Description

Overview

About this Course

  • 33:12:00 Hours
  • 12 Months Access
  • Presented by highly qualified, industry leading experts

The Certified Information Systems Security Professional (CISSP) certification is the gold standard in the IT Security field. Security professionals that have achieved their CISSP designation are regarded as some of the most talented and knowledgeable people in their field. The certification demonstrates that the holder has been working in IT Security for over five years, has a broad range of knowledge in ten domains related to creating, supporting and maintaining a secure IT infrastructure and can implement things like risk management and risk identification.

Course Details

Objectives

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Audience

Experienced IT security-related practitioners, auditors, consultants, investigators or instructors, including network or security analysts and engineers, network administrators, information security specialists and risk management professionals, who wish to advance their current computer security careers

Prerequisites

  • An approved credential from (ISC)2’s experience waiver list

Course Outline

SECURITY AND RISK MANAGEMENT

  • Overview
  • Security and Risk Management
  • Security and Risk Management Part 2
  • Security and Risk Management Part 3
  • Security and Risk Management Part 4
  • Security and Risk Management Part 5
  • Security and Risk Management Part 6
  • Security and Risk Management – Key Points

ASSET SECURITY

  • Asset Security
  • Asset Security Part 2
  • Asset Security – Key Points

SECURITY ARCHITECTURE AND ENGINEERING

  • Security Architecture and Engineering
  • Security Architecture and Engineering Part 2
  • Security Architecture and Engineering Part 3
  • Security Architecture and Engineering Part 4
  • Security Architecture and Engineering Part 5
  • Security Architecture and Engineering Part 6
  • Security Architecture and Engineering Part 7
  • Security Architecture and Engineering Part 8
  • Security Architecture and Engineering Part 9
  • Security Architecture and Engineering Part 10
  • Security Architecture and Engineering Part 11
  • Security Architecture and Engineering Part 12
  • Security Architecture and Engineering Part 13
  • Security Architecture and Engineering Part 14
  • Security Architecture and Engineering Part 15
  • Security Architecture and Engineering Part 16
  • Security Architecture and Engineering Part 17
  • Security Architecture, Engineering Key Points

COMMUNICATION AND NETWORK SECURITY

  • Communication and Network Security
  • Communication and Network Security Part 2
  • Communication and Network Security Part 3
  • Communication and Network Security Part 4
  • Communication and Network Security Part 5
  • Communication and Network Security Part 6
  • Communication and Network Security Part 7
  • Communication and Network Security Part 8
  • Communication and Network Security Part 9
  • Communication and Network Security – Key Points

IDENTITY AND ACCESS MANAGEMENT (IAM)

  • Identity and Access Management (IAM)
  • Identity and Access Management (IAM) Part 2
  • Identity and Access Management (IAM) Part 3
  • Identity and Access Management (IAM) Part 4
  • Identity and Access Management (IAM) Part 5
  • Identity and Access Management (IAM) – Key Points

SECURITY ASSESSMENT AND TESTING

  • Security Assessment and Testing
  • Security Assessment and Testing Part 2
  • Security Assessment and Testing Part 3
  • Security Assessment and Testing Part 4
  • Security Assessment and Testing – Key Points

SECURITY OPERATIONS

  • Security Operations
  • Security Operations Part 2
  • Security Operations Part 3
  • Security Operations Part 4
  • Security Operations Part 5
  • Security Operations Part 6
  • Security Operations Part 7
  • Security Operations Part 8
  • Security Operations Part 9
  • Security Operations Part 10
  • Security Operations Part 11
  • Security Operations Part 12
  • Security Operations Part 13
  • Security Operations – Key Points

SOFTWARE DEVELOPMENT SECURITY

  • Software Development Security
  • Software Development Security Part 2
  • Software Development Security Part 3
  • Software Development Security Part 4
  • Software Development Security Part 5
  • Software Development Security Part 6
  • Software Development Security Part 7
  • Software Development Security – Key Points