Certified Information Systems Security Pro (CISSP)
Certified Information Systems Security Pro (CISSP)

Certified Information Systems Security Pro (CISSP)

$49
Instructor
Reviews
Rating

About this Course

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.

**NOTE: this course version addresses the new exam blueprint Effective April 15, 2015.

Course Outline

Module 1 Security and Risk Management
  •  1.1 CIA Triad Security Governance
  •  1.2 Compliance Legal And Regulatory Issues
  •  1.3 Understanding Professional Ethics
  •  1.4 Risk Management
  •  1.5 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training
Module 2 Asset Security
  •  2.1 Asset Security
Module 3 Security Engineering
  •  3.1 Engineering And Management Of Security Part1
  •  3.2 Engineering And Management Of Security Part2
  •  3.3 Engineering And Management Of Security Part3
Module 4 Communication and Network Security
  •  4.1 Apply Secure Design Principles To Networks Part1
  •  4.2 Apply Secure Design Principles To NetworksPart2
  •  4.3 Securing Network Components
  •  4.4 Design And Establish Secure Communication Channels
Module 5 Identity and Access Management
  •  5.1 Controlling Access And Managing Identity Part1
  •  5.2 Controlling Access And Managing Identity Part2

Module 6 Security Assessment Testing

  •  6.1 Designing Performing And Analyzing Security Testing
Module 7 Security Operations
  •  7.1 Foundational Concepts And Investigations
  •  7.2 Incident Management And Preventative Measures
  •  7.3 Disaster Recovery Process
Module 8 Software Development Security
  •  8.1 Understanding Applying And Enforcing Software Security Part1
  •  8.2 Understanding Applying And Enforcing Software Security Part2

Reviews

0 Rated 0 out of 0 Ratings
5 stars
4 stars
3 stars
2 stars
1 stars

slot jepang