Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CISSP: Certified Information Systems Security Professional 2015

EDUTAINMENT COURSE E-Learning

CISSP: Certified Information Systems Security Professional 2015

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

Certified Information Systems Security Professional (CISSP) to be the most desired certification to achieve. More than 200,000 have taken the exam, and there are more than 70,000 CISSPs worldwide. This course is updated for the latest 2015 CISSP Body of Knowledge. You'll prepare for the exam smarter and faster thanks to expert content, real-world examples, advice on passing each section of the exam, access to an online interactive learning environment, and much more.

Objectives
  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Module 1: Security and Risk Management

1.1 Introduction

1.2 CIA Triad Security Governance Part 1

1.3 CIA Triad Security Governance Part 2

1.4 Compliance Legal And Regulatory Issues Part 1

1.5 Compliance Legal And Regulatory Issues Part 2

1.6 Understanding Professional Ethics Part 1

1.7 Understanding Professional Ethics Part 2

1.8 Risk Management Part 1

1.9 Risk Management Part 2

1.10 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training Part 1

1.11 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training Part 2

Module 2: Asset Security

2.1 Asset Security Part 1

2.2 Asset Security Part 2

Module 3: Security Engineering

3.1 Engineering And Management Of Security Part 1

3.2 Engineering And Management Of Security Part 2

3.3 Engineering And Management Of Security Part 3

3.4 Engineering And Management Of Security Part 4

3.5 Engineering And Management Of Security Part 5

3.6 Engineering And Management Of Security Part 6

Module 4: Communication and Network Security

4.1 Apply Secure Design Principles To Networks Part 1

4.2 Apply Secure Design Principles To Networks Part 2

4.3 Apply Secure Design Principles To Networks Part 3

4.4 Apply Secure Design Principles To Networks Part 4

4.5 Apply Secure Design Principles To Networks Part 5

4.6 Apply Secure Design Principles To Networks Part 6

4.7 Securing Network Components Part 1

4.8 Securing Network Components Part 2

4.9 Design And Establish Secure Communication Channels Part 1

4.10 Design And Establish Secure Communication Channels Part 2

4.11 Design And Establish Secure Communication Channels Part 3

Module 5: Identity and Access Management

5.1 Controlling Access And Managing Identity Part 1

5.2 Controlling Access And Managing Identity Part 2

5.3 Controlling Access And Managing Identity Part 3

5.4 Controlling Access And Managing Identity Part 4

Module 6: Security Assessment Testing

6.1 Designing Performing And Analyzing Security Testing

Module 7: Security Operations

7.1 Foundational Concepts And Investigations Part 1

7.2 Foundational Concepts And Investigations Part 2

7.3 Incident Management And Preventative Measures Part 1

7.4 Incident Management And Preventative Measures Part 2

7.5 Disaster Recovery Process Part 1

7.6 Disaster Recovery Process Part 2

Module 8: Software Development Security

8.1 Understanding Applying And Enforcing Software Security Part 1

8.2 Understanding Applying And Enforcing Software Security Part 2

8.3 Conclusion

EDUTAINMENT COURSE E-Learning
?Interactive and entertaining talk-show style format presented by industry leading experts.
USD 59
  • 07:44:24
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months Access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top