…
  • Search
  • About Us
  • Packages
logo
  • Login
  • Register
  • Post FREE AD
  • Training Centres
  • Marketing Businesses
  • Ebooks
  • Car Dealerships
  • Deal Of The Week
  • Takeaways
  • Lodges
  • Opticians
  • Fashion
  • Home
  • Blog Details
  • Details
Home / Education / IT Upskill / Official Certified Information Systems Security Pro (CISSP)
fashion-sale
Sale!
  • Official Certified Information Systems Security Pro (CISSP)
  • Official Certified Information Systems Security Pro (CISSP)

Official Certified Information Systems Security Pro (CISSP)

R3,999.00 Original price was: R3,999.00.R1,500.00Current price is: R1,500.00.

Category: IT Upskill

  • Description
  • Write a Review
  • Reviews (0)

Description

Developed and maintained by the International Information Systems Security Certification Consortium (ISC)2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). This official CISSP course, developed by idleadsonline?in conjuction with (ISC)2, provides you with the knowledge and skills to pass the CISSP certification exam. After passing the certification you’ll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security.

 

Module 1: Security And Risk Management

1.1 Course And Instructor Introduction
1.2 Introduction To Security And Risk Management
1.3 Understand And Apply Concepts Of Confidentiality Integrity Availability
1.4 Apply Security Governance Principles Part 1
1.5 Apply Security Governance Principles Part 2
1.6 Compliance
1.7 Understanding Legal And Regulatory Issues That Pertain To Information Security In A Global Context
1.8 Understand Professional Ethics
1.9 Develop And Implement Documented Security Policy Standards Procedures And Guidelines
1.10 Understand Business Continuity Requirements
1.11 Contribute To Personnel Security Policies
1.12 Understand And Apply Risk Management Concepts Part 1
1.13 Understand And Apply Risk Management Concepts Part 2
1.14 Understand And Apply Risk Management Concepts Part 3
1.15 Understand And Apply Risk Management Concepts Part 4
1.16 Understand And Apply Risk Management Concepts Part 5
1.17 Understand And Apply Threat Modeling
1.18 Integrate Security Risk Considerations Into Acquisitions Strategy And Practice
1.19 Establish And Manage Security Education Training And Awareness

Module 2: Asset Security

2.1 Introduction To Asset Security
2.2 Classify Information And Supporting Assets Part 1
2.3 Classify Information And Supporting Assets Part 2
2.4 Determine And Maintain Ownership
2.5 Protect Privacy Part 1
2.6 Protect Privacy Part 2
2.7 Protect Privacy Part 3
2.8 Protect Privacy Part 4
2.9 Protect Privacy Part 5
2.10 Ensure Appropriate Retention
2.11 Determine Data Security Controls Part 1
2.12 Determine Data Security Controls Part 2
2.13 Establish Handing Requirements

Module 3: Security Engineering

3.1 Introduction To Security Engineering
3.2 Implement And Manage An Engineering Lifecycle Using Security Design Principles
3.3 Understand Fundamental Concepts Of Security Models Part 1
3.4 Understand Fundamental Concepts Of Security Models Part 2
3.5 Understand Fundamental Concepts Of Security Models Part 3
3.6 Understand Fundamental Concepts Of Security Models Part 4
3.7 Select Controls And Countermeasures Based Upon Information SystemsSecurity Standards
3.8 UnderstandTheSecurityCapabilitiesOfInformationSystems
3.9 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 1
3.10 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 2
3.11 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 3
3.12 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 4
3.13 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 5
3.14 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 6
3.15 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 7
?3.16 Assess And Mitigate Vulnerabilities In WebBased Systems Part 1
3.17 Assess And Mitigate Vulnerabilities In WebBased Systems Part 2
?3.18 Assess And Mitigate VulnerabilitiesIn Mobile Systems
?3.19 Assess And Mitigate Vulnerabilities In Embedded Devices And CyberPhysical Systems
?3.20 Apply Cryptography Part 1
?3.21 Apply Cryptography Part 2
?3.22 Apply Cryptography Part 3
?3.23 Apply Cryptography Part 4
?3.24 Apply Cryptography Part 5
?3.25 Apply Secure Principles To Site And Facility Design Part 1
?3.26 Apply Secure Principles To Site And Facility Design Part 2
?3.27 Design And Implement Facility Security

Module 4: Communication And Network Security

4.1 Introduction To Communication And Network Security
4.2 Apply Secure Design Principles To Network Architecture Part 1
4.3 Apply Secure Design Principles To Network Architecture Part 2
4.4 Apply Secure Design Principles To Network Architecture Part 3
4.5 Apply Secure Design Principles To Network Architecture Part 4
4.6 Apply Secure Design Principles To Network Architecture Part 5
4.7 Securing Network Components Part 1
4.8 Securing Network Components Part 2
4.9 Design And Establish Secure Communication Channels Part 1
4.10 Design And Establish Secure Communication Channels Part 2
4.11 Design And Establish Secure Communication Channels Part 3
4.12 Design And Establish Secure Communication Channels Part 4
4.13 Design And Establish Secure Communication Channels Part 5
4.14 Prevent Or Mitigate Network Attacks Part 1
4.15 Prevent Or Mitigate Network Attacks Part 2

Module 5: Identity And Access Management

5.1 Introduction To Identity And Access Management
5.2 Control Physical And Logical Access To Assets
5.3 Manage Identification And Authentication Of People Of Devices Part 1
5.4 Manage Identification And Authentication Of People Of Devices Part 2
5.6 Manage Identification And Authentication Of People Of Devices Part 3
5.7 Manage Identification And Authentication Of People Of Devices Part 4
5.8 Manage Identification And Authentication Of People Of Devices Part 5
5.9 Manage Identification And Authentication Of People Of Devices Part 6
5.10 Integrate Identity As A Service
5.11 Integrate ThirdParty Identity Service
5.12 Implement And Manage Authorization Mechanisms Part 1
5.13 Implement And Manage Authorization Mechanisms Part 2
5.14 Manage The Identity And Access Provisioning Life Cycle

Module 6: Security Assessment And Testing

6.1 Introduction To Security Assessment And Testing
6.2 Design And Validate Assessment Test Strategies
6.3 Conduct Security Control Testing Part 1
6.4 Conduct Security Control Testing Part 2
6.5 Conduct Security Control Testing Part 3
6.6 Conduct Security Control Testing Part 4
6.7 Conduct Security Control Testing Part 5
6.8 Coiled Security Process Data
6.9 Conduct Or Facilitate Internal And ThirdParty Audits

Module 7: Security Operations

7.1 Introduction To Security Operations
7.2 Understand And Support Investigation
7.3 Understand Requirements For Investigation Types
7.4 ConductLoggingAndMonitoringActivities
7.5 Secure The Provisioning Of Resources Through Configuration Management
7.6 Understand And Apply Foundational Security Operations Concepts
7.7 Employ Resource Protection Techniques
7.8 Conduct Incident Response
7.9 Operate And Maintain Preventative Measures
7.10 Implement And Support Patch And Vulnerability Management
7.11 Participate In And Understand Change Management Processes
?7.12 Implement Recovery Strategies Part 1
?7.13 Implement Recovery Strategies Part 2
?7.14 Implement Disaster Recovery Processes Part 1
?7.15 Implement Disaster Recovery Processes Part 2
?7.16 Test Disaster Recovery Plan
?7.17 Participate In Business Continuity Planning
?7.18 Implement And Manage Physical Security
?7.19 Participate In Personnel Safety

Module 8: Software Development Security

8.1 Introduction To Software Development Security
8.2 Understand And Apply Security In The Software Development Life Cycle
8.3 Enforce Security Controls In The Development Environment Part 1
8.4 Enforce Security Controls In The Development Environment Part 2
8.5 Enforce Security Controls In The Development Environment Part 3
8.6 Enforce Security Controls In The Development Environment Part 4
8.7 Enforce Security Controls In The Development Environment Part 5
8.8 Assess The Effectiveness Of Software Security
8.9 Assess Software Acquisition Security
8.10 Conclusion

Be the first to review “Official Certified Information Systems Security Pro (CISSP)” Cancel reply

Your email address will not be published. Required fields are marked *

Reviews

There are no reviews yet.

Related Products

  • View All Product

Certified Associate in Project Management (CAPM)®

R3,999.00 Original price was: R3,999.00.R1,500.00Current price is: R1,500.00.
Shop Now
Sale

Certified Information Systems Auditor (CISA)

R3,999.00 Original price was: R3,999.00.R1,500.00Current price is: R1,500.00.
Shop Now
Sale

Microsoft 70-480: Programming in HTML5 with JavaScript and CSS3

R3,999.00 Original price was: R3,999.00.R1,500.00Current price is: R1,500.00.
Shop Now
Sale

Cisco 200-105: ICND2 – Interconnecting Cisco Networking Devices Part 2

R3,999.00 Original price was: R3,999.00.R1,500.00Current price is: R1,500.00.
Shop Now
Sale
Site Logo

  • 135 Main Rd, Claremont, Cape Town, 7708, South Africa. 8001
  • 0877024645
  • sales@yesads.co.za
  • Mon-Fri 08:00 - 16:30
Important Links
  • Category classic
  • Privacy Policy
  • Terms & Conditions
Quick Links
  • My Account
  • Register
  • About Us

Copyright 2019 © YesAds , All Rights Reserved.

Sell

Top
Forgot Your Password ?