Show findcourses.com as: Mobile

Certified Information Systems Security Professional (CISSP)

ITProTV, an ACI Learning Company
Training overview
Corporate / Group Training
E-learning
82 hours
From 29 USD
Start dates
Online
29 USD
Start anytime

Course description

The Certified Information Systems Security Professional (CISSP) certification is the gold standard in the IT Security field. Security professionals that have achieved their CISSP designation are regarded as some of the most talented and knowledgeable people in their field. The certification demonstrates that the holder has been working in IT Security for over five years, has a broad range of knowledge in ten domains related to creating, supporting and maintaining a secure IT infrastructure and can implement things like risk management and risk identification.

Training content

  • SECURITY AND RISK MANAGEMENT
    • Overview
    • Confidentiality, Integrity, Availability (CIA)
    • Confidentiality, Integrity, Availability (CIA) Pt2
    • Evaluate, Apply Security Governance Principles
    • Evaluate, Apply Security Goverance Principles Pt2
    • Determine Compliance Requirements
    • Determine Compliance Requirements Part 2
    • Determine Compliance Requirements Part 3
    • Understand Legal And Regulatory Issues
    • Understand Legal And Regulatory Issues Part 2
    • Understand, Adhere To And Promote Ethics
    • Policy, Standards, Procedures And Guidelines
    • Understand Business Continuity Requirements
    • Understand Business Continuity Requirements Part 2
    • Understand Business Continuity Requirements Part 3
    • Personnel, Security Policies And Procedures
    • Understand/Apply Risk Management Concepts
    • Understand/Apply Risk Management Concepts Part 2
    • Understand/Apply Risk Management Concepts Part 3
    • Understand/Apply Risk Management Concepts Part 4
    • Understand/Apply Risk Management Concepts Part 5
    • Understanding/Apply Threat Modeling Concepts
    • Apply Risk Management To The Supply Chain
    • Security Awareness/Education And Training
    • Security And Risk Management - Key Points
    • CIA Deep Dive
    • Organizational Roles And Responsibilities
    • Risk Terminology And Concepts
  • ASSET SECURITY
    • Identify And Classify Information And Assets
    • Determine And Maintain Information/Asset Ownership
    • Protect Privacy
    • Protect Privacy Part 2
    • Ensure Appropriate Asset Retention
    • Determine Data Security Controls
    • Determine Data Security Controls Part 2
    • Determine Data Security Controls Part 3
    • Establish Asset Handling Requirements
    • Asset Security - Key Points
  • SECURITY ARCHITECTURE AND ENGINEERING
    • Implement And Manage Engineering Processes
    • Fundamental Concepts Of Systems And Security
    • Fundamental Concepts Of Systems And Security Pt.2
    • Fundamental Concepts Of Systems And Security Pt.3
    • Fundamental Concepts Of Systems And Security Pt.4
    • Fundamental Concepts Of Systems And Security Pt.5
    • Controls Based On Security Requirements
    • Controls Based On Security Requirements Part 2
    • Vulnerabilities Of Security Architecture
    • Vulnerabilities Of Security Architecture Part 2
    • Vulnerabilities Of Security Architecture Part 3
    • Vulnerabilities Of Security Architectures Part 4
    • Vulnerabilities In Web-Based Systems
    • Vulnerabilities In Web-Based Systems Part 2
    • Vulnerabilities In Mobile Systems
    • Vulnerabilities In Embedded Devices
    • Apply Cryptography
    • Apply Cryptography Part 2
    • Apply Cryptography Part 3
    • Apply Cryptography Part 4
    • Apply Cryptography Part 5
    • Apply Cryptography Part 6
    • Apply Cryptography Part 7
    • Apply Cryptography Part 8
    • Apply Cryptography Part 9
    • Apply Cryptography Part 10
    • Apply Cryptography Part 11
    • Apply Cryptography Part 12
    • Apply Cryptography Part 13
    • Site/Facility Design And Security
    • Site/Facility Design And Security Part 2
    • Site/Facility Design And Security Part 3
    • Site/Facility Design And Security Part 4
    • Security Architecture And Engineering - Key Points
  • COMMUNICATION AND NETWORK SECURITY
    • Secure Design Principles In Networks
    • Secure Design Principles In Networks Part 2
    • Secure Design Principles In Networks Part 3
    • Secure Design Principles In Networks Part 4
    • Secure Design Principles In Networks Part 5
    • Secure Design Principles In Networks Part 6
    • Secure Design Principles In Networks Part 7
    • Secure Design Principles In Networks Part 8
    • Secure Design Principles In Networks Part 9
    • Secure Design Principles In Networks Part 10
    • Secure Design Principles In Networks Part 11
    • Secure Design Principles In Networks Part 12
    • Secure Network Components
    • Secure Network Components Part 2
    • Secure Network Components Part 3
    • Secure Network Components Part 4
    • Secure Network Components Part 5
    • Implement Secure Communication Channels
    • Implement Secure Communication Channels Part 2
    • Implement Secure Communication Channels Part 3
    • Implement Secure Communication Channels Part 4
    • Implement Secure Communication Channels Part 5
    • Implement Secure Communication Channels Part 6
    • Communication And Network Security - Key Points
  • IDENTITY AND ACCESS MANAGEMENT (IAM)
    • Control Physical And Logical Access To Assets
    • Control Physical And Logical Access To Assets Pt 2
    • Manage Identification And Authentication
    • Manage Identification And Authentication Part 2
    • Manage Identification And Authentication Part 3
    • Integrate Identity As A Third-Party Service
    • Implement/Manage Authorization Mechanisms
    • Implement/Manage Authorization Mechanisms Pt.2
    • Manage Identity And Access Provisioning Lifecycle
    • Access Control Attacks
    • Access Control Attacks Part 2
    • Identity And Access Management - Key Points
  • SECURITY ASSESSMENT AND TESTING
    • Assessment, Test And Audit
    • Assessment, Test And Audit Part 2
    • Conduct Security Control Testing
    • Conduct Security Control Testing Part 2
    • Conduct Security Control Testing Part 3
    • Collect Security Process Data
    • Security Assessment And Testing - Key Points
  • SECURITY OPERATIONS
    • Understand And Support Investigations
    • Conduct Logging And Monitoring Activities
    • Provisioning And Protecting Resources
    • Provisioning And Protecting Resources Part 2
    • Apply Foundational Security Operation Concepts
    • Conduct Incident Management
    • Detective And Preventative Measures
    • Detective And Preventative Measures Part 2
    • Patch And Vulnerability Management
    • Understand Change Management
    • Implement Recovery Strategies
    • Implement Recovery Strategies Part 2
    • Implement Recovery Strategies Part 3
    • Implement Recovery Strategies Part 4
    • Implement Recovery Strategies Part 5
    • Implement And Test BCDR
    • Implement And Test BCDR Part 2
    • Implement And Test BCDR Part 3
    • Implement And Manage Physical Security
    • Implement And Manage Physical Security Part 2
    • Personnel Safety And Security Concerns
    • Security Operations - Key Points
  • SOFTWARE DEVELOPMENT SECURITY
    • Security In The SDLC
    • Security In The SDLC Part 2
    • Security In The SDLC Part 3
    • Security In The SDLC Part 4
    • Security In The SDLC Part 5
    • Security In The SDLC Part 6
    • Security Controls In Dev Environments
    • Security Controls In Dev Environments Part 2
    • Security Controls In Dev Environments Part 3
    • Security Controls In Dev Environments Part 4
    • Security Controls In Dev Environments Part 5
    • Security Controls In Dev Environments Part 6
    • Security Controls In Dev Environments Part 7
    • Security Controls In Dev Environments Part 8
    • Security Controls In Dev Environments Part 9
    • Assess Effectiveness Of Software Security
    • Assess Security Impact Of Acquired Software
    • Secure Coding Guidelines And Standards
    • Databases And Data Warehouses
    • Databases And Data Warehouses Part 2
    • Types Of Storage
    • Knowledge-Based Systems
    • Software Development Security - Key Points

Costs

$29/month or $299/year for access to all courses on the ITProTV platform.

Why choose ITProTV?

ITProTv is home to 'binge-worthy' IT learning for IT pros in every stage of their career

Choose from 5,800 hours of courses, all online and on-demand

Join an online community of more than 220,000 IT professionals

About ITProTV

ITProTV, an ACI Learning Company

ITProTV is an IT skills development platform addressing the global IT skills gap by providing online training for IT professionals in every stage of their careers. With training that’s more like a talk show, IT pros watch more and learn...


Read more and show all training delivered by this supplier

Contact this provider

Fill out your details to find out more about Certified Information Systems Security Professional (CISSP).

  Contact the provider

  Get more information

  Register your interest

Contact info

ITProTV, an ACI Learning Company

7525 NW 4th Blvd.
32607 Gainesville FL

 Show phone number

Contact provider

Have a question about this course? Fill out this form and the provider will get in touch with you shortly

Training reviews

No reviews available

Need help with your search?

findcourses.com offers a free consultancy service to help compare training for you and your team

Request a free quote

Request a free training quote