This course is designed for those interested to learn the basics of information systems security, including but not limited to security and risk management, asset management, security architecture and engineering, communication and network security, in preparation to become a Certified Information Systems Security Professional.
Read more.Instructor
Only want this course? Buy this course for $199 $29 and keep lifetime access.
Click here
About This Course
Who this course is for:
- IT professionals
- Cyber security professionals
What you’ll learn:Â
- Everything you need to know about becoming a Certified Information Systems Security Professional.
This cyber security certification training course covers everything you need to know about becoming a Certified Information Systems Security Professional.Â
Students will learn about security and risk management, asset management, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security.
Our Promise to You
By the end of this course, you will have learned everything you need to know about becoming a Certified Information Systems Security Professional.
10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about the Certified Information Systems Security Professional.
Course Curriculum
Section 1 - Security And Risk Management | |||
Confidentiality, Integrity, And Availability | 00:00:00 | ||
Security Governance | 00:00:00 | ||
Compliance Requirements | 00:00:00 | ||
Legal And Regulatory – Global | 00:00:00 | ||
Professional Ethics | 00:00:00 | ||
Security Policy, Standards, And Procedures | 00:00:00 | ||
Business Continuity | 00:00:00 | ||
Personal Security Policies | 00:00:00 | ||
Apply Risk Management | 00:00:00 | ||
Threat Modeling | 00:00:00 | ||
Risk Management – Supply Chain | 00:00:00 | ||
Security Awareness And Training | 00:00:00 | ||
Downloadable Materials | 00:00:00 | ||
Section 2 - Asset Management | |||
Identify And Classify | 00:00:00 | ||
Asset Ownership | 00:00:00 | ||
Protect Privacy | 00:00:00 | ||
Asset Retention | 00:00:00 | ||
Data Security Controls | 00:00:00 | ||
Information / Asset Handling | 00:00:00 | ||
Section 3 - Security Architecture And Engineering | |||
Engineering Processes And Secure Design | 00:00:00 | ||
Concepts Of Security Models | 00:00:00 | ||
Controls Based On Security Requirements | 00:00:00 | ||
Security Capabilities Of Information Systems | 00:00:00 | ||
Assess And Mitigate Vulnerabilities | 00:00:00 | ||
Assess And Mitigate Vulnerabilities – Web | 00:00:00 | ||
Assess And Mitigate Vulnerabilities – Mobile | 00:00:00 | ||
Assess And Mitigate Vulnerabilities – Embedded | 00:00:00 | ||
Apply Cryptography | 00:00:00 | ||
Site And Facility Security Principles | 00:00:00 | ||
Site And Facility Security Controls | 00:00:00 | ||
Section 4 - Communication And Network Security | |||
Secure Design And Network Architecture | 00:00:00 | ||
Secure Network Components | 00:00:00 | ||
Secure Communication Design | 00:00:00 | ||
Section 5 - Identity And Access Management | |||
Physical And Logical Access | 00:00:00 | ||
Manage Identification And Authentication | 00:00:00 | ||
Integrate Identity As A Third-Party Service | 00:00:00 | ||
Implement And Manage Authorization | 00:00:00 | ||
Manage Identity And Access Life Cycle | 00:00:00 | ||
Section 6 - Security Assessment And Testing | |||
Assessment, Test, And Audit Strategies | 00:00:00 | ||
Security Control Testing | 00:00:00 | ||
Security Process Data | 00:00:00 | ||
Analyze Test Output And Generate Reports | 00:00:00 | ||
Conduct And Facilitate Security Audit | 00:00:00 | ||
Section 7 - Security Operations | |||
Investigations | 00:00:00 | ||
Investigation Team | 00:00:00 | ||
Logging And Monitoring Activities | 00:00:00 | ||
Provisioning Resources | 00:00:00 | ||
Security Operations Concepts | 00:00:00 | ||
Protection Techniques | 00:00:00 | ||
Incident Management | 00:00:00 | ||
Detective And Preventative Measures | 00:00:00 | ||
Patch And Vulnerability Management | 00:00:00 | ||
Change Management Processes | 00:00:00 | ||
Implement Recovery Strategies | 00:00:00 | ||
Implement Disaster Recovery | 00:00:00 | ||
Test Disaster Recovery | 00:00:00 | ||
Implement And Manage Physical Security | 00:00:00 | ||
Personnel Safety And Security | 00:00:00 | ||
Section 8 - Software Development Security | |||
Software Development Life Cycle | 00:00:00 | ||
Security Controls In Development | 00:00:00 | ||
Assess Software Security Effectiveness | 00:00:00 | ||
Security Impact Of Acquired Software | 00:00:00 | ||
Secure Coding Guidelines And Standards | 00:00:00 |
Great
I have worked in this field for years. I used this as a refresher. It is accurate and enjoyable.