• 703.368.4911
  • Manassas, VA
  • info@eidos-tek.com

Certified Information Systems Security Pro (CISSP)

$99.00

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.

Save for later
Save for later
Category:

Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.

Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement. **NOTE: Effective April 15, 2015, the CISSP exam is based on a new exam blueprint.

Course Outline

Module 1: Security and Risk Management

  • ¬†Introduction
  • ¬†CIA Triad Security Governance – Part 1
  • ¬†CIA Triad Security Governance – Part 2
  • ¬†Compliance Legal And Regulatory Issues – Part 1
  • ¬†Compliance Legal And Regulatory Issues – Part 2
  • ¬†Understanding Professional Ethics – Part 1
  • ¬†Understanding Professional Ethics – Part 2
  • ¬†Risk Management – Part 1
  • ¬†Risk Management – Part 2
  • ¬†Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 1
  • ¬†Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 2

Module 2: Asset Security

  • ¬†Asset Security – Part 1
  • ¬†Asset Security – Part 2

Module 3: Security Engineering

  • ¬†Engineering And Management Of Security – Part 1
  • ¬†Engineering And Management Of Security – Part 2
  • ¬†Engineering And Management Of Security – Part 3
  • ¬†Engineering And Management Of Security – Part 4
  • ¬†Engineering And Management Of Security – Part 5
  • ¬†Engineering And Management Of Security – Part 6

Module 4: Communication and Network Security

  • ¬†Apply Secure Design Principles To Networks – Part 1
  • ¬†Apply Secure Design Principles To Networks – Part 2
  • ¬†Apply Secure Design Principles To Networks – Part 3
  • ¬†Apply Secure Design Principles To Networks – Part 4
  • ¬†Apply Secure Design Principles To Networks – Part 5
  • ¬†Apply Secure Design Principles To Networks – Part 6
  • ¬†Securing Network Components – Part 1
  • ¬†Securing Network Components – Part 2
  • ¬†Design And Establish Secure Communication Channels – Part 1
  • ¬†Design And Establish Secure Communication Channels – Part 2
  • ¬†Design And Establish Secure Communication Channels – Part 3

Module 5: Identity and Access Management

  • ¬†Controlling Access And Managing Identity – Part 1
  • ¬†Controlling Access And Managing Identity – Part 2
  • ¬†Controlling Access And Managing Identity – Part 3
  • ¬†Controlling Access And Managing Identity – Part 4

Module 6: Security Assessment Testing

  • ¬†Designing Performing And Analyzing Security Testing

Module 7: Security Operations

  • ¬†Foundational Concepts And Investigations – Part 1
  • ¬†Foundational Concepts And Investigations – Part 2
  • ¬†Incident Management And Preventative Measures – Part 1
  • ¬†Incident Management And Preventative Measures – Part 2
  • ¬†Disaster Recovery Process – Part 1
  • ¬†Disaster Recovery Process – Part 2

Module 7: Security Operations

  • ¬†Understanding Applying And Enforcing Software Security – Part 1
  • ¬†Understanding Applying And Enforcing Software Security – Part 2
  • ¬†Conclusion

Reviews

There are no reviews yet.

Be the first to review “Certified Information Systems Security Pro (CISSP)”

Your email address will not be published. Required fields are marked *