Take your career to the next level by earning one of the most in-demand cybersecurity certifications. Infosec's CISSP training provides a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional.
Take your career to the next level by earning one of the most in-demand cybersecurity certifications. Infosec's CISSP training provides a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional.
Course Outline
Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)
Understand and Apply Concepts of Confidentiality, Integrity, and Availability
Apply Security Governance Principles
Compliance
Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
Understand Business Continuity Requirements
Contribute to Personnel Security Policies
Understand and Apply Risk Management Concepts
Understand and Apply Threat Modeling
Integrate Security Risk Considerations into Acquisitions Strategy and Practice
Establish and Manage Security Education, Training, and Awareness
Asset Security (Protecting Security of Assets)
Classify Information and Supporting Assets
Determine and Maintain Ownership
Protect Privacy
Ensure Appropriate Retention
Determine Data Security Controls
Establish Handling Requirements
Security Engineering (Engineering and Management of Security)
Implement and Manage an Engineering Life Cycle Using Security Design Principles
Understand Fundamental Concepts of Security Models
Select Controls and Countermeasures Based Upon Information Systems Security Standards
Understand the Security Capabilities of Information Systems
Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Assess and Mitigate Vulnerabilities in Web-based Systems
Assess and Mitigate Vulnerabilities in Mobile Systems
Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
Apply Cryptography
Apply Secure Principles to Site and Facility Design
Design and Implement Facility Security
Communications and Network Security (Designing and Protecting Network Security)
Apply Secure Design Principles to Network Architecture
Securing Network Components
Design and Establish Secure Communication Channels
Prevent or Mitigate Network Attacks
Identity and Access Management (Controlling Access and Managing Identity)
Control Physical and Logical Access to Assets
Manage Identification and Authentication of People and Devices
Integrate Identity as a Service (IDaaS)
Integrate Third-Party Identity Services
Implement and Manage Authorization Mechanisms
Prevent or Mitigate Access Control Attacks
Manage the Identity and Access Provisioning Life Cycle
Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
Design and Validate Assessment and Test Strategies
Conduct Security Control Testing
Collect Security Process Data
Conduct or Facilitate Internal and Third-Party Audits
Security Operations (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
Understand and Support Investigations
Understand Requirements for Investigation Types
Conduct Logging and Monitoring Activities
Secure the Provisioning of Resources through Configuration Management
Understand and Apply Foundational Security Operations Concepts
Employ Resource Protection Techniques
Conduct Incident Response
Operate and Maintain Preventative Measures
Implement and Support Patch and Vulnerability Management
Participate in and Understand Change Management Processes
Implement Recovery Strategies
Implement Disaster Recovery Processes
Test Disaster Recovery Plan
Participate in Business Continuity Planning
Implement and Manage Physical Security
Participate in Personnel Safety
Software Development Security (Understanding, Applying, and Enforcing Software Security)
Understand and Apply Security in the Software Development Life Cycle
Enforce Security Controls in the Development Environment
Assess the Effectiveness of Software Security
Assess Software Acquisition Security
Cybercert is one of the leading security and technology training organizations, focusing on a range of cyber security, cloud computing, and project management-related courses. The Cybercert Instructor team consists of experienced and enthusiastic professionals who have many years of industry experience.
We provide professional training and exam preparation for all areas of information technology and cyber security courses. Our learning system is designed to support how learning is done today and evolve to meet advances in technology and individual learning needs.
Cybercert believes cyber security knowledge is the power when fighting against today’s cybercrime. As the leading cybersecurity training company, we empower people to be cyber-safe at work and home and help IT and security professionals achieve their career goals.
It’s our mission to equip all organizations and individuals with the knowledge, skills, and confidence to outsmart cybercrime. We specialize in areas where technologies and security requirements are changing rapidly and the demand for qualified candidates significantly exceeds supply.
Achieving the Certified Information Systems Security Professional (CISSP) designation is proof that the security practitioner has mastered the concepts in the CISSP Common Book of Knowledge, a compendium of best practices in the security field.
CISA courses are offered by Cisnet. Cisnet is committed to delivering the highest quality IT training using the most advanced technologies available. This commitment extends to every aspect of our school.
Earning the globally recognized CISSP Training Certification is a proven way to build your career and better secure critical assets in the cloud.
The training will provide participants with an understanding of the key principles and terminology of COBIT®5. In particular, the candidate must know and understand:
The ISO/IEC 27001 Lead Implementer course will provide you with the expertise to support an organization in establishing, implementing, managing and maintaining an ISO/IEC 27001 compliant Information Security Management System (ISMS).
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy