Career Path

Carter Enterprise Solutions, LLC is the only 8(a) WOSB Official Training Provider (OTP) for the International Information System Security Certification Consortium (ISC)² in the United States territories. With such prestigious recognition, we are authorized to offer Official (ISC)² Course Materials, (ISC)² Instructors, (ISC)² Study Aides and (ISC)² Test Vouchers.As an 8(a) WOSB located in a HUBZone, we are well positioned to help meet small business goals and offer sole-source training options.

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for theacclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part ofa holistic, pragmatic approach to security. Our membership, more than 140,000 strong, is made up of certified cyber, information,software and infrastructure security professionals who are making a difference and helping to advance the industry.

Our Curriculum

SSCP Overview

The Systems Security Certified Practitioner (SSCP) is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It provides confirmation of a practitioner’s ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.

Target Audience

Cybersecurity and IT/ICT professionals who have hands-on responsibly for cyber, information, software and infrastructure security. Roles include:

  • Network Security Engineer
  • Systems/Network Administrator
  • Security Analyst
  • Systems Engineer
  • Security Consultant/ Specialist
  • Security Administrator
  • Systems/Network Analyst
  • Database Administrator

Domains

  1. Access Controls
  2. Security Operations and Administration
  3. Risk Identification, Monitoring, and Analysis
  4. Incident Response and Recovery
  5. Cryptography
  6. Network and Communications Security
  7. Systems and Application Security

 

Course Delivery Formats:

Classroom (Face-to-Face)

Online Instructor-Led

Online Self-Paced Virtual

Private On-Site

CCSP Overview

(ISC)² and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. A CCSP applies information security expertise to a cloud computing environment and demonstrates competence in cloud security architecture, design, operations, and service orchestration. This professional competence is measured against a globally recognized body of knowledge. The CCSP is a standalone credential that complements and builds upon existing credentials and educational programs, including (ISC)²’s Certified Information Systems Security Professional.

(CISSP) and CSA’s Certificate of Cloud Security Knowledge (CCSK).

Target Audience

Experienced cybersecurity and IT/ICT professionals who are involved in transitioning to and maintaining cloud-based solutions and services.

Roles include:

  • Enterprise Architect
  • Security Administrator
  • Systems Engineer
  • Security Architect
  • Security Consultant
  • Security Engineer
  • Security Manager
  • Systems Architect

Domains

  1. Cloud Concepts, Architecture and

Design

  1. Cloud Data Security
  2. Cloud Platform & Infrastructure

Security

  1. Cloud Application Security
  2. Cloud Security Operations
  3. Legal, Risk & Compliance

Course Delivery Formats:

Classroom (Face-to-Face)

Online Instructor-Led

Online Self-Paced Virtual

Private On-Site

CAP Overview

The Certified Authorization Professional (CAP) is an information security practitioner who champions system security commensurate with an organization’s mission and risk tolerance, while meeting legal and regulatory requirements. CAP confirms an individual’s knowledge, skill, and experience required for authorizing and maintaining information systems within the Risk Management Framework as outlined in NIST SP 800-37 Rev 1.

 

Target Audience

The CAP is ideal for IT, information security and information assurance practitioners and contractors who use the RMF in federal government, military, civilian roles, local governments, and private sector organizations.  Roles include:

 

  • Information Systems Security Officers
  • Information Systems Security Managers
  • Security Control Accessors/Validators
  • Information Systems Security Engineers
  • IT Personnel with RMF responsibilities

 

Domains

  1. Information Security Risk Management Program
  2. Categorization of Information Systems (IS)
  3. Selection of Security Controls
  4. Implementation of Security Controls
  5. Assessment of Security Controls
  6. Authorization of Information Systems (IS)
  7. Continuous Monitoring

 

Course Delivery Formats:

Classroom (Face-to-Face)

Online Instructor-Led

Private On-Site

CISSP Overview

The Certified Information Systems Security Professional (CISSP) is the most globally recognizedcertification in the information security market. CISSP validates an information securityprofessional’s deep technical and managerial knowledge and experience to effectively design,engineer, and manage the overall security posture of an organization.

 

Target Audience

The CISSP is ideal for information security professionals with 5+ years in the information security

field and typically hold one of the following positions:

 

  • Security Consultant
  • Security Manager
  • IT Director/Manager
  • Security Auditor
  • Security Architect
  • Security Analyst
  • Security Systems Engineer
  • Chief Information Security Officer
  • Director of Security
  • Network Architect

 

Domains

  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

 

Course Delivery Formats:

Classroom (Face-to-Face)

Online Instructor-Led

Online Self-Paced Virtual

Private On-Site

HCISPP Overview

The HealthCare Information Security and Privacy Practitioner (HCISPP) is the ideal certification for those with the core knowledge and experience needed to implement, manage, or assess the appropriate security and privacy controls of a healthcare organization. HCISPP provides confirmation of a practitioner’s knowledge of best practices and techniques to protect organizations and sensitive data against emerging threats and breaches.

 

Target Audience

The HCISPP is ideal for those working in roles such as:

 

  • Compliance Officer
  • Information Security Manager
  • Privacy Officer
  • Compliance Auditor
  • Risk Analyst
  • Practice Manager
  • Medical Records Supervisor
  • Information Technology Manager
  • Privacy and Security Consultant
  • Health Information Manager

 

Target Employers

  • Hospitals
  • Privacy & Security Consulting Firms
  • Healthcare Clearing Houses
  • Claims Processors
  • Regulatory Agencies
  • Group Practices
  • Health Centers & Clinics

 

Domains

  1. Healthcare Industry
  2. Information Governance in Healthcare
  3. Information Technologies in Healthcare
  4. Regulatory and Standards Environment
  5. Privacy and Security in Healthcare
  6. Risk Management and Risk Assessment
  7. Third-Party Risk Management

 

Course Delivery Formats:

Classroom (Face-to-Face)

Online Instructor-Led

Online Self-Paced Virtual

Get More Information Now

15 + 7 =

Address

Metro Center III, 6525 Belcrest Road, Suite 418 Hyattsville, Maryland 20782

Contact Us

Tel: (202) 753-9875 
Fax: (301) 560-3438

Email

info@c-ents.com