(ISC)² Certified Information Systems Security Professional CISSP E-Learning
Certified Information Systems Security Professional CISSP E-Learning
€509,00 €499,00

Certified Information Systems Security Professional CISSP E-Learning

EUR 499,00
EUR 509,00 Excl. tax
  • Buy 2 for €489,02 each and save 2%
  • Buy 3 for €484,03 each and save 3%
  • Buy 4 for €479,04 each and save 4%
  • Buy 5 for €474,05 each and save 5%
  • Buy 10 for €449,10 each and save 10%
  • Buy 25 for €424,15 each and save 15%
  • Buy 50 for €399,20 each and save 20%

Certified Information Systems Security Professional CISSP E-Learning Certified Teachers Online Mentor Exam Quiz Tips and Tricks Certificate

  • E-Learning - Online toegang: 365 dagen
  • Taal: Engels (US)
  • Certificaat van deelname
In stock
Order before 4:00 PM and start today.
- +
  • Ordered before 23:00, delivered tomorrow
  • Certificaat van deelname
  • Bedrijven bestellen op factuur
  • Betaal in 3x geen extra kosten 0% rente en zonder BKR met in3
  • More information? Contact us about this product
Product description

Certified Information Systems Security Professional CISSP E-Learning

Order this unique E-Learning course Certified Information Systems Security Professional CISSP online, 1 year 24/7 access to rich interactive videos, speech, progress monitoring through reports and tests per chapter to test the knowledge directly.

Course content

Certified Information Systems Security Professional (CISSP) - 2018

CISSP: (ISC)² and Security Fundamentals
The (ISC)² Organization
The (ISC)² Code of Professional Ethics
The CISSP Exam
Confidentiality, Integrity, and Availability
Identify and Classify Information and Assets
Determine Information and Asset Ownership
Protect Privacy
Asset Retention
Data Security Controls
Requirements for Information and Asset Handling
Exercise: Describing (ISC)² CISSP Fundamentals 

CISSP: Cryptographic Client-based Systems

Overview of Cryptology and Cryptographic Systems
Integrity and Cryptographic Hashing
Cryptographic Methods
Cryptanalytic Attacks
Cryptographic Life Cycle
Digital Signatures
Public Key Infrastructure (PKI)
Key Management Practices
Digital Rights Management (DRM)
Exercise: Describing Cryptographic Techniques 

CISSP: Communication and Network Security

Secure Design Principles for Networks
Secure Network Components
Multilayer and Converged Protocols
Transmission Medium
NAC and Endpoint Security
Content-distribution Networks
Unified Communications
Wireless Networking
Remote Access Technology
Virtualized Network Security
Exercise: Describing Security for Networks  

CISSP: Identity and Access Management (IAM)

Asset Access Control
Entity Identification and Authentication
Identity Integration
Authorization Mechanism Implementation
Access Control Models
Identity Management Implementation
Access Review and Provisioning
Federated Services
Exercise: Describing IAM  

CISSP: Site and Facility Security Controls

Wiring Closets and Intermediate Distribution Areas
Server Rooms and Data Centers
Media Storage Facilities
Evidence Storage
Restricted and Work Area Security
Utilities and HVAC
Environmental Issues
Fire Prevention, Detection, and Suppression
Exercise: Describing Facility Management Controls  

CISSP: Security and Risk Management (Part 1)

Security Governance Principles
Contractual, Legal, and Regulatory Requirements
Privacy Requirements
Legal and Regulatory Issues
Policies, Standards, Procedures, and Guidelines
Scope, Plan, and BIA Development
Security and Business Strategy Alignment
Security Control Frameworks
Due Care and Due Diligence
Cybercrimes and Data Breaches
Import/Export and Transborder Data Controls
Licensing, IP Requirements, and Privacy
Exercise: Describing Governance, Compliance, and BCP  

CISSP: Security and Risk Management (Part 2)

Personnel Security Policies
Risk Assessment and Analysis
Risk Response, Measurement, and Monitoring
Threat Modeling
Risk-based Supply Chain Management
Security Awareness
Exercise: Describing Controls for IT Security  

CISSP: Security Architecture and Engineering (Part 1)

Secure Design Principles in Engineering Processes
Fundamental Concepts of Security Models
Security Control Selection
Information System Security Capabilities
Vulnerability Mitigation in Security Design
Exercise: Describing Security Engineering and Design  

CISSP: Security Architecture and Engineering (Part 2)

Web-based System Vulnerabilities
Common Attacks on Web-based Systems
Vulnerability Mitigation for Web-based Systems
Enterprise Mobility Management
Mobility Security and Privacy Concerns
Vulnerability Mitigation for Mobile Systems
Embedded Device Vulnerabilities
Common Threats to Embedded Devices
Vulnerability Mitigation for Embedded Devices
Exercise: Describing Vulnerability Mitigation  

CISSP: Security Assessment and Testing

Supporting Investigations
Provisioning and Protecting Resources
Performing Logging and Monitoring Operations
Testing Security Controls and Processes
Implementing Audit Strategies
Performing Security Audits
Analyzing Test Output
Exercise: Assessing and Testing Security  

CISSP: Security Operations (Part 1)

Security Principles for Operations
Information Life Cycle
Asset Inventory
Asset Management
Configuration Management
Privileged Account Management
Legal Issues
Service Level Agreements
Exercise: Describing Operations Security Management  

CISSP: Security Operations (Part 2)

Continuous Monitoring
Egress Monitoring
Security Information and Event Management (SIEM)
Intrusion Detection and Prevention
Investigative Techniques
Evidence Collection and Handling
Digital Forensics Tools, Tactics, and Procedures
Reporting and Documentation
Exercise: Describe Security Management of Operations  

CISSP: Conducting Incident Management

Operating Detective and Preventative Measures
Implementing Patch and Vulnerability Management
Exploring Change Management Processes
Implementing Recovery Strategies
Implementing Disaster Recovery (DR)
Testing Disaster Recovery Plans
Participating in Business Continuity Planning (BCP)
Implementing Perimeter Physical Security
Implementing Enterprise Physical Security
Utilizing Additional Physical Controls
Personnel Safety and Security Concerns
Exercise: Describe Incident Management  

CISSP: Software Development Security

Integrating Security in the SDLC
Identifying Software Development Phases

Identifying Security Controls for Development
Assessing the Effectiveness of Software Security

Assessing the Security Impact of Acquired Software
Applying Secure Coding Standards

Applying Secure Coding Best Practices
Exercise: Securing the Development Environment
TestPrep Certified Information Systems Security Professional (CISSP)

Availabilty 19 hours
Language English
Certificate of participation Yes
Online access 365 days
Progress monitoring Yes
Award Winning E-learning Yes
Suitable for mobile Yes
What our customers say

average of 1 review(s)


Grote voordeel van deze cursus is dat je zelf het tempo kunt bepalen.

Read or write a review
My account
You are not logged in. Log in to make use of all the benefits. Or create an account now.
Your cart is empty
Search suggestions
No courses or trainings found...
Please accept cookies to help us improve this website Is this OK? Yes No More on cookies »