Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

courses popup callback

EDUTAINMENT COURSE:

Certified Information Systems Security Professional (CISSP) - DEEP DIVE

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview
The CISSP:  Certified Information Systems Security Professional Certification certification training package covers topics such as Access Control Systems,  Cryptography,  and Security Management Practices,  teaching students the eight domains of information system security knowledge.  

Earning the CISSP proves you have what it takes to effectively design,  implement and manage a best-in-class cybersecurity program.  With a CISSP,  you validate your expertise and become an (ISC)² member,  unlocking a broad array of exclusive resources,  educational tools,  and peer-to-peer networking opportunities.
Objectives
  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security
Prerequisites
Understanding and good knowledge base of Information Security Principles, Concepts and Best Practices.
Target Audience
  • Chief Information Security Officer
  • Chief Information Officer
  • Director of Security
  • IT Director/Manager
  • Security Systems Engineer
  • Security Analyst
  • Security Manager
  • Security Auditor
  • Security Architect
  • Security Consultant
  • Network Architect

 
Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you will watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. SECURITY AND RISK MANAGEMENT
1
Start
Overview
2
Start
Confidentiality, Integrity, Availability (CIA)
3
Start
Confidentiality, Integrity, Availability (CIA) Pt2
4
Start
Evaluate, Apply Security Governance Principles
5
Start
Evaluate, Apply Security Goverance Principles Pt2
6
Start
Determine Compliance Requirements
7
Start
Determine Compliance Requirements Part 2
8
Start
Determine Compliance Requirements Part 3
9
Start
Understand Legal And Regulatory Issues
10
Start
Understand Legal And Regulatory Issues Part 2
11
Start
Understand, Adhere To And Promote Ethics
12
Start
Policy, Standards, Procedures And Guidelines
13
Start
Understand Business Continuity Requirements
14
Start
Understand Business Continuity Requirements Part 2
15
Start
Understand Business Continuity Requirements Part 3
16
Start
Personnel, Security Policies And Procedures
17
Start
Understand/Apply Risk Management Concepts
18
Start
Understand/Apply Risk Management Concepts Part 2
19
Start
Understand/Apply Risk Management Concepts Part 3
20
Start
Understand/Apply Risk Management Concepts Part 4
21
Start
Understand/Apply Risk Management Concepts Part 5
22
Start
Understanding/Apply Threat Modeling Concepts
23
Start
Apply Risk Management To The Supply Chain
24
Start
Security Awareness/Education And Training
25
Start
Security And Risk Management - Key Points
26
Start
CIA Deep Dive
27
Start
Organizational Roles And Responsibilities
28
Start
Risk Terminology And Concepts
  1. ASSET SECURITY
29
Start
Identify And Classify Information And Assets
30
Start
Determine And Maintain Information/Asset Ownership
31
Start
Protect Privacy
32
Start
Protect Privacy Part 2
33
Start
Ensure Appropriate Asset Retention
34
Start
Determine Data Security Controls
35
Start
Determine Data Security Controls Part 2
36
Start
Determine Data Security Controls Part 3
37
Start
Establish Asset Handling Requirements
38
Start
Asset Security - Key Points
  1. SECURITY ARCHITECTURE AND ENGINEERING
39
Start
Implement And Manage Engineering Processes
40
Start
Fundamental Concepts Of Systems And Security
41
Start
Fundamental Concepts Of Systems And Security Pt.2
42
Start
Fundamental Concepts Of Systems And Security Pt.3
43
Start
Fundamental Concepts Of Systems And Security Pt.4
44
Start
Fundamental Concepts Of Systems And Security Pt.5
45
Start
Controls Based On Security Requirements
46
Start
Controls Based On Security Requirements Part 2
47
Start
Vulnerabilities Of Security Architecture
48
Start
Vulnerabilities Of Security Architecture Part 2
49
Start
Vulnerabilities Of Security Architecture Part 3
50
Start
Vulnerabilities Of Security Architectures Part 4
51
Start
Vulnerabilities In Web-Based Systems
52
Start
Vulnerabilities In Web-Based Systems Part 2
53
Start
Vulnerabilities In Mobile Systems
54
Start
Vulnerabilities In Embedded Devices
55
Start
Apply Cryptography
56
Start
Apply Cryptography Part 2
57
Start
Apply Cryptography Part 3
58
Start
Apply Cryptography Part 4
59
Start
Apply Cryptography Part 5
60
Start
Apply Cryptography Part 6
61
Start
Apply Cryptography Part 7
62
Start
Apply Cryptography Part 8
63
Start
Apply Cryptography Part 9
64
Start
Apply Cryptography Part 10
65
Start
Apply Cryptography Part 11
66
Start
Apply Cryptography Part 12
67
Start
Apply Cryptography Part 13
68
Start
Site/Facility Design And Security
69
Start
Site/Facility Design And Security Part 2
70
Start
Site/Facility Design And Security Part 3
71
Start
Site/Facility Design And Security Part 4
72
Start
Security Architecture And Engineering - Key Points
  1. COMMUNICATION AND NETWORK SECURITY
72
Start
Secure Design Principles In Networks
73
Start
Secure Design Principles In Networks Part 2
74
Start
Secure Design Principles In Networks Part 3
75
Start
Secure Design Principles In Networks Part 4
76
Start
Secure Design Principles In Networks Part 5
77
Start
Secure Design Principles In Networks Part 6
78
Start
Secure Design Principles In Networks Part 7
79
Start
Secure Design Principles In Networks Part 8
80
Start
Secure Design Principles In Networks Part 9
81
Start
Secure Design Principles In Networks Part 10
82
Start
Secure Design Principles In Networks Part 11
83
Start
Secure Design Principles In Networks Part 12
84
Start
Secure Network Components
85
Start
Secure Network Components Part 2
86
Start
Secure Network Components Part 3
87
Start
Secure Network Components Part 4
88
Start
Secure Network Components Part 5
89
Start
Implement Secure Communication Channels
90
Start
Implement Secure Communication Channels Part 2
91
Start
Implement Secure Communication Channels Part 3
92
Start
Implement Secure Communication Channels Part 4
93
Start
Implement Secure Communication Channels Part 5
94
Start
Implement Secure Communication Channels Part 6
95
Start
Communication And Network Security - Key Points
  1. IDENTITY AND ACCESS MANAGEMENT (IAM)
96
Start
Control Physical And Logical Access To Assets
97
Start
Control Physical And Logical Access To Assets Pt 2
98
Start
Manage Identification And Authentication
99
Start
Manage Identification And Authentication Part 2
100
Start
Manage Identification And Authentication Part 3
101
Start
Integrate Identity As A Third-Party Service
102
Start
Implement/Manage Authorization Mechanisms
103
Start
Implement/Manage Authorization Mechanisms Pt.2
104
Start
Manage Identity And Access Provisioning Lifecycle
105
Start
Access Control Attacks
106
Start
Access Control Attacks Part 2
107
Start
Identity And Access Management - Key Points
  1. SECURITY ASSESSMENT AND TESTING
108
Start
Assessment, Test And Audit
109
Start
Assessment, Test And Audit Part 2
110
Start
Conduct Security Control Testing
111
Start
Conduct Security Control Testing Part 2
112
Start
Conduct Security Control Testing Part 3
113
Start
Collect Security Process Data
114
Start
Security Assessment And Testing - Key Points
  1. SECURITY OPERATIONS
115
Start
Understand And Support Investigations
116
Start
Conduct Logging And Monitoring Activities
117
Start
Provisioning And Protecting Resources
118
Start
Provisioning And Protecting Resources Part 2
119
Start
Apply Foundational Security Operation Concepts
120
Start
Conduct Incident Management
121
Start
Detective And Preventative Measures
122
Start
Detective And Preventative Measures Part 2
123
Start
Patch And Vulnerability Management
124
Start
Understand Change Management
125
Start
Implement Recovery Strategies
126
Start
Implement Recovery Strategies Part 2
127
Start
Implement Recovery Strategies Part 3
128
Start
Implement Recovery Strategies Part 4
129
Start
Implement Recovery Strategies Part 5
130
Start
Implement And Test BCDR
131
Start
Implement And Test BCDR Part 2
132
Start
Implement And Test BCDR Part 3
133
Start
Implement And Manage Physical Security
134
Start
Implement And Manage Physical Security Part 2
135
Start
Personnel Safety And Security Concerns
136
Start
Security Operations - Key Points
  1. SOFTWARE DEVELOPMENT SECURITY
137
Start
Security In The SDLC
138
Start
Security In The SDLC Part 2
139
Start
Security In The SDLC Part 3
140
Start
Security In The SDLC Part 4
141
Start
Security In The SDLC Part 5
142
Start
Security In The SDLC Part 6
143
Start
Security Controls In Dev Environments
144
Start
Security Controls In Dev Environments Part 2
145
Start
Security Controls In Dev Environments Part 3
146
Start
Security Controls In Dev Environments Part 4
147
Start
Security Controls In Dev Environments Part 5
148
Start
Security Controls In Dev Environments Part 6
149
Start
Security Controls In Dev Environments Part 7
150
Start
Security Controls In Dev Environments Part 8
151
Start
Security Controls In Dev Environments Part 9
152
Start
Assess Effectiveness Of Software Security
153
Start
Assess Security Impact Of Acquired Software
154
Start
Secure Coding Guidelines And Standards
155
Start
Databases And Data Warehouses
156
Start
Databases And Data Warehouses Part 2
157
Start
Types Of Storage
158
Start
Knowledge-Based Systems
159
Start
Software Development Security - Key Points
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
  • 81:14:00 Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top