Existing User Login

New User? Create An Account

Request new password

We Are All About You

XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.

This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

courses popup callback

E-COURSE:

CISSP : Certified Information Systems Security Professional 2015

Instructor-led video course with presentations, workbooks, games, flashcards and quizzes.
Overview

Certified Information Systems Security Professional (CISSP) to be the most desired certification to achieve. More than 200,000 have taken the exam, and there are more than 70,000 CISSPs worldwide. This course is updated for the latest 2015 CISSP Body of Knowledge. You'll prepare for the exam smarter and faster thanks to expert content, real-world examples, advice on passing each section of the exam, access to an online interactive learning environment, and much more.

Objectives
  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Module 1: Security and Risk Management

1.1 Introduction

1.2 CIA Triad Security Governance Part 1

1.3 CIA Triad Security Governance Part 2

1.4 Compliance Legal And Regulatory Issues Part 1

1.5 Compliance Legal And Regulatory Issues Part 2

1.6 Understanding Professional Ethics Part 1

1.7 Understanding Professional Ethics Part 2

1.8 Risk Management Part 1

1.9 Risk Management Part 2

1.10 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training Part 1

1.11 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training Part 2

Module 2: Asset Security

2.1 Asset Security Part 1

2.2 Asset Security Part 2

Module 3: Security Engineering

3.1 Engineering And Management Of Security Part 1

3.2 Engineering And Management Of Security Part 2

3.3 Engineering And Management Of Security Part 3

3.4 Engineering And Management Of Security Part 4

3.5 Engineering And Management Of Security Part 5

3.6 Engineering And Management Of Security Part 6

Module 4: Communication and Network Security

4.1 Apply Secure Design Principles To Networks Part 1

4.2 Apply Secure Design Principles To Networks Part 2

4.3 Apply Secure Design Principles To Networks Part 3

4.4 Apply Secure Design Principles To Networks Part 4

4.5 Apply Secure Design Principles To Networks Part 5

4.6 Apply Secure Design Principles To Networks Part 6

4.7 Securing Network Components Part 1

4.8 Securing Network Components Part 2

4.9 Design And Establish Secure Communication Channels Part 1

4.10 Design And Establish Secure Communication Channels Part 2

4.11 Design And Establish Secure Communication Channels Part 3

Module 5: Identity and Access Management

5.1 Controlling Access And Managing Identity Part 1

5.2 Controlling Access And Managing Identity Part 2

5.3 Controlling Access And Managing Identity Part 3

5.4 Controlling Access And Managing Identity Part 4

Module 6: Security Assessment Testing

6.1 Designing Performing And Analyzing Security Testing

Module 7: Security Operations

7.1 Foundational Concepts And Investigations Part 1

7.2 Foundational Concepts And Investigations Part 2

7.3 Incident Management And Preventative Measures Part 1

7.4 Incident Management And Preventative Measures Part 2

7.5 Disaster Recovery Process Part 1

7.6 Disaster Recovery Process Part 2

Module 8: Software Development Security

8.1 Understanding Applying And Enforcing Software Security Part 1

8.2 Understanding Applying And Enforcing Software Security Part 2

8.3 Conclusion

E-COURSE Expert-led video course with presentations, workbooks, quizzes, games and flashcards.
  • 07:44:24+ Hours Of learning
  • Includes video, presentations, workbooks, quizzes, flashcards & games
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top