Certified Information Systems Security Professional

No Rating(0)
See all reviews

This course is designed for those interested to learn the basics of information systems security, including but not limited to security and risk management, asset management, security architecture and engineering, communication and network security, in preparation to become a Certified Information Systems Security Professional.

Watch Free For 30 Days

start free access

-or-

buy single class $199
  • On Demand Video Lessons
  • Course Certificate
  • 24/7 Support

About This Coursebeginner

This cyber security certification training course covers everything you need to know about becoming a Certified Information Systems Security Professional. 

Students will learn about security and risk management, asset management, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security. 

Our Promise to You

By the end of this course, you will have learned everything you need to know about becoming a Certified Information Systems Security Professional.

30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.

Get started today and learn more about the Certified Information Systems Security Professional.

Course Curriculum

Course Sections

Confidentiality, Integrity, And Availability

Security Governance

Compliance Requirements

Legal And Regulatory – Global

Professional Ethics

Security Policy, Standards, And Procedures

Business Continuity

Personal Security Policies

Apply Risk Management

Threat Modeling

Risk Management – Supply Chain

Security Awareness And Training

Downloadable Materials

Identify And Classify

Asset Ownership

Protect Privacy

Asset Retention

Data Security Controls

Information / Asset Handling

Engineering Processes And Secure Design

Concepts Of Security Models

Controls Based On Security Requirements

Security Capabilities Of Information Systems

Assess And Mitigate Vulnerabilities

Assess And Mitigate Vulnerabilities – Web

Assess And Mitigate Vulnerabilities – Mobile

Assess And Mitigate Vulnerabilities – Embedded

Apply Cryptography

Site And Facility Security Principles

Site And Facility Security Controls

Secure Design And Network Architecture

Secure Network Components

Secure Communication Design

Physical And Logical Access

Manage Identification And Authentication

Integrate Identity As A Third-Party Service

Implement And Manage Authorization

Manage Identity And Access Life Cycle

Assessment, Test, And Audit Strategies

Security Control Testing

Security Process Data

Analyze Test Output And Generate Reports

Conduct And Facilitate Security Audit

Investigations

Investigation Team

Logging And Monitoring Activities

Provisioning Resources

Security Operations Concepts

Protection Techniques

Incident Management

Detective And Preventative Measures

Patch And Vulnerability Management

Change Management Processes

Implement Recovery Strategies

Implement Disaster Recovery

Test Disaster Recovery

Implement And Manage Physical Security

Personnel Safety And Security

Software Development Life Cycle

Security Controls In Development

Assess Software Security Effectiveness

Security Impact Of Acquired Software

Secure Coding Guidelines And Standards

Reviews

No Reviews found for this course.