the theory and practical aspects of the technologies as well as gain insight into the industry with their expert instruction. Each class session is presented in full motion audio/video, with step by step demonstrations testing modules to insure that you fully understand the subject matter. You can review each subject as needed to reinforce your knowledge, and access to educational mentors.
- 12 Months Online On-Demand Access Featuring live instructor-led classroom sessions with full audio, video and demonstration components by Shon Harris
- 1,830 pages printable CISSP® Student Study-Guide developed by Shon Harris
- Self-Assessment Module Review Quizzes
- Free 1 Year Upgrade Policy
- Certificate of Completion
- Mobile Access via iPhones and iPads
Shon Harris, CISSP, MCSE
, was a security consultant, a former engineer in the Air Force Information Warfare Unit, an instructor, an author, and former President of Logical Security (regrettably, she passed away recently).
She has written two best selling CISSP books, and co-authored Hacker's Challenge and Gray Hat Hacking. Shon has developed a new security book series, being published by McGraw-Hill, which will be sold to corporations, universities, colleges, and professionals throughout the world. This series will set the new standards in security training, education, and industry practices.
She is an active contributor for Information Security Magazine and Windows 2000 Magazine. Shon has taught computer and information security to a wide range of clients including RSA, Department of Defense, Department of Energy, National Security Agency (NSA), Bank of America, Defense Information Systems Agency (DISA), BMC, and more.
Shon was recently recognized by Information Security Magazine as one of the top 25 women technologists
, researchers and executives reshaping information security today.
If you have any questions we encourage you to contact RTEK 2000
David R. Miller (CISSP, MCT, MCSE: Security Windows Server, MCSE, CISSP, CEH, ECSA, LPT, CWNA, CCNA, CNE, CompTIA Security+, A+, N+)
Domain 1 - Information Security and Risk Management
Domain 2 - Access Control Domain Objectives
Domain 3 - Cryptography Objectives
Domain 4 - Physical Security Objectives
Domain 5 - Security Architecture and Design Objectives
Domain 6 - Law, Investigation and Ethics Objectives
- Not Just Fun and Games
- Examples of Computer Crimes
- Who Perpetrates These Crimes?
- Types of Motivation for Attacks
- A Few Attack Types
- Dumpster Diving
- Telephone Fraud
- Privacy of Sensitive Data
- Privacy Issues - U.S. Laws as Examples
- European Union Principles on Privacy
- Routing Data Through Different Countries
- Employee Privacy Issues
- Agenda 1
- Civil Law
- Criminal Law
- Administrative Law
- U.S. Federal Laws
- Trade Secret
- More Intellectual Property Laws
- Software Licensing
- Software Piracy
- Digital Millennium Copyright Act
- Agenda 2
- Computer Crime and Its Barriers
- Countries Working Together
- Worldwide Cybercrime
- Security Principles for International Use
- Determine if a Crime Has Indeed Been Committed
- Bringing in Law Enforcement
- Citizen versus Law Enforcement Investigation
- Investigation of Any Crime
- Role of Evidence in a Trial
- Evidence Requirements
- Chain of Custody
- How Is Evidence Processed?
- Hearsay Evidence
- Hearsay Rule Exception
- Agenda 3
- Preparing for a Crime Before It Happens
- Incident Handling
- Evidence Collection Topics
- Computer Forensics
- Hidden Secrets
- Trying to Trap the Bad Guy
- Companies Can Be Found Liable
- Sets of Ethics
- Computer Ethics Institute
- Internet Architecture Board
- Domain 6 Review
Domain 7 - Telecommunications and Networking
Domain 8 - Business Continuity Objectives
Domain 9 - Application Security
Domain 10 - Operations Security Objectives
is a Technical writer, trainer, author, curriculum developer, network engineer. David began as a technical trainer in the mid 1980's providing instruction on PC based medical therapy devices. David achieved his CNE in the early 1990's and then founded MicroLink Corporation in 1994 in Dallas, Texas performing network installation and user training. After attaining his first Microsoft certification in 1997, he began teaching the MCSE track at the Southern Methodist University in Dallas. He joined an MCSE, boot camp style, private training institution, Intense School in 1999 and was Director of training there until 2002.
He has been working with Shon Harris, best selling author of CISSP fame, for the last several years as Director of Training for Logical Security, LLC. There he has managed several teams of curriculum developers. He acts as corporate IT Director and coordinates the development of student manuals, lab manuals and classroom setup.
- Video Lectures and Expert Instruction
Practical knowledge is essential for success in a real world environment and we have chosen our instructors with this in mind - many of our instructors are business owners and have been employed in their respective fields for decades!
Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the user. This type of representation allows the user to better interpret the material through charts, definitions, graphs, and more...
- Easy Navigation
Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance through exercises.
- Printable Study Guides
Printable study guides for the entire course are available. This allows all material to be viewed, reviewed, and printed for viewing at a later date.
- Review Exercises
Each section has a review quiz to aid in the learning process by validating the comprehension of the material covered before moving on to a new section.
- Resume Option
All courses are resumed to where you left off last session allowing you to learn when it is convenient for you without the hassle of remembering where you where.
- Full Motion Video
All courses feature full-motion videos of instructors teaching the information as if they are speaking directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal lesson and learning experience.
- Certificate of Completion
Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.
- Live, Hands-On Demonstrations
Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing it on screen in front of them.
- Mobile Access: All our training courses are now available across all mobile devices.