Course description
This free course will provide you with an understanding of everything you need to know about becoming a Certified Information Systems Security Professional, and help prepare you for the Certified Information Security Professionals exam. In the first part of the course, you will go over professional ethics, security policy, standards and procedures, and you will also learn more about protecting assets and security controls. After a section dedicated to security architecture and engineering, we will cover secure network components and secure communication design.
In later modules, you will learn more about managing access to important services, assessing and testing security, and we will examine security control testing. After that, the course focuses on investigating security activity, preventing breaches and responding to breaches, which will pave the way for a foundation in protection techniques and preventative measures. Before the final assessment, a section is dedicated to software development security.
By taking this course you will learn crucial information about security in the modern age and have all of the necessary knowledge to become an Information Systems Auditor. So why wait? Start learning today and continue your professional education.
Upcoming start dates
Training content
Security and Risk Management
Description: In this module, Security and Risk Management, students will learn about Confidentiality, Integrity, and Availability. It will also go into detail on Security Governance, and Compliance Requirements. Students will learn Professional Ethics, as well as Security Policy, Standards, Procedures.The module will also cover Threat Modeling.
- Topic A: Confidentiality, Integrity, and Availability
- Topic B: Security Governance
- Topic C: Compliance Requirements
- Topic D: Legal and Regulatory - Global
- Topic E: Professional Ethics
- Topic F: Security Policy, Standards, Procedures
- Topic G: Business Continuity
- Topic H: Personal Security Policies
- Topic I: Apply Risk Management
- Topic J: Threat Modeling
- Topic K: Risk Management - Supply Chain
- Topic L: Security Awareness and Training
- Assessment: Security and Risk Management - Assessment
Asset Management
Description: In this module, Asset Management, students will learn about protecting assets. The module will cover asset ownership and asset retention. Students will also learn about protecting privacy. It will also go over data security controls. It also covers safe information handling as well as asset handling.
- Topic A: Identify and Classify
- Topic B: Asset Ownership
- Topic C: Protect Privacy
- Topic D: Asset Retention
- Topic E: Data Security Controls
- Topic F: Information / Asset Handling
- Assessment: Asset Management - Assessment
Security Architecture and Engineering
Description: In this module, Security Architecture and Engineering, students will learn about Engineering Processes and Secure Design. They will also learn about Concepts of Security Models. The module will cover Security Capabilities of Information Systems. Students will also learn about Assessing and Mitigating Vulnerabilities.
- Topic A: Engineering Processes and Secure Design
- Topic B: Concepts of Security Models
- Topic C: Controls Based on Security Requirements
- Topic D: Security Capabilities of Information Systems
- Topic E: Assess / Mitigate Vulnerabilities
- Topic F: Assess / Mitigate Vulnerabilities (Web)
- Topic G: Assess / Mitigate Vulnerabilities (Mobile)
- Topic H: Assess / Mitigate Vulnerabilities (Embedded)
- Topic I: Apply Cryptography
- Topic J: Site / Facility Security Principles
- Topic K: Site / Facility Security Controls
- Assessment: Security Architecture and Engineering - Assessment
Communication and Network Security
Description: In this module, Communication and Network Security, students will learn about Secure Design and Network Architecture. Students will also learn all about Secure Network Components. The module will go over Encapsulation as well as Decapsulation. The module will also cover Secure Communication Design.
- Topic A: Secure Design and Network Architecture
- Topic B: Secure Network Components
- Topic C: Secure Communication Design
- Assessment: Communication and Network Security - Assessment
Identity and Access Management
Description: In this module, Identity and Access Management, students will learn about managing access to important services. The module will cover Physical and Logical Access. Students will also learn about Managing Identification and Authentication. They will also learn about Managing Identity and the Access Lifecycle.
- Topic A: Physical and Logical Access
- Topic B: Manage Identification / Authentication
- Topic C: Integrate Identity as a Third-Party Service
- Topic D: Implement and Manage Authorization
- Topic E: Manage Identity / Access Lifecycle
- Assessment: Identity and Access Management - Assessment
Security Assessment and Testing
Description: In this module, Security Assessment and Testing students will learn about assessing and testing security. It will go into depth on Security Control Testing and preforming internal and external security audits. Students will also learn about audit standards when preforming these audits. The module will also cover how to Analyze Test Outputs and Generate Reports.
- Topic A: Assessment, Test, and Audit Strategies
- Topic B: Security Control Testing
- Topic C: Security Process Data
- Topic D: Analyze Test Output / Generate Reports
- Topic E: Conduct / Facilitate Security Audit
- Assessment: Security Assessment and Testing - Assessment
Security Operations
Description: In this module, Security Operations, students will learn about investigating security activity, preventing breaches and responding to breaches. Students will learn about Logging and Monitoring Activities. The module will cover Protection Techniques and Preventative Measures. It will also go over Implementing Disaster Recovery.
- Topic A: Investigations
- Topic B: Investigation Team
- Topic C: Logging and Monitoring Activities
- Topic D: Provisioning Resources
- Topic E: Security Operations Concepts
- Topic F: Protection Techniques
- Topic G: Incident Management
- Topic H: Detective / Preventative Measures
- Topic I: Patch and Vulnerability Management
- Topic J: Change Management Processes
- Topic K: Implement Recovery Strategies
- Topic L: Implement Disaster Recovery
- Topic M: Test Disaster Recovery
- Topic N: Implement / Manage Physical Security
- Topic O: Personnel Safety / Security
- Assessment: Security Operations - Assessment
Software Development Security
Description: In this module, Software Development Security, students will learn about the Software Development Life Cycle. The module will also cover Security Controls in Development. Students will also learn about the Security Impact of Acquired Software. The module also goes over Secure Coding Guidelines and Standards.
- Topic A: Software Development Life Cycle
- Topic B: Security Controls in Development
- Topic C: Assess Software Security Effectiveness
- Topic D: Security Impact of Acquired Software
- Topic E: Secure Coding Guidelines and Standards
- Assessment: Software Development Security - Assessment
Course assessment
- Assessment: Certified Information Systems Security Professional (CISSP 2019) - Final Assessment
Certification / Credits
Having completed this course, you will be able to:
- Analyze how secure a system is
- Identify potential risks to the system
- Describe Identity and Access Management
- Explain the architecture of a security system
- Recognize the software development life cycle's impact on security
- React to a security breach with disaster recovery
- Perform a proper security audit both internally and externally
Quick stats about Alison?
Providing Free Online Learning since 2007
Over 45 Million Learners across 193 Countries have studied with us
Over 5 Million people use the Alison Learning App, where you can study anywhere and anytime
Contact this provider
Alison Free Learning
Alison is the world’s largest free online empowerment platform for education and skills training, offering thousands of CPD-accredited courses and a range of impactful career development tools. It is a for-profit social enterprise dedicated to making it possible for anyone,...