Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.
Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement. **NOTE: Effective April 15, 2015, the CISSP exam is based on a new exam blueprint.
Course Outline
Module 1: Security and Risk Management
- Introduction
- CIA Triad Security Governance – Part 1
- CIA Triad Security Governance – Part 2
- Compliance Legal And Regulatory Issues – Part 1
- Compliance Legal And Regulatory Issues – Part 2
- Understanding Professional Ethics – Part 1
- Understanding Professional Ethics – Part 2
- Risk Management – Part 1
- Risk Management – Part 2
- Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 1
- Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 2
Module 2: Asset Security
- Asset Security – Part 1
- Asset Security – Part 2
Module 3: Security Engineering
- Engineering And Management Of Security – Part 1
- Engineering And Management Of Security – Part 2
- Engineering And Management Of Security – Part 3
- Engineering And Management Of Security – Part 4
- Engineering And Management Of Security – Part 5
- Engineering And Management Of Security – Part 6
Module 4: Communication and Network Security
- Apply Secure Design Principles To Networks – Part 1
- Apply Secure Design Principles To Networks – Part 2
- Apply Secure Design Principles To Networks – Part 3
- Apply Secure Design Principles To Networks – Part 4
- Apply Secure Design Principles To Networks – Part 5
- Apply Secure Design Principles To Networks – Part 6
- Securing Network Components – Part 1
- Securing Network Components – Part 2
- Design And Establish Secure Communication Channels – Part 1
- Design And Establish Secure Communication Channels – Part 2
- Design And Establish Secure Communication Channels – Part 3
Module 5: Identity and Access Management
- Controlling Access And Managing Identity – Part 1
- Controlling Access And Managing Identity – Part 2
- Controlling Access And Managing Identity – Part 3
- Controlling Access And Managing Identity – Part 4
Module 6: Security Assessment Testing
- Designing Performing And Analyzing Security Testing
Module 7: Security Operations
- Foundational Concepts And Investigations – Part 1
- Foundational Concepts And Investigations – Part 2
- Incident Management And Preventative Measures – Part 1
- Incident Management And Preventative Measures – Part 2
- Disaster Recovery Process – Part 1
- Disaster Recovery Process – Part 2
Module 7: Security Operations
- Understanding Applying And Enforcing Software Security – Part 1
- Understanding Applying And Enforcing Software Security – Part 2
- Conclusion
Reviews
There are no reviews yet.