Certified Information Systems Security Pro (CISSP) 2015

£499.00 exc VAT
Qty

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, deeming CISSP as the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement. **NOTE: Effective April 15, 2015, the CISSP exam is based on a new exam blueprint.

Course Content

Introduction

Module 1 Security and Risk Management
1.1 CIA Triad Security Governance
1.2 Compliance Legal And Regulatory Issues
1.3 Understanding Professional Ethics
1.4 Risk Management
1.5 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training

Module 2 Asset Security
2.1 Asset Security

Module 3 Security Engineering
3.1 Engineering And Management Of Security Part 1
3.2 Engineering And Management Of Security Part 2
3.3 Engineering And Management Of Security Part 3

Module 4 Communication and Network Security
4.1 Apply Secure Design Principles To Networks Part 1
4.2 Apply Secure Design Principles To Networks Part 2
4.3 Securing Network Components
4.4 Design And Establish Secure Communication Channels

Module 5 Identity and Access Management
5.1 Controlling Access And Managing Identity Part 1
5.2 Controlling Access And Managing Identity Part 2

Module 6 Security Assessment Testing
6.1 Designing Performing And Analyzing Security Testing

Module 7 Security Operations
7.1 Foundational Concepts And Investigations
7.2 Incident Management And Preventative Measures
7.3 Disaster Recovery Process

Module 8 Software Development Security
8.1 Understanding Applying And Enforcing Software Security Part 1
8.2 Understanding Applying And Enforcing Software Security Part 2

Summary

People who bought this course also bought