Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

Accelerated CISSP (2018)

EDUTAINMENT COURSE

Accelerated CISSP (2018)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

The Certified Information Systems Security Professional (CISSP) certification is the gold standard in the IT Security field.  Security professionals that have achieved their CISSP designation are regarded as some of the most talented and knowledgeable people in their field.  The certification demonstrates that the holder has been working in IT Security for over five years,  has a broad range of knowledge in ten domains related to creating,  supporting and maintaining a secure IT infrastructure and can implement things like risk management and risk identification.

Objectives
  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security
Prerequisites
  • An approved credential from (ISC)2’s experience waiver list
Target Audience

Experienced IT security-related practitioners,  auditors,  consultants,  investigators or instructors,  including network or security analysts and engineers,  network administrators,  information security specialists and risk management professionals,  who wish to advance their current computer security careers

Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. SECURITY AND RISK MANAGEMENT
1
Start
Overview
2
Start
Security and Risk Management
3
Start
Security and Risk Management Part 2
4
Start
Security and Risk Management Part 3
5
Start
Security and Risk Management Part 4
6
Start
Security and Risk Management Part 5
7
Start
Security and Risk Management Part 6
8
Start
Security and Risk Management - Key Points
  1. ASSET SECURITY
9
Start
Asset Security
10
Start
Asset Security Part 2
11
Start
Asset Security - Key Points
  1. SECURITY ARCHITECTURE AND ENGINEERING
12
Start
Security Architecture and Engineering
13
Start
Security Architecture and Engineering Part 2
14
Start
Security Architecture and Engineering Part 3
15
Start
Security Architecture and Engineering Part 4
16
Start
Security Architecture and Engineering Part 5
17
Start
Security Architecture and Engineering Part 6
18
Start
Security Architecture and Engineering Part 7
19
Start
Security Architecture and Engineering Part 8
20
Start
Security Architecture and Engineering Part 9
21
Start
Security Architecture and Engineering Part 10
22
Start
Security Architecture and Engineering Part 11
23
Start
Security Architecture and Engineering Part 12
24
Start
Security Architecture and Engineering Part 13
25
Start
Security Architecture and Engineering Part 14
26
Start
Security Architecture and Engineering Part 15
27
Start
Security Architecture and Engineering Part 16
28
Start
Security Architecture and Engineering Part 17
29
Start
Security Architecture, Engineering Key Points
  1. COMMUNICATION AND NETWORK SECURITY
30
Start
Communication and Network Security
31
Start
Communication and Network Security Part 2
32
Start
Communication and Network Security Part 3
33
Start
Communication and Network Security Part 4
34
Start
Communication and Network Security Part 5
35
Start
Communication and Network Security Part 6
36
Start
Communication and Network Security Part 7
38
Start
Communication and Network Security Part 8
39
Start
Communication and Network Security Part 9
40
Start
Communication and Network Security - Key Points
  1. IDENTITY AND ACCESS MANAGEMENT (IAM)
41
Start
Identity and Access Management (IAM)
42
Start
Identity and Access Management (IAM) Part 2
43
Start
Identity and Access Management (IAM) Part 3
44
Start
Identity and Access Management (IAM) Part 4
45
Start
Identity and Access Management (IAM) Part 5
46
Start
Identity and Access Management (IAM) - Key Points
  1. SECURITY ASSESSMENT AND TESTING
47
Start
Security Assessment and Testing
48
Start
Security Assessment and Testing Part 2
49
Start
Security Assessment and Testing Part 3
50
Start
Security Assessment and Testing Part 4
51
Start
Security Assessment and Testing - Key Points
  1. SECURITY OPERATIONS
52
Start
Security Operations
53
Start
Security Operations Part 2
54
Start
Security Operations Part 3
55
Start
Security Operations Part 4
56
Start
Security Operations Part 5
57
Start
Security Operations Part 6
58
Start
Security Operations Part 7
59
Start
Security Operations Part 8
60
Start
Security Operations Part 9
61
Start
Security Operations Part 10
62
Start
Security Operations Part 11
63
Start
Security Operations Part 12
64
Start
Security Operations Part 13
65
Start
Security Operations - Key Points
  1. SOFTWARE DEVELOPMENT SECURITY
66
Start
Software Development Security
67
Start
Software Development Security Part 2
68
Start
Software Development Security Part 3
69
Start
Software Development Security Part 4
70
Start
Software Development Security Part 5
71
Start
Software Development Security Part 6
72
Start
Software Development Security Part 7
73
Start
Software Development Security - Key Points
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
USD 59
  • 33:13:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months Access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top