About This Course

Who this course is for:

  • IT professionals
  • Cyber security professionals

What you’ll learn: 

  • Everything you need to know about becoming a Certified Information Systems Security Professional.

This cyber security certification training course covers everything you need to know about becoming a Certified Information Systems Security Professional. 

Students will learn about security and risk management, asset management, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security.

Our Promise to You

By the end of this course, you will have learned everything you need to know about becoming a Certified Information Systems Security Professional.

30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.

Get started today and learn more about the Certified Information Systems Security Professional.

Course Curriculum

Section 1 - Security And Risk Management
Confidentiality, Integrity, And Availability 00:00:00
Security Governance 00:00:00
Compliance Requirements 00:00:00
Legal And Regulatory – Global 00:00:00
Professional Ethics 00:00:00
Security Policy, Standards, And Procedures 00:00:00
Business Continuity 00:00:00
Personal Security Policies 00:00:00
Apply Risk Management 00:00:00
Threat Modeling 00:00:00
Risk Management – Supply Chain 00:00:00
Security Awareness And Training 00:00:00
Downloadable Materials 00:00:00
Section 2 - Asset Management
Identify And Classify 00:00:00
Asset Ownership 00:00:00
Protect Privacy 00:00:00
Asset Retention 00:00:00
Data Security Controls 00:00:00
Information / Asset Handling 00:00:00
Section 3 - Security Architecture And Engineering
Engineering Processes And Secure Design 00:00:00
Concepts Of Security Models 00:00:00
Controls Based On Security Requirements 00:00:00
Security Capabilities Of Information Systems 00:00:00
Assess And Mitigate Vulnerabilities 00:00:00
Assess And Mitigate Vulnerabilities – Web 00:00:00
Assess And Mitigate Vulnerabilities – Mobile 00:00:00
Assess And Mitigate Vulnerabilities – Embedded 00:00:00
Apply Cryptography 00:00:00
Site And Facility Security Principles 00:00:00
Site And Facility Security Controls 00:00:00
Section 4 - Communication And Network Security
Secure Design And Network Architecture 00:00:00
Secure Network Components 00:00:00
Secure Communication Design 00:00:00
Section 5 - Identity And Access Management
Physical And Logical Access 00:00:00
Manage Identification And Authentication 00:00:00
Integrate Identity As A Third-Party Service 00:00:00
Implement And Manage Authorization 00:00:00
Manage Identity And Access Life Cycle 00:00:00
Section 6 - Security Assessment And Testing
Assessment, Test, And Audit Strategies 00:00:00
Security Control Testing 00:00:00
Security Process Data 00:00:00
Analyze Test Output And Generate Reports 00:00:00
Conduct And Facilitate Security Audit 00:00:00
Section 7 - Security Operations
Investigations 00:00:00
Investigation Team 00:00:00
Logging And Monitoring Activities 00:00:00
Provisioning Resources 00:00:00
Security Operations Concepts 00:00:00
Protection Techniques 00:00:00
Incident Management 00:00:00
Detective And Preventative Measures 00:00:00
Patch And Vulnerability Management 00:00:00
Change Management Processes 00:00:00
Implement Recovery Strategies 00:00:00
Implement Disaster Recovery 00:00:00
Test Disaster Recovery 00:00:00
Implement And Manage Physical Security 00:00:00
Personnel Safety And Security 00:00:00
Section 8 - Software Development Security
Software Development Life Cycle 00:00:00
Security Controls In Development 00:00:00
Assess Software Security Effectiveness 00:00:00
Security Impact Of Acquired Software 00:00:00
Secure Coding Guidelines And Standards 00:00:00
Template Design © VibeThemes. All rights reserved.

Setup Menus in Admin Panel