CISSP: Certified Information Systems Security Professional 2015
The CISSP: Certified Information Systems Security Professional Certification certification training package from covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge.
The new eight domains are:
read moreModule 1: Security and Risk Management
1.1 Introduction
1.2 CIA Triad Security Governance Part 1
1.3 CIA Triad Security Governance Part 2
1.4 Compliance Legal And Regulatory Issues Part 1
1.5 Compliance Legal And Regulatory Issues Part 2
1.6 Understanding Professional Ethics Part 1
1.7 Understanding Professional Ethics Part 2
1.8 Risk Management Part 1
1.9 Risk Management Part 2
1.10 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training Part 1
1.11 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training Part 2
Module 2: Asset Security
2.1 Asset Security Part 1
2.2 Asset Security Part 2
Module 3: Security Engineering
3.1 Engineering And Management Of Security Part 1
3.2 Engineering And Management Of Security Part 2
3.3 Engineering And Management Of Security Part 3
3.4 Engineering And Management Of Security Part 4
3.5 Engineering And Management Of Security Part 5
3.6 Engineering And Management Of Security Part 6
Module 4: Communication and Network Security
4.1 Apply Secure Design Principles To Networks Part 1
4.2 Apply Secure Design Principles To Networks Part 2
4.3 Apply Secure Design Principles To Networks Part 3
4.4 Apply Secure Design Principles To Networks Part 4
4.5 Apply Secure Design Principles To Networks Part 5
4.6 Apply Secure Design Principles To Networks Part 6
4.7 Securing Network Components Part 1
4.8 Securing Network Components Part 2
4.9 Design And Establish Secure Communication Channels Part 1
4.10 Design And Establish Secure Communication Channels Part 2
4.11 Design And Establish Secure Communication Channels Part 3
Module 5: Identity and Access Management
5.1 Controlling Access And Managing Identity Part 1
5.2 Controlling Access And Managing Identity Part 2
5.3 Controlling Access And Managing Identity Part 3
5.4 Controlling Access And Managing Identity Part 4
Module 6: Security Assessment Testing
6.1 Designing Performing And Analyzing Security Testing
Module 7: Security Operations
7.1 Foundational Concepts And Investigations Part 1
7.2 Foundational Concepts And Investigations Part 2
7.3 Incident Management And Preventative Measures Part 1
7.4 Incident Management And Preventative Measures Part 2
7.5 Disaster Recovery Process Part 1
7.6 Disaster Recovery Process Part 2
Module 8: Software Development Security
8.1 Understanding Applying And Enforcing Software Security Part 1
8.2 Understanding Applying And Enforcing Software Security Part 2
8.3 Conclusion
this is test comment by superadmin
by
Teacher seems like a nice guy, but this course is basically a talking head reading slides straight out of a textbook with seemingly no real world applications.
by David Moore
Despite my 100mbps connection, Ryzend Threadripper and 64GB of memory, I cannot watch the videos. They stop every 30 to 50 seconds. Really upset.
Add New Discussion