Cyber Security Training Catalog – CISSP: Certified Information Systems Security Professional – 2018 Edition

Overview: This cyber security certification training series covers everything you need to know about becoming a Certified Information Systems Security Professional. Students will learn about security and risk management, asset management, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security.

The Certified Information Systems Security Professional (CISSP) demonstrates a globally recognized standard of competence which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more. The CISSP draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices.

$150.00Read more

Overview

(Duration: 3h 7m)

  1. Workbook (Pdf)
  2. Topic: Confidentiality, Integrity, and Availability
  3. Confidentiality
  4. Integrity
  5. Availability
  6. References
  7. Topic: Security Governance
  8. Security Governance Principles
  9. Security Functions to Business Goals
  10. Organizational Processes
  11. Roles and Responsibilities
  12. Security Control Frameworks
  13. Due Care / Due Diligence
  14. References
  15. Topic: Compliance Requirements
  16. Compliance Requirements
  17. Contracts, Legal, Industry Standards
  18. Privacy Requirements
  19. References
  20. Topic: Legal and Regulatory – Global
  21. Legal and Regulatory – Global
  22. Cyber Crimes and Data Breaches
  23. Intellectual Property
  24. Import / Export Controls
  25. Trans-border Data Flows
  26. Privacy
  27. References
  28. Topic: Professional Ethics
  29. Professional Ethics
  30. Topic: Security Policy, Standards, Procedures
  31. Security Policy, Standards, Procedures
  32. References
  33. Topic: Business Continuity
  34. Business Continuity
  35. Document Scope and Plan
  36. Business Impact Analysis
  37. References
  38. Topic: Personal Security Policies
  39. Personal Security Policies
  40. Candidate Screening / Hiring
  41. Employment Agreements / Polices
  42. On
  43. -boarding / Termination Process
  44. Vendor, Consultant, Contractor
  45. Compliance Policy Requirements
  46. Privacy Policy Requirements
  47. References
  48. Topic: Apply Risk Management
  49. Apply Risk Management
  50. References
  51. Topic: Threat Modeling
  52. Threat Modeling
  53. – Concepts / Methodology
  54. Threat Modeling
  55. – Categorizing Threats
  56. Threat Modeling
  57. – Generic Steps
  58. Threat Modeling
  59. – Analyzing Risk
  60. References
  61. Topic: Risk Management
  62. – Supply Chain
  63. Risk Management
  64. – Hardware, Software
  65. Risk Management
  66. – 3rd Party Evaluations
  67. Risk Management
  68. – Minimum Security
  69. References
  70. Topic: Security Awareness and Training
  71. Security Awareness and Training
  72. Methods and Techniques
  73. Periodic Content Reviews
  74. Effectiveness Evaluations
  75. References
  76. Review Quiz (Number of attempts

(Duration: 1h 24m)

  1. Workbook (Pdf)
  2. Topic: Identify and Classify
  3. Data Classification
  4. Asset Classification
  5. References
  6. Topic: Asset Ownership
  7. Asset Ownership
  8. References
  9. Topic: Protect Privacy
  10. Data Owners
  11. Data Processors
  12. Data Remanence
  13. Data Collection
  14. References
  15. Topic: Asset Retention
  16. Asset Retention
  17. Record Retention
  18. References
  19. Topic: Data Security Controls
  20. Data Security Controls
  21. Scoping and Tailoring
  22. Standards Selection
  23. Data Protection Methods
  24. References
  25. Topic: Information / Asset Handling
  26. Information / Asset Handling
  27. Failure Examples
  28. Storage Options
  29. References
  30. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h  14m)

  1. Workbook (Pdf)
  2. Topic: Physical and Logical Access
  3. Information
  4. Access Control Process
  5. Logical and Technical Access Controls
  6. Systems
  7. Devices
  8. Facilities
  9. References
  10. Topic: Manage Identification / Authentication
  11. Identity Implementation
  12. Single / Multi
  13. -factor Authentication
  14. Service Authentication
  15. Accountability
  16. Session Management
  17. Registration / Proofing Identity
  18. Federated Identity Management
  19. Common Language
  20. Credential Management Systems
  21. CyberArk
  22. References
  23. Topic: Integrate Identity as a Third
  24. -Party Service
  25. On
  26. -Premise
  27. Cloud
  28. Federated
  29. References
  30. Topic: Implement and Manage Authorization
  31. Role
  32. -Based Access
  33. Upsides / Downsides
  34. Rule
  35. -Based Access
  36. Mandatory Access
  37. Discretionary Access
  38. Attribute
  39. -based Access
  40. References
  41. Topic: Manage Identity / Access Lifecycle
  42. Account Review
  43. System Access Review
  44. Provisioning
  45. References
  46. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 2m)

  1. Workbook (Pdf)
  2. Topic: Secure Design and Network Architecture
  3. Secure Design and Network Architecture
  4. OSI Model
  5. Encapsulation / Decapsulation
  6. Physical / Data Link Layers
  7. Network Layer
  8. Transport Layer
  9. Session Layer
  10. Presentation Layer
  11. Application Layer
  12. IP Networking
  13. TCP/IP
  14. SYN / ACK / TCP
  15. IP Classes
  16. Multilayer Protocols
  17. Converged Protocols
  18. Wireless Networks
  19. Secure SSID
  20. Secure Encryption Protocols
  21. References
  22. Topic: Secure Network Components
  23. Operation of Hardware
  24. Firewalls
  25. Firewall Inspection
  26. Transmission Media
  27. Baseband / Broadband
  28. Twisted Pair
  29. Network Access Controls
  30. Network Access Controls
  31. – Concepts
  32. Endpoint Security
  33. Distribution Networks
  34. References
  35. Topic: Secure Communication Design
  36. Voice
  37. PBX Fraud
  38. Multimedia Collaboration
  39. Remote Meeting
  40. Securing Email
  41. Remote Access
  42. Remote Authentication
  43. Virtualized Networks
  44. VPN Protocols
  45. References
  46. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 14m)

  1. Workbook (Pdf)
  2. Topic: Physical and Logical Access
  3. Information
  4. Access Control Process
  5. Logical and Technical Access Controls
  6. Systems
  7. Devices
  8. Facilities
  9. References
  10. Topic: Manage Identification / Authentication
  11. Identity Implementation
  12. Single / Multi
  13. -factor Authentication
  14. Service Authentication
  15. Accountability
  16. Session Management
  17. Registration / Proofing Identity
  18. Federated Identity Management
  19. Common Language
  20. Credential Management Systems
  21. CyberArk
  22. References
  23. Topic: Integrate Identity as a Third
  24. -Party Service
  25. On
  26. -Premise
  27. Cloud
  28. Federated
  29. References
  30. Topic: Implement and Manage Authorization
  31. Role
  32. -Based Access
  33. Upsides / Downsides
  34. Rule
  35. -Based Access
  36. Mandatory Access
  37. Discretionary Access
  38. Attribute
  39. -based Access
  40. References
  41. Topic: Manage Identity / Access Lifecycle
  42. Account Review
  43. System Access Review
  44. Provisioning
  45. References
  46. Review Quiz (Number of attempts allowed: Unlimited

(Duration: 1h 14m)

  1. Workbook (Pdf)
  2. Topic: Assessment, Test, and Audit Strategies
  3. Assessment, Test, and Audit Strategies
  4. Security Assessment / Testing
  5. Security Assessments
  6. External / Third Party
  7. Auditing Standards
  8. References
  9. Topic: Security Control Testing
  10. Vulnerability Assessment
  11. Vulnerability Scans
  12. Network Vulnerability Scans
  13. Web Vulnerability Scans
  14. Penetration Testing
  15. Testing Options
  16. Log Reviews
  17. Synthetic Transaction
  18. Code Review / Testing
  19. Testing Options (cont.)
  20. Misuse Case Testing
  21. Test Coverage Analysis
  22. Interface Testing
  23. References
  24. Topic: Security Process Data
  25. Account Management
  26. Management Review
  27. Performance and Risk Indicators
  28. Backup Verification
  29. Training and Awareness
  30. References
  31. Topic: Analyze Test Output / Generate Reports
  32. Analyze Test Output / Generate Reports
  33. External Scan Report
  34. References
  35. Topic: Conduct / Facilitate Security Audit
  36. Internal Aspects
  37. External / 3rd Party Aspect
  38. References
  39. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 3h 21m)

  1. Workbook (Pdf)
  2. Topic: Investigations
  3. Evidence Collection
  4. Network / Software / Hardware Analysis
  5. Reporting and Documentation
  6. Investigative Techniques
  7. Gathering Evidence
  8. Digital Forensics
  9. Chain of Custody
  10. References
  11. Topic: Investigation Team
  12. Administrative Aspects
  13. Criminal Investigations
  14. Civil Investigations
  15. Regulatory Investigations
  16. References
  17. Topic: Logging and Monitoring Activities
  18. SIEM
  19. Deployment
  20. Continuous Monitoring
  21. Egress Monitoring
  22. Tools to Assist
  23. References
  24. Topic: Provisioning Resources
  25. Asset Inventory
  26. Asset Management
  27. Cloud
  28. -Based Management
  29. Configuration Management
  30. References
  31. Topic: Security Operations Concepts
  32. Separation of Duties
  33. Need to Know / Least Privilege
  34. Separation of Privilege
  35. Privileged Account Management
  36. Job Rotation
  37. Information Lifecycle
  38. Key Phases of Data
  39. Service Level Agreements
  40. References
  41. Topic: Protection Techniques
  42. Media Management
  43. Hardware / Software Asset Management
  44. Software
  45. References
  46. Topic: Incident Management
  47. Detection
  48. Responsive
  49. Reporting
  50. Legal / Compliance
  51. Recovery
  52. Remediation
  53. Lessons Learned
  54. References
  55. Topic: Detective / Preventative Measures
  56. Firewalls
  57. Intrusion Detection / Prevention
  58. Knowledge / Behavior-Based
  59. Network / Host-Based
  60. Whitelisting / Blacklisting
  61. Third-Party Security Services
  62. Sandboxing
  63. Honeypots/Honeynets
  64. Anti-Malware
  65. References
  66. Topic: Patch and Vulnerability Management
  67. Patch / Vulnerability Management
  68. Patch Management
  69. References
  70. Topic: Change Management Processes
  71. Change Management
  72. Security Impact Analysis
  73. References
  74. Topic: Implement Recovery Strategies
  75. Backup Storage
  76. Recovery Site Strategies
  77. Business / Functional Unit Priorities
  78. Crisis Management
  79. Multiple Processing Sites
  80. Options
  81. Cloud Computing
  82. High Availability / QoS
  83. Hard Drives / Power Sources
  84. QoS
  85. References
  86. Topic: Implement Disaster Recovery
  87. Response
  88. Personnel
  89. Communications
  90. Assessment
  91. Restoration
  92. Training and Awareness
  93. References
  94. Topic: Test Disaster Recovery
  95. Overview
  96. Read
  97. -Through Checklists
  98. Walk
  99. -Through (Table
  100. -Top)
  101. Simulation Test
  102. Parallel Test
  103. Full Interruption
  104. References
  105. Topic: Implement / Manage Physical Security
  106. Perimeter Security
  107. Fences, Gates and Lighting
  108. Security Dogs
  109. Internal Security Controls
  110. Badges / Regulatory Requirements
  111. References
  112. Topic: Personnel Safety / Security
  113. Travel
  114. Security Training and Awareness
  115. Emergency Management
  116. Duress
  117. References
  118. Review Quiz (Number of attempts allowed: Unlimited

(Duration: 1h 5m)

  1. Workbook (Pdf)
  2. Topic: Software Development Life Cycle
  3. Development Methodologies
  4. Functional Requirements / Control Specifications
  5. Design / Code Review
  6. User Acceptance Testing / Change Management
  7. Maturity Models
  8. Agile / SW
  9. -CMM
  10. Change Management
  11. Integrated Product Team
  12. References
  13. Topic: Security Controls in Development
  14. Security of Software Environments
  15. Development Security
  16. Secure Coding Configuration Management
  17. Code Repositories
  18. Best Practices
  19. References
  20. Topic: Assess Software Security Effectiveness
  21. Auditing and Logging
  22. ODBC / NoSQL
  23. Risk Analysis / Mitigation
  24. Development Methodology
  25. Tracking Progress / Repeat
  26. References
  27. Topic: Security Impact of Acquired Software
  28. Security Impact of Acquired Software
  29. OWASP Key Considerations
  30. References
  31. Topic: Secure Coding Guidelines and Standards
  32. Security Weaknesses / Vulnerabilities
  33. Reconnaissance Attacks
  34. Masquerading Attacks
  35. API Security
  36. Secure Coding Practices
  37. Testing Options
  38. References
  39. Course Closure
  40. Review Quiz (Number of attempts allowed: Unlimited)

Training Final Exam ?

Are you ready to earn your certificate of completion?

Launch The Exam

This course includes
  • about 15.38 hours on-demand video
  • 8 downloadable Pdf Workbooks
  • Unlimited time access (During Membership)
  • Access on mobile and Desktop
  • Certificate of Completion

Course Features Include:

  • Expert Lectures
    Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.

  • Certificates of Completion
    Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.

  • PowerPoint Visuals:
    Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.

  • Professional Development Activities
    Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.

  • Review Quizzes
    Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.

  • Mobile Access
    With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!