CISSP: Certified Information Systems Security Professional 2015

299 USD 200.33 USD 33%
Test scorm

The CISSP: Certified Information Systems Security Professional Certification certification training package from covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge.  

The new eight domains are:

  1. Security and Risk Management
  2. Asset Security
  3. Security Engineering
  4. Communications and Network Security
  5. Identity and Access Management
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security
     

The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². (ISC)² promotes the CISSP exam as an aid to evaluating personnel performing information security functions.  Candidates for this exam are typically network security professionals and system administrators with at least four years of direct work experience in two or more of the ten test domains.  As the first ANSI ISO accredited credential in the field of information security, the Certified Information Systems Security Professional (CISSP) certification provides information security professionals with not only an objective measure of competence, but a globally recognized standard of achievement.

Who is the target audience?

  • Experienced IT security-related practitioners, auditors, consultants, investigators or instructors, including network or security analysts and engineers, network administrators, information security specialists and risk management professionals, who wish to advance their current computer security careers

Module 1: Security and Risk Management

1.1 Introduction

1.2 CIA Triad Security Governance Part 1

1.3 CIA Triad Security Governance Part 2

1.4 Compliance Legal And Regulatory Issues Part 1

1.5 Compliance Legal And Regulatory Issues Part 2

1.6 Understanding Professional Ethics Part 1

1.7 Understanding Professional Ethics Part 2

1.8 Risk Management Part 1

1.9 Risk Management Part 2

1.10 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training Part 1

1.11 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training Part 2

Module 2: Asset Security

2.1 Asset Security Part 1

2.2 Asset Security Part 2

Module 3: Security Engineering

3.1 Engineering And Management Of Security Part 1

3.2 Engineering And Management Of Security Part 2

3.3 Engineering And Management Of Security Part 3

3.4 Engineering And Management Of Security Part 4

3.5 Engineering And Management Of Security Part 5

3.6 Engineering And Management Of Security Part 6

Module 4: Communication and Network Security

4.1 Apply Secure Design Principles To Networks Part 1

4.2 Apply Secure Design Principles To Networks Part 2

4.3 Apply Secure Design Principles To Networks Part 3

4.4 Apply Secure Design Principles To Networks Part 4

4.5 Apply Secure Design Principles To Networks Part 5

4.6 Apply Secure Design Principles To Networks Part 6

4.7 Securing Network Components Part 1

4.8 Securing Network Components Part 2

4.9 Design And Establish Secure Communication Channels Part 1

4.10 Design And Establish Secure Communication Channels Part 2

4.11 Design And Establish Secure Communication Channels Part 3

Module 5: Identity and Access Management

5.1 Controlling Access And Managing Identity Part 1

5.2 Controlling Access And Managing Identity Part 2

5.3 Controlling Access And Managing Identity Part 3

5.4 Controlling Access And Managing Identity Part 4

Module 6: Security Assessment Testing

6.1 Designing Performing And Analyzing Security Testing

Module 7: Security Operations

7.1 Foundational Concepts And Investigations Part 1

7.2 Foundational Concepts And Investigations Part 2

7.3 Incident Management And Preventative Measures Part 1

7.4 Incident Management And Preventative Measures Part 2

7.5 Disaster Recovery Process Part 1

7.6 Disaster Recovery Process Part 2

Module 8: Software Development Security

8.1 Understanding Applying And Enforcing Software Security Part 1

8.2 Understanding Applying And Enforcing Software Security Part 2

8.3 Conclusion

  • Felix Alberto Q...
    user_default
    Information about the teacher.
    Hi, the name of the teacher is David but can anybody expand the Last Name to follow him in LinkedIn or so? I would like to read his CV and contact him. Thankyou
Felix Alberto Q...
user_default
Information about the teacher.
Hi, the name of the teacher is David but can anybody expand the Last Name to follow him in LinkedIn or so? I would like to read his CV and contact him. Thankyou

Add New Discussion

How do you rate this product?

Select currency