{"id":16,"date":"2012-06-07T03:53:02","date_gmt":"2012-06-07T03:53:02","guid":{"rendered":"http:\/\/112.109.118.49\/cdr\/wordpress\/?page_id=16"},"modified":"2012-06-07T14:51:44","modified_gmt":"2012-06-07T14:51:44","slug":"cissp-for-administrators","status":"publish","type":"page","link":"https:\/\/cyberdefenseresearch.com\/?page_id=16","title":{"rendered":"CISSP for Administrators"},"content":{"rendered":"<p align=\"left\">One week on-site training session that covers all 10 domains and includes training manuals that cover:<\/p>\n<ul>\n<li>\n<div align=\"left\">Access Control Systems &amp; Methodology<\/div>\n<\/li>\n<li>\n<div align=\"left\">Telecommunications, Network and Internet Security<\/div>\n<\/li>\n<li>\n<div align=\"left\">Security Management Practices<\/div>\n<\/li>\n<li>\n<div align=\"left\">Applications and Systems Development<\/div>\n<\/li>\n<li>\n<div align=\"left\">Cryptography<\/div>\n<\/li>\n<li>\n<div align=\"left\">Security Architecture and Models<\/div>\n<\/li>\n<li>\n<div align=\"left\">Operations Security<\/div>\n<\/li>\n<li>\n<div align=\"left\">Business Continuity Planning<\/div>\n<\/li>\n<li>\n<div align=\"left\">Law, Invesigation and Ethics<\/div>\n<\/li>\n<li>\n<div align=\"left\">Physical Security.<\/div>\n<\/li>\n<\/ul>\n<p align=\"left\">All training is conducted by CISSP professionals with more than ten years of network and computer security experience.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One week on-site training session that covers all 10 domains and includes training manuals that cover: Access Control Systems &amp; Methodology Telecommunications, Network and Internet Security Security Management Practices Applications and Systems Development Cryptography Security Architecture and Models Operations Security &hellip; <a href=\"https:\/\/cyberdefenseresearch.com\/?page_id=16\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":28,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-16","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/16","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16"}],"version-history":[{"count":0,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/16\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/28"}],"wp:attachment":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}