You have no items in your shopping cart
Certified Information Systems Security Professional CISSP E-learning
Certified Information Systems Security Professional CISSP E-learning
€509,00 €499,00

Cheaper somewhere else?

Let us know!

+31367601019 [email protected]

Certified Information Systems Security Professional CISSP E-learning

€509,00 €499,00 Excl. tax
€615,89 €603,79 Incl. tax
  • Buy 2 for €489,02 each and save 2%
  • Buy 3 for €484,03 each and save 3%
  • Buy 4 for €479,04 each and save 4%
  • Buy 5 for €474,05 each and save 5%
  • Buy 10 for €449,10 each and save 10%
  • Buy 25 for €424,15 each and save 15%
  • Buy 50 for €399,20 each and save 20%
In stock
Order before 4:00 PM and start today.
You have got counting... hours
  • Bestellen op Factuur
  • Beste opleider 2019
  • Na Betaling Direct Starten

Certified Information Systems Security Professional CISSP Elearning

Order this unique Elearning course Certified Information Systems Security Professional CISSP online, 1 year 24/7 access to rich interactive videos, speech, progress monitoring through reports and tests per chapter to test the knowledge directly.


Certified Information Systems Security Professional (CISSP) - 2018
19 hours
CISSP: (ISC)² and Security Fundamentals

The (ISC)² Organization
The (ISC)² Code of Professional Ethics
The CISSP Exam
Confidentiality, Integrity, and Availability
Identify and Classify Information and Assets
Determine Information and Asset Ownership
Protect Privacy
Asset Retention
Data Security Controls
Requirements for Information and Asset Handling
Exercise: Describing (ISC)² CISSP Fundamentals
CISSP: Cryptographic Client-based Systems

Overview of Cryptology and Cryptographic Systems
Integrity and Cryptographic Hashing
Cryptographic Methods
Cryptanalytic Attacks
Cryptographic Life Cycle
Digital Signatures
Public Key Infrastructure (PKI)
Key Management Practices
Digital Rights Management (DRM)
Exercise: Describing Cryptographic Techniques
CISSP: Communication and Network Security

Secure Design Principles for Networks
Secure Network Components
Multilayer and Converged Protocols
Transmission Medium
NAC and Endpoint Security
Content-distribution Networks
Unified Communications
Wireless Networking
Remote Access Technology
Virtualized Network Security
Exercise: Describing Security for Networks
CISSP: Identity and Access Management (IAM)

Asset Access Control
Entity Identification and Authentication
Identity Integration
Authorization Mechanism Implementation
Access Control Models
Identity Management Implementation
Access Review and Provisioning
Federated Services
Exercise: Describing IAM
CISSP: Site and Facility Security Controls

Wiring Closets and Intermediate Distribution Areas
Server Rooms and Data Centers
Media Storage Facilities
Evidence Storage
Restricted and Work Area Security
Utilities and HVAC
Environmental Issues
Fire Prevention, Detection, and Suppression
Exercise: Describing Facility Management Controls
CISSP: Security and Risk Management (Part 1)

Security Governance Principles
Contractual, Legal, and Regulatory Requirements
Privacy Requirements
Legal and Regulatory Issues
Policies, Standards, Procedures, and Guidelines
Scope, Plan, and BIA Development
Security and Business Strategy Alignment
Security Control Frameworks
Due Care and Due Diligence
Cybercrimes and Data Breaches
Import/Export and Transborder Data Controls
Licensing, IP Requirements, and Privacy
Exercise: Describing Governance, Compliance, and BCP
CISSP: Security and Risk Management (Part 2)

Personnel Security Policies
Risk Assessment and Analysis
Risk Response, Measurement, and Monitoring
Threat Modeling
Risk-based Supply Chain Management
Security Awareness
Exercise: Describing Controls for IT Security
CISSP: Security Architecture and Engineering (Part 1)

Secure Design Principles in Engineering Processes
Fundamental Concepts of Security Models
Security Control Selection
Information System Security Capabilities
Vulnerability Mitigation in Security Design
Exercise: Describing Security Engineering and Design
CISSP: Security Architecture and Engineering (Part 2)

Web-based System Vulnerabilities
Common Attacks on Web-based Systems
Vulnerability Mitigation for Web-based Systems
Enterprise Mobility Management
Mobility Security and Privacy Concerns
Vulnerability Mitigation for Mobile Systems
Embedded Device Vulnerabilities
Common Threats to Embedded Devices
Vulnerability Mitigation for Embedded Devices
Exercise: Describing Vulnerability Mitigation
CISSP: Security Assessment and Testing

Supporting Investigations
Provisioning and Protecting Resources
Performing Logging and Monitoring Operations
Testing Security Controls and Processes
Implementing Audit Strategies
Performing Security Audits
Analyzing Test Output
Exercise: Assessing and Testing Security
CISSP: Security Operations (Part 1)

Security Principles for Operations
Information Life Cycle
Asset Inventory
Asset Management
Configuration Management
Privileged Account Management
Legal Issues
Service Level Agreements
Exercise: Describing Operations Security Management
CISSP: Security Operations (Part 2)

Continuous Monitoring
Egress Monitoring
Security Information and Event Management (SIEM)
Intrusion Detection and Prevention
Investigative Techniques
Evidence Collection and Handling
Digital Forensics Tools, Tactics, and Procedures
Reporting and Documentation
Exercise: Describe Security Management of Operations
CISSP: Conducting Incident Management

Operating Detective and Preventative Measures
Implementing Patch and Vulnerability Management
Exploring Change Management Processes
Implementing Recovery Strategies
Implementing Disaster Recovery (DR)
Testing Disaster Recovery Plans
Participating in Business Continuity Planning (BCP)
Implementing Perimeter Physical Security
Implementing Enterprise Physical Security
Utilizing Additional Physical Controls
Personnel Safety and Security Concerns
Exercise: Describe Incident Management
CISSP: Software Development Security

Integrating Security in the SDLC
Identifying Software Development Phases
Identifying Security Controls for Development
Assessing the Effectiveness of Software Security
Assessing the Security Impact of Acquired Software
Applying Secure Coding Standards
Applying Secure Coding Best Practices
Exercise: Securing the Development Environment
TestPrep Certified Information Systems Security Professional (CISSP)
Heeft u niet gevonden wat u zocht?
Let us help!
General properties
Availabilty: 19 hours
Language: English
Certificate of participation: Yes
Online access: 1 year unlimited access
Progress monitoring: Yes
Award Winning E-learning: Yes
Suitable for mobile: Yes
average of 1 review(s)
By: Zegers
Date: 29/03/2020

Grote voordeel van deze cursus is dat je zelf het tempo kunt bepalen.

Write a review
Write a review

Please accept cookies to help us improve this website Is this OK? Yes No More on cookies »