Cyber Security Training Catalog – CISSP: Certified Information Systems Security Professional – 2018 Edition
Overview: This cyber security certification training series covers everything you need to know about becoming a Certified Information Systems Security Professional. Students will learn about security and risk management, asset management, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security.
The Certified Information Systems Security Professional (CISSP) demonstrates a globally recognized standard of competence which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more. The CISSP draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices.
$150.00Read more
Overview
(Duration: 3h 7m)
- Workbook (Pdf)
- Topic: Confidentiality, Integrity, and Availability
- Confidentiality
- Integrity
- Availability
- References
- Topic: Security Governance
- Security Governance Principles
- Security Functions to Business Goals
- Organizational Processes
- Roles and Responsibilities
- Security Control Frameworks
- Due Care / Due Diligence
- References
- Topic: Compliance Requirements
- Compliance Requirements
- Contracts, Legal, Industry Standards
- Privacy Requirements
- References
- Topic: Legal and Regulatory – Global
- Legal and Regulatory – Global
- Cyber Crimes and Data Breaches
- Intellectual Property
- Import / Export Controls
- Trans-border Data Flows
- Privacy
- References
- Topic: Professional Ethics
- Professional Ethics
- Topic: Security Policy, Standards, Procedures
- Security Policy, Standards, Procedures
- References
- Topic: Business Continuity
- Business Continuity
- Document Scope and Plan
- Business Impact Analysis
- References
- Topic: Personal Security Policies
- Personal Security Policies
- Candidate Screening / Hiring
- Employment Agreements / Polices
- On
- -boarding / Termination Process
- Vendor, Consultant, Contractor
- Compliance Policy Requirements
- Privacy Policy Requirements
- References
- Topic: Apply Risk Management
- Apply Risk Management
- References
- Topic: Threat Modeling
- Threat Modeling
- – Concepts / Methodology
- Threat Modeling
- – Categorizing Threats
- Threat Modeling
- – Generic Steps
- Threat Modeling
- – Analyzing Risk
- References
- Topic: Risk Management
- – Supply Chain
- Risk Management
- – Hardware, Software
- Risk Management
- – 3rd Party Evaluations
- Risk Management
- – Minimum Security
- References
- Topic: Security Awareness and Training
- Security Awareness and Training
- Methods and Techniques
- Periodic Content Reviews
- Effectiveness Evaluations
- References
- Review Quiz (Number of attempts
(Duration: 1h 24m)
- Workbook (Pdf)
- Topic: Identify and Classify
- Data Classification
- Asset Classification
- References
- Topic: Asset Ownership
- Asset Ownership
- References
- Topic: Protect Privacy
- Data Owners
- Data Processors
- Data Remanence
- Data Collection
- References
- Topic: Asset Retention
- Asset Retention
- Record Retention
- References
- Topic: Data Security Controls
- Data Security Controls
- Scoping and Tailoring
- Standards Selection
- Data Protection Methods
- References
- Topic: Information / Asset Handling
- Information / Asset Handling
- Failure Examples
- Storage Options
- References
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 1h 14m)
- Workbook (Pdf)
- Topic: Physical and Logical Access
- Information
- Access Control Process
- Logical and Technical Access Controls
- Systems
- Devices
- Facilities
- References
- Topic: Manage Identification / Authentication
- Identity Implementation
- Single / Multi
- -factor Authentication
- Service Authentication
- Accountability
- Session Management
- Registration / Proofing Identity
- Federated Identity Management
- Common Language
- Credential Management Systems
- CyberArk
- References
- Topic: Integrate Identity as a Third
- -Party Service
- On
- -Premise
- Cloud
- Federated
- References
- Topic: Implement and Manage Authorization
- Role
- -Based Access
- Upsides / Downsides
- Rule
- -Based Access
- Mandatory Access
- Discretionary Access
- Attribute
- -based Access
- References
- Topic: Manage Identity / Access Lifecycle
- Account Review
- System Access Review
- Provisioning
- References
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 1h 2m)
- Workbook (Pdf)
- Topic: Secure Design and Network Architecture
- Secure Design and Network Architecture
- OSI Model
- Encapsulation / Decapsulation
- Physical / Data Link Layers
- Network Layer
- Transport Layer
- Session Layer
- Presentation Layer
- Application Layer
- IP Networking
- TCP/IP
- SYN / ACK / TCP
- IP Classes
- Multilayer Protocols
- Converged Protocols
- Wireless Networks
- Secure SSID
- Secure Encryption Protocols
- References
- Topic: Secure Network Components
- Operation of Hardware
- Firewalls
- Firewall Inspection
- Transmission Media
- Baseband / Broadband
- Twisted Pair
- Network Access Controls
- Network Access Controls
- – Concepts
- Endpoint Security
- Distribution Networks
- References
- Topic: Secure Communication Design
- Voice
- PBX Fraud
- Multimedia Collaboration
- Remote Meeting
- Securing Email
- Remote Access
- Remote Authentication
- Virtualized Networks
- VPN Protocols
- References
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 1h 14m)
- Workbook (Pdf)
- Topic: Physical and Logical Access
- Information
- Access Control Process
- Logical and Technical Access Controls
- Systems
- Devices
- Facilities
- References
- Topic: Manage Identification / Authentication
- Identity Implementation
- Single / Multi
- -factor Authentication
- Service Authentication
- Accountability
- Session Management
- Registration / Proofing Identity
- Federated Identity Management
- Common Language
- Credential Management Systems
- CyberArk
- References
- Topic: Integrate Identity as a Third
- -Party Service
- On
- -Premise
- Cloud
- Federated
- References
- Topic: Implement and Manage Authorization
- Role
- -Based Access
- Upsides / Downsides
- Rule
- -Based Access
- Mandatory Access
- Discretionary Access
- Attribute
- -based Access
- References
- Topic: Manage Identity / Access Lifecycle
- Account Review
- System Access Review
- Provisioning
- References
- Review Quiz (Number of attempts allowed: Unlimited
(Duration: 1h 14m)
- Workbook (Pdf)
- Topic: Assessment, Test, and Audit Strategies
- Assessment, Test, and Audit Strategies
- Security Assessment / Testing
- Security Assessments
- External / Third Party
- Auditing Standards
- References
- Topic: Security Control Testing
- Vulnerability Assessment
- Vulnerability Scans
- Network Vulnerability Scans
- Web Vulnerability Scans
- Penetration Testing
- Testing Options
- Log Reviews
- Synthetic Transaction
- Code Review / Testing
- Testing Options (cont.)
- Misuse Case Testing
- Test Coverage Analysis
- Interface Testing
- References
- Topic: Security Process Data
- Account Management
- Management Review
- Performance and Risk Indicators
- Backup Verification
- Training and Awareness
- References
- Topic: Analyze Test Output / Generate Reports
- Analyze Test Output / Generate Reports
- External Scan Report
- References
- Topic: Conduct / Facilitate Security Audit
- Internal Aspects
- External / 3rd Party Aspect
- References
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 3h 21m)
- Workbook (Pdf)
- Topic: Investigations
- Evidence Collection
- Network / Software / Hardware Analysis
- Reporting and Documentation
- Investigative Techniques
- Gathering Evidence
- Digital Forensics
- Chain of Custody
- References
- Topic: Investigation Team
- Administrative Aspects
- Criminal Investigations
- Civil Investigations
- Regulatory Investigations
- References
- Topic: Logging and Monitoring Activities
- SIEM
- Deployment
- Continuous Monitoring
- Egress Monitoring
- Tools to Assist
- References
- Topic: Provisioning Resources
- Asset Inventory
- Asset Management
- Cloud
- -Based Management
- Configuration Management
- References
- Topic: Security Operations Concepts
- Separation of Duties
- Need to Know / Least Privilege
- Separation of Privilege
- Privileged Account Management
- Job Rotation
- Information Lifecycle
- Key Phases of Data
- Service Level Agreements
- References
- Topic: Protection Techniques
- Media Management
- Hardware / Software Asset Management
- Software
- References
- Topic: Incident Management
- Detection
- Responsive
- Reporting
- Legal / Compliance
- Recovery
- Remediation
- Lessons Learned
- References
- Topic: Detective / Preventative Measures
- Firewalls
- Intrusion Detection / Prevention
- Knowledge / Behavior-Based
- Network / Host-Based
- Whitelisting / Blacklisting
- Third-Party Security Services
- Sandboxing
- Honeypots/Honeynets
- Anti-Malware
- References
- Topic: Patch and Vulnerability Management
- Patch / Vulnerability Management
- Patch Management
- References
- Topic: Change Management Processes
- Change Management
- Security Impact Analysis
- References
- Topic: Implement Recovery Strategies
- Backup Storage
- Recovery Site Strategies
- Business / Functional Unit Priorities
- Crisis Management
- Multiple Processing Sites
- Options
- Cloud Computing
- High Availability / QoS
- Hard Drives / Power Sources
- QoS
- References
- Topic: Implement Disaster Recovery
- Response
- Personnel
- Communications
- Assessment
- Restoration
- Training and Awareness
- References
- Topic: Test Disaster Recovery
- Overview
- Read
- -Through Checklists
- Walk
- -Through (Table
- -Top)
- Simulation Test
- Parallel Test
- Full Interruption
- References
- Topic: Implement / Manage Physical Security
- Perimeter Security
- Fences, Gates and Lighting
- Security Dogs
- Internal Security Controls
- Badges / Regulatory Requirements
- References
- Topic: Personnel Safety / Security
- Travel
- Security Training and Awareness
- Emergency Management
- Duress
- References
- Review Quiz (Number of attempts allowed: Unlimited
(Duration: 1h 5m)
- Workbook (Pdf)
- Topic: Software Development Life Cycle
- Development Methodologies
- Functional Requirements / Control Specifications
- Design / Code Review
- User Acceptance Testing / Change Management
- Maturity Models
- Agile / SW
- -CMM
- Change Management
- Integrated Product Team
- References
- Topic: Security Controls in Development
- Security of Software Environments
- Development Security
- Secure Coding Configuration Management
- Code Repositories
- Best Practices
- References
- Topic: Assess Software Security Effectiveness
- Auditing and Logging
- ODBC / NoSQL
- Risk Analysis / Mitigation
- Development Methodology
- Tracking Progress / Repeat
- References
- Topic: Security Impact of Acquired Software
- Security Impact of Acquired Software
- OWASP Key Considerations
- References
- Topic: Secure Coding Guidelines and Standards
- Security Weaknesses / Vulnerabilities
- Reconnaissance Attacks
- Masquerading Attacks
- API Security
- Secure Coding Practices
- Testing Options
- References
- Course Closure
- Review Quiz (Number of attempts allowed: Unlimited)
Training Final Exam ?
Are you ready to earn your certificate of completion?
Launch The Exam
- about 15.38 hours on-demand video
- 8 downloadable Pdf Workbooks
- Unlimited time access (During Membership)
- Access on mobile and Desktop
- Certificate of Completion
Course Features Include:
Expert Lectures
Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.Certificates of Completion
Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.PowerPoint Visuals:
Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.Professional Development Activities
Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.Review Quizzes
Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.Mobile Access
With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!
Trusted by Aspiring IT Professionals, Corporations and
Government agencies for more than a Decade
Get unlimited online access learn anywhere, anytime using your computer or mobile device!