Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CISSP : Certified Information Systems Security Professional 2015

E-COURSE:

CISSP : Certified Information Systems Security Professional 2015

Instructor-led, video based E-Learning course.
Overview

Certified Information Systems Security Professional (CISSP) to be the most desired certification to achieve. More than 200,000 have taken the exam, and there are more than 70,000 CISSPs worldwide. This course is updated for the latest 2015 CISSP Body of Knowledge. You'll prepare for the exam smarter and faster thanks to expert content, real-world examples, advice on passing each section of the exam, access to an online interactive learning environment, and much more.

Objectives
  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Module 1: Security and Risk Management

1.1 Introduction

1.2 CIA Triad Security Governance Part 1

1.3 CIA Triad Security Governance Part 2

1.4 Compliance Legal And Regulatory Issues Part 1

1.5 Compliance Legal And Regulatory Issues Part 2

1.6 Understanding Professional Ethics Part 1

1.7 Understanding Professional Ethics Part 2

1.8 Risk Management Part 1

1.9 Risk Management Part 2

1.10 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training Part 1

1.11 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training Part 2

Module 2: Asset Security

2.1 Asset Security Part 1

2.2 Asset Security Part 2

Module 3: Security Engineering

3.1 Engineering And Management Of Security Part 1

3.2 Engineering And Management Of Security Part 2

3.3 Engineering And Management Of Security Part 3

3.4 Engineering And Management Of Security Part 4

3.5 Engineering And Management Of Security Part 5

3.6 Engineering And Management Of Security Part 6

Module 4: Communication and Network Security

4.1 Apply Secure Design Principles To Networks Part 1

4.2 Apply Secure Design Principles To Networks Part 2

4.3 Apply Secure Design Principles To Networks Part 3

4.4 Apply Secure Design Principles To Networks Part 4

4.5 Apply Secure Design Principles To Networks Part 5

4.6 Apply Secure Design Principles To Networks Part 6

4.7 Securing Network Components Part 1

4.8 Securing Network Components Part 2

4.9 Design And Establish Secure Communication Channels Part 1

4.10 Design And Establish Secure Communication Channels Part 2

4.11 Design And Establish Secure Communication Channels Part 3

Module 5: Identity and Access Management

5.1 Controlling Access And Managing Identity Part 1

5.2 Controlling Access And Managing Identity Part 2

5.3 Controlling Access And Managing Identity Part 3

5.4 Controlling Access And Managing Identity Part 4

Module 6: Security Assessment Testing

6.1 Designing Performing And Analyzing Security Testing

Module 7: Security Operations

7.1 Foundational Concepts And Investigations Part 1

7.2 Foundational Concepts And Investigations Part 2

7.3 Incident Management And Preventative Measures Part 1

7.4 Incident Management And Preventative Measures Part 2

7.5 Disaster Recovery Process Part 1

7.6 Disaster Recovery Process Part 2

Module 8: Software Development Security

8.1 Understanding Applying And Enforcing Software Security Part 1

8.2 Understanding Applying And Enforcing Software Security Part 2

8.3 Conclusion

  1. CISSP - Module 0
1
Start
Course Introduction
  1. CISSP - Module 1
2
Start
The CISSP Exam
3
Start
CISSP Certification Goals
4
Start
Security Professional Certification Value
5
Start
Exam Common Body of Knowledge
6
Start
Becoming a CISSP
  1. CISSP - Module 2
7
Start
Cryptography
8
Start
Cryptography Concepts
8
Start
Cryptography Concepts
9
Start
History of Cryptography
10
Start
Cryptosystem Features
11
Start
Encryption Systems
11
Start
Encryption Systems
12
Start
Substitution Ciphers
13
Start
Symmetric Algorithms
13
Start
Symmetric Algorithms
14
Start
Asymmetric Algorithms
15
Start
Message Integrity
16
Start
Digital Signatures
17
Start
Public Key Infrastructure
17
Start
Public Key Infrastructure
18
Start
Trusted Platform Module
19
Start
Encryption Communication Levels
20
Start
E-MAil Security
21
Start
Internet Security
22
Start
Cryptography Attacks
  1. CISSP - Module 3
23
Start
Physical (Environmental) Security
24
Start
Threat Mitigation Techniques
25
Start
Geographical-Man Made and Political Threats
26
Start
Site and Facility Design
27
Start
Perimeter Security
28
Start
Building and Internal Security
29
Start
Secure Data Centers and Fire Detection Systems
30
Start
Types of Power Issues
31
Start
HVAC Guidelines
32
Start
Equipment Security and Personal Security
  1. CISSP - Module 4
33
Start
Security Architecture and Design
34
Start
Security Model Concepts
35
Start
System Architecture
36
Start
Computing Platforms
37
Start
Virtual Computing and Security Services
38
Start
System Components
39
Start
Memory Concepts
40
Start
Enforcing Process Security and Multitasking
41
Start
System Security Architecture
42
Start
Security Models and Modes
42
Start
Security Models and Modes
43
Start
System Evaluation and Assurance Levels
44
Start
Certification and Accreditation
45
Start
Security Architecture Threats
46
Start
Database Security and Distributed Systems Security
  1. CISSP - Module 5
47
Start
Access Control
48
Start
Access Control Concepts
49
Start
Identification and Authentication
50
Start
Password Types and Management
51
Start
Ownership-Character-Physiological-Behavioral Factors
52
Start
Biometric Considerations
53
Start
Authorization Concepts
53
Start
Authorization Concepts
54
Start
User Accountability
55
Start
Vulnerability Assessment
56
Start
Penetration Testing and Threat Modeling
57
Start
Access Control Categories-Types-Models and Administration
58
Start
Provisioning Life Cycle and Access Control Monitoring
59
Start
Access Control Threats
  1. CISSP - Module 6
60
Start
Software Development Security
61
Start
System Development Life Cycle
62
Start
Software Testing and Validation
63
Start
Software Development Security Best Practices
64
Start
Software Development Methods
65
Start
Programming Languages
66
Start
Database Architecture and Models
67
Start
Database Interface Languages
68
Start
Data Warehouse-Mining and Threats
69
Start
Database and Application Access Control
70
Start
Monitoring for Problems
71
Start
Software Threats and Security
  1. CISSP - Module 7
72
Start
Information Security Governance and Risk Management
73
Start
Principles and Terms
74
Start
Security Frameworks and Methodologies
74
Start
Security Frameworks and Methodologies
75
Start
Risk Assessment
76
Start
Asset Values-Vulnerabilities and Threats
77
Start
Quantitative Risk Analysis
78
Start
Safeguard Selection
79
Start
Risk Management
80
Start
Security Governance Components
81
Start
Security Policies
82
Start
Classification Life Cycle
83
Start
Responsibilities and Roles
84
Start
Personnel Security
85
Start
Security Awareness Training
  1. CISSP - Module 8
86
Start
Telecommunications and Network Security
87
Start
OSI and TCIP Models
87
Start
OSI and TCIP Models
88
Start
IP Addressing
89
Start
Transmission Methods
90
Start
Types of Cabling
91
Start
Network Topologies
92
Start
Network Protocols and Services
93
Start
Network Routing and Devices
94
Start
Network Connection Types
94
Start
Network Connection Types
95
Start
Network Authentication
96
Start
Wireless Technologies
97
Start
WLAN Security Methods
98
Start
Network Threats and Cabling Behaviors
  1. CISSP - Module 9
99
Start
Operation Security
100
Start
Operation Security Concepts
101
Start
Protecting Tangible and Intangible Assets
102
Start
Asset and Media Management
103
Start
Storage Options
104
Start
Network and Resource Management
105
Start
Incident Response and Change Management
106
Start
Patch Management-Audit and Review
107
Start
Threats and Preventative Measures
108
Start
Trusted Paths-Trusted Recovery and System Hardening
109
Start
Monitoring and Reporting
  1. CISSP - Module 10
110
Start
Business Continuity and Disaster Recovery
111
Start
Business Continuity and Disaster Recovery Concepts
111
Start
Business Continuity and Disaster Recovery Concepts
112
Start
BIA Development
113
Start
Business Continuity Planning
114
Start
Preventive Controls
115
Start
Recovery Strategies
115
Start
Recovery Strategies
116
Start
Data Backup Types
117
Start
Data Recovery Terms
118
Start
Critical Teams and Duties
119
Start
BCP Testing
  1. CISSP - Module 11
120
Start
Legal, Regulations, Investigations, and Compliance
121
Start
Digital Crime
122
Start
Computer Crime Concepts
123
Start
Major Legal Systems
124
Start
Intellectual Property Law
125
Start
Privacy
125
Start
Privacy
126
Start
Liability
127
Start
Incident Response
128
Start
Forensic and Digital Investigations
128
Start
Forensic and Digital Investigations
129
Start
Evidence
129
Start
Evidence
130
Start
Security Professional Ethics
131
Start
Course Outro
E-COURSE E-Learning Instructor-led, video based E-Learning course.
USD 59
  • 07:44:24
    + Hours Of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top