Meet Our Experts

Kevin Henry

Kevin is an international author, consultant and international
speaker. He is the official course development writer for ISC2 CISSP, ISACA CRISC and mile2’s C)ISSO. Kevin has been educating IT professionals for over 30 years. He also provides cyber security consulting and support services for organizations around the world. Assisting them with setting up Information Security programs and addressing areas ranging from in-depth risk analysis to policy creation and security awareness.


Courses

Certified Information Systems Security Professional, Part 9 of 9: Systems Professional

This course covers security fundamentals, risk management, threat modeling. governance, compliance, ethics, policies, and personnel security. When complete you'll have a comprehensive understanding of how security integrates with all of these key a...

Security

Certified Information Systems Security Professional, Part 8 of 9: Incident Management

This course covers incident management, types of laws and computer crimes and how to handle evidence, physical security and how to integrate with information security. This course is part of a series covering the ISC(2) Certified Information Systems ...

Security


Certified Information Systems Security Professional, Part 6 of 9: Security Architecture and Apps

This course discusses security architecture and models. It starts with the common concerns about security within software, risk management and how it integrates. Next, web applications, compliance with standards and investigate database security iss...

Security

Certified Information Systems Security Professional, Part 7 of 9: Malware and Business Continuity

Malicious software exists in many forms. This course will cover many types of malware including worms, Trojans, viruses along with rootkits and back-doors. It then will cover business continuity, hot and cold sites, redundancy, and backups. Finally...

Security


Certified Information Systems Security Professional, Part 5 of 9: Network Protocols and Wireless

This course will discuss protocols and structures of communications transmitted across networks. OSI hierarchy and the devices that manage communications and how to protect them. It will end with ports, services and switches and how they must be sec...

Security

Certified Information Systems Security Professional, Part 4 of 9: Cryptography and Net Topologies

This course covers symmetric and asymmetric cryptography and their history will be covered along with topics like Public key infrastructure, and various attacks. Also network and communication security will be discussed with topics inluding: network...

Security


Certified Information Systems Security Professional, Part 3 of 9: Cryptography and Operations

Operations security is where all the theory and policies are put into action. Topics in this course will include administration responsibilities, redundancy and fault tolerance, and threats to operations. Also, an overview of cryptography and how i...

Security

Certified Information Systems Security Professional, Part 2 of 9: Access and Security Models

Access control is the heartbeat of information security. This course will talk about role access, layers of access, control characteristics, administrative controls and technical access. It will also cover architecture computer security concepts. Th...

Security




Explore Our Blogs, Courses and Webinars