(ISC)² Certified Information Systems Security Professional CISSP E-Learning
Certified Information Systems Security Professional CISSP E-Learning
€509,00 €499,00
(ISC)²
Aanbieding

Certified Information Systems Security Professional CISSP E-Learning

EUR 499,00
EUR 509,00 Excl. btw
  • Koop 2 voor €489,02 per stuk en bespaar 2%
  • Koop 3 voor €484,03 per stuk en bespaar 3%
  • Koop 4 voor €479,04 per stuk en bespaar 4%
  • Koop 5 voor €474,05 per stuk en bespaar 5%
  • Koop 10 voor €449,10 per stuk en bespaar 10%
  • Koop 25 voor €424,15 per stuk en bespaar 15%
  • Koop 50 voor €399,20 per stuk en bespaar 20%

Certified Information Systems Security Professional CISSP E-Learning Gecertificeerde docenten Online mentor Examenquiz Tips en trucs Certificaat

  • E-Learning - Online toegang: 365 dagen
  • Taal: Engels (US)
  • Certificaat van deelname
Op voorraad
Bestel voor 16:00 uur en start vandaag.
Aantal
- +
  • Voor 23:00 uur besteld, morgen in huis
  • Certificaat van deelname
  • Bedrijven bestellen op factuur
  • Betaal in 3x geen extra kosten 0% rente en zonder BKR met in3
  • Meer informatie? Neem contact op over dit product
Productomschrijving

Certified Information Systems Security Professional CISSP E-Learning

De Certified Information Systems Security Professional (CISSP) is de meest wereldwijd erkende certificering op de markt voor informatiebeveiliging. CISSP valideert de diepgaande technische en bestuurlijke kennis en ervaring van een informatiebeveiligingsprofessional om de algehele beveiligingshouding van een organisatie effectief te ontwerpen, engineeren en beheren.

Bestel deze unieke E-Learning cursus Certified Information Systems Security Professional CISSP online, 1 jaar 24/ 7 toegang tot rijke interactieve video’s, spraak, voortgangsbewaking door rapportages en testen per hoofdstuk om de kennis direct te toetsen.


Cursusinhoud

Certified Information Systems Security Professional (CISSP) - 2018

CISSP: (ISC)² and Security Fundamentals
The (ISC)² Organization
The (ISC)² Code of Professional Ethics
The CISSP Exam
Confidentiality, Integrity, and Availability
Identify and Classify Information and Assets
Determine Information and Asset Ownership
Protect Privacy
Asset Retention
Data Security Controls
Requirements for Information and Asset Handling
Exercise: Describing (ISC)² CISSP Fundamentals 

CISSP: Cryptographic Client-based Systems

Overview of Cryptology and Cryptographic Systems
Integrity and Cryptographic Hashing
Cryptographic Methods
Cryptanalytic Attacks
Cryptographic Life Cycle
Digital Signatures
Public Key Infrastructure (PKI)
Key Management Practices
Digital Rights Management (DRM)
Exercise: Describing Cryptographic Techniques 

CISSP: Communication and Network Security

Secure Design Principles for Networks
Secure Network Components
OSI TCP/IP Models
Multilayer and Converged Protocols
Transmission Medium
NAC and Endpoint Security
Content-distribution Networks
Unified Communications
Wireless Networking
Remote Access Technology
Virtualized Network Security
Exercise: Describing Security for Networks  

CISSP: Identity and Access Management (IAM)

Asset Access Control
Entity Identification and Authentication
Identity Integration
Authorization Mechanism Implementation
Access Control Models
Identity Management Implementation
Access Review and Provisioning
Federated Services
Exercise: Describing IAM  

CISSP: Site and Facility Security Controls

Wiring Closets and Intermediate Distribution Areas
Server Rooms and Data Centers
Media Storage Facilities
Evidence Storage
Restricted and Work Area Security
Utilities and HVAC
Environmental Issues
Fire Prevention, Detection, and Suppression
Exercise: Describing Facility Management Controls  

CISSP: Security and Risk Management (Part 1)

Security Governance Principles
Contractual, Legal, and Regulatory Requirements
Privacy Requirements
Legal and Regulatory Issues
Policies, Standards, Procedures, and Guidelines
Scope, Plan, and BIA Development
Security and Business Strategy Alignment
Security Control Frameworks
Due Care and Due Diligence
Cybercrimes and Data Breaches
Import/Export and Transborder Data Controls
Licensing, IP Requirements, and Privacy
Exercise: Describing Governance, Compliance, and BCP  

CISSP: Security and Risk Management (Part 2)

Personnel Security Policies
Risk Assessment and Analysis
Risk Response, Measurement, and Monitoring
Threat Modeling
Risk-based Supply Chain Management
Security Awareness
Exercise: Describing Controls for IT Security  

CISSP: Security Architecture and Engineering (Part 1)

Secure Design Principles in Engineering Processes
Fundamental Concepts of Security Models
Security Control Selection
Information System Security Capabilities
Vulnerability Mitigation in Security Design
Exercise: Describing Security Engineering and Design  

CISSP: Security Architecture and Engineering (Part 2)

Web-based System Vulnerabilities
Common Attacks on Web-based Systems
Vulnerability Mitigation for Web-based Systems
Enterprise Mobility Management
Mobility Security and Privacy Concerns
Vulnerability Mitigation for Mobile Systems
Embedded Device Vulnerabilities
Common Threats to Embedded Devices
Vulnerability Mitigation for Embedded Devices
Exercise: Describing Vulnerability Mitigation  

CISSP: Security Assessment and Testing

Supporting Investigations
Provisioning and Protecting Resources
Performing Logging and Monitoring Operations
Testing Security Controls and Processes
Implementing Audit Strategies
Performing Security Audits
Analyzing Test Output
Exercise: Assessing and Testing Security  

CISSP: Security Operations (Part 1)

Security Principles for Operations
Information Life Cycle
Asset Inventory
Asset Management
Configuration Management
Privileged Account Management
Legal Issues
Service Level Agreements
Exercise: Describing Operations Security Management  

CISSP: Security Operations (Part 2)

Continuous Monitoring
Egress Monitoring
Security Information and Event Management (SIEM)
Intrusion Detection and Prevention
Investigative Techniques
Evidence Collection and Handling
Digital Forensics Tools, Tactics, and Procedures
Reporting and Documentation
Exercise: Describe Security Management of Operations  

CISSP: Conducting Incident Management

Operating Detective and Preventative Measures
Implementing Patch and Vulnerability Management
Exploring Change Management Processes
Implementing Recovery Strategies
Implementing Disaster Recovery (DR)
Testing Disaster Recovery Plans
Participating in Business Continuity Planning (BCP)
Implementing Perimeter Physical Security
Implementing Enterprise Physical Security
Utilizing Additional Physical Controls
Personnel Safety and Security Concerns
Exercise: Describe Incident Management  

CISSP: Software Development Security

Integrating Security in the SDLC
Identifying Software Development Phases

Identifying Security Controls for Development
Assessing the Effectiveness of Software Security

Assessing the Security Impact of Acquired Software
Applying Secure Coding Standards

Applying Secure Coding Best Practices
Exercise: Securing the Development Environment
TestPrep Certified Information Systems Security Professional (CISSP)

Specificaties
Duur 19 uur
Taal Engels
Certificaat van deelname Ja
Online toegang 365 dagen
Voortgangsbewaking Ja
Award Winning E-learning Ja
Geschikt voor mobiel Ja
Wat onze klanten zeggen
5,0/5

average of 1 review(s)

Zegers
29/03/2020

Grote voordeel van deze cursus is dat je zelf het tempo kunt bepalen.

Help ons en andere klanten door het schrijven van een review
Mijn account
You are not logged in. Log in to make use of all the benefits. Or create an account now.
Taal
Winkelwagen
Uw winkelwagen is leeg
Menu
Zoeken
Search suggestions
Geen cursussen of trainingen gevonden...
Wij slaan cookies op om onze website te verbeteren. Is dat akkoord? Ja Nee Meer over cookies »