Certified Information Systems Security Professional
This course is designed for those interested to learn the basics of information systems security, including but not limited to security and risk management, asset management, security architecture and engineering, communication and network security, in preparation to become a Certified Information Systems Security Professional.
About This Coursebeginner
This cyber security certification training course covers everything you need to know about becoming a Certified Information Systems Security Professional.
Students will learn about security and risk management, asset management, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security.
Our Promise to You
By the end of this course, you will have learned everything you need to know about becoming a Certified Information Systems Security Professional.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about the Certified Information Systems Security Professional.
Confidentiality, Integrity, And Availability
Legal And Regulatory – Global
Security Policy, Standards, And Procedures
Personal Security Policies
Apply Risk Management
Risk Management – Supply Chain
Security Awareness And Training
Identify And Classify
Data Security Controls
Information / Asset Handling
Engineering Processes And Secure Design
Concepts Of Security Models
Controls Based On Security Requirements
Security Capabilities Of Information Systems
Assess And Mitigate Vulnerabilities
Assess And Mitigate Vulnerabilities – Web
Assess And Mitigate Vulnerabilities – Mobile
Assess And Mitigate Vulnerabilities – Embedded
Site And Facility Security Principles
Site And Facility Security Controls
Secure Design And Network Architecture
Secure Network Components
Secure Communication Design
Physical And Logical Access
Manage Identification And Authentication
Integrate Identity As A Third-Party Service
Implement And Manage Authorization
Manage Identity And Access Life Cycle
Assessment, Test, And Audit Strategies
Security Control Testing
Security Process Data
Analyze Test Output And Generate Reports
Conduct And Facilitate Security Audit
Logging And Monitoring Activities
Security Operations Concepts
Detective And Preventative Measures
Patch And Vulnerability Management
Change Management Processes
Implement Recovery Strategies
Implement Disaster Recovery
Test Disaster Recovery
Implement And Manage Physical Security
Personnel Safety And Security
Software Development Life Cycle
Security Controls In Development
Assess Software Security Effectiveness
Security Impact Of Acquired Software
Secure Coding Guidelines And Standards
No Reviews found for this course.