Diploma in Certified Information Systems Security Professional (CISSP 2019)
Course Description
This free course will provide you with an understanding of everything you need to know about becoming a Certified Information Systems Security Professional, and help prepare you for the Certified Information Security Professionals exam. In the first part of the course, you will go over professional ethics, security policy, standards and procedures, and you will also learn more about protecting assets and security controls. After a section dedicated to security architecture and engineering, we will cover secure network components and secure communication design.
In later modules, you will learn more about managing access to important services, assessing and testing security, and we will examine security control testing. After that, the course focuses on investigating security activity, preventing breaches and responding to breaches, which will pave the way for a foundation in protection techniques and preventative measures. Before the final assessment, a section is dedicated to software development security.
By taking this course you will learn crucial information about security in the modern age and have all of the necessary knowledge to become an Information Systems Auditor. So why wait? Start learning today and continue your professional education.
What you'll learn in this course?
-
Risk Management
-
Technology
-
Network Security
-
Information Systems
-
Information Security
-
Security
Course Curriculum
- Topic A: Confidentiality, Integrity, and Availability
- Topic B: Security Governance
- Topic C: Compliance Requirements
- Topic D: Legal and Regulatory - Global
- Topic E: Professional Ethics
- Topic F: Security Policy, Standards, Procedures
- Topic G: Business Continuity
- Topic H: Personal Security Policies
- Topic I: Apply Risk Management
- Topic J: Threat Modeling
- Topic K: Risk Management - Supply Chain
- Topic L: Security Awareness and Training
- Security and Risk Management - Assessment
- Topic A: Engineering Processes and Secure Design
- Topic B: Concepts of Security Models
- Topic C: Controls Based on Security Requirements
- Topic D: Security Capabilities of Information Systems
- Topic E: Assess / Mitigate Vulnerabilities
- Topic F: Assess / Mitigate Vulnerabilities (Web)
- Topic G: Assess / Mitigate Vulnerabilities (Mobile)
- Topic H: Assess / Mitigate Vulnerabilities (Embedded)
- Topic I: Apply Cryptography
- Topic J: Site / Facility Security Principles
- Topic K: Site / Facility Security Controls
- Security Architecture and Engineering - Assessment
- Topic A: Investigations
- Topic B: Investigation Team
- Topic C: Logging and Monitoring Activities
- Topic D: Provisioning Resources
- Topic E: Security Operations Concepts
- Topic F: Protection Techniques
- Topic G: Incident Management
- Topic H: Detective / Preventative Measures
- Topic I: Patch and Vulnerability Management
- Topic J: Change Management Processes
- Topic K: Implement Recovery Strategies
- Topic L: Implement Disaster Recovery
- Topic M: Test Disaster Recovery
- Topic N: Implement / Manage Physical Security
- Topic O: Personnel Safety / Security
- Security Operations - Assessment
Workforce Academy Partnership
Ireland
By