Cyber Security Educational Audio Training Series


This Cyber Security educational audio series was developed specifically for individuals in Continuity of Operations Planning and Continuity of Government and provides experience-rooted advice and expert direction for end-to-end continuity management and planning. DRI International allows 6 Continuing Education Credits (CED) for completion of this series and the complimentary workbook for individuals who purchase and review this invaluable series.



In cooperation with industry best-practices and a wealth of corporate experience, Redmond Worldwide has released the Educational Audio Series entitled: Cyber Security. This library was developed specifically for individuals in the business of Continuity Management and provides experience-rooted advice and expert direction for end-to-end continuity management and planning. This set includes:


  • 6 Segments Plus Workbook
  • 6 Continuing Ed Points from DRII


Session One

  • About Cyber Terrorist – Learning About The Enemy
  • Tools of Their Trade
  • Equipment Used to Attack
  • Personnel and Training


 Session Two

  • Access Control and Identification
  • Security Management Controls
    • Physical security
    • Computer security


  • Identification and authentication (I&A)
  • Authorization
  • Accountability
  • Access Control Techniques
  • Discretionary Access Control
  • Mandatory Access Control
  • Telecommunication
  • Policy
  • Application security
  • Common exploits
  • Security testing for applications


Session Three

  • Incident Reporting And Response Planning And Recovery Plans
  • Information Security and Risk Management
  • Basic Principles of Information Security
    • Confidentiality, integrity, availability
    • Risk management
    • Types of controls
    • Security classification for information
    • Access control
    • Cryptography
  • Information security as a process
    • Security planning
    • Incident response plans
    • Change management
    • Disaster recovery planning
  • Steps in the risk management process
    • Establish the context
    • Identification
    • Assessment
    • Risk Mitigation Plan
    • Implementation
    • Review and evaluation of the plan
  • Areas of risk management
    • Enterprise risk management
    • Project Management


Session Four

  • Operations Security
  • Counter Intelligence
  • Information Security (INFOSEC)
  • Transmission Security (TRANSEC)
  • Communications Security (COMSEC)
  • Signal Security (SIGSEC)
  • Systems Security
  • Physical (Environmental) Security
  • Elements
  • Design


Session Five

  • Security Architecture and Design
  • Access control list (ACL)
  • Capability-based security
  • Multi-level security (MLS)
  • Role-based access control (RBAC)
  • Lattice-based access control (LBAC)
  • Modeling
  • Telecommunications and Network Security
  • Intrusion Detection
  • Types of Intrusion-Detection systems
  • Passive system vs. reactive system
  • IDS evasion techniques


The material presented in this Cyber Security Series is based on Cyber Security Professional Practices as they apply to Continuity Planning. To assist you in understanding how to develop a full program or fully assess an existing program, the Standards will be combined with other standards, guidelines and industry specific best practices as well as entities experiences and insights.

  • Control Objectives for Information and related Technology (COBIT)   
  • European Union Agency for Network and Information Security (ENISA)
  • Federal Financial Institutions Examination Council (FFIEC) 
  • Health Insurance Portability and Accountability Act (HIPAA)
  • National Institute of Standards and Technology (NIST)
  • Payment Card Industry Data Security Standard (PCIDSS)
  • ISO/IEC 27001
  • ISO/IEC 27002
  • ISO/IEC 27003
  • ISO/IEC 27004
  • ISO/IEC 27005
  • ISO/IEC 27007
  • ISO/IEC 29100
  • ISO/IEC 38500

© 2005 - Redmond Worldwide, Inc. All rights reserved. Site Map | Disclaimer
Left Menu Icon
Redmond Worldwide