reed.co.uk Courses

Header

Check out our Christmas deals

Certified Information Systems Security Professional (CISSP)

This course will help you to become a certified cyber security professional.


StudyOnline247

Summary

Price
Save 25%
£149 inc VAT (was £199)
Offer ends 31 December 2019
Study method
Online, self-paced
Duration
1 Month
Certification
Certified Information Systems Security Professional (CISSP)
Professional What's this?
Additional info
  • Exam(s) / assessment(s) not included in price & must be purchased separately

1 student purchased this course

Add to basket or enquire

Overview

Certified Information Systems Security Professional (CISSP) is a premier certification for those who want to demonstrate their knowledge and advance their careers. Become a member of a community of cyber-security leaders and show you have what it takes to design and implement an information security program.

Certification

Certified Information Systems Security Professional (CISSP)

Description

This Certified Information Systems Security Professional (CISSP) course covers everything you need to know to stay one step ahead and keep your organisation safe. This course is seen as an objective measure of excellence. Once you have completed the Certified Information Systems Security Professional (CISSP) you will be recognised as an IT Professional in the field of Security.

What you will learn

Once you have completed this course you will have the deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security of an organisation.

Curriculum

Module 1:

• Introduction

• Least Bad Answer Part 1

• Least Bad Answer Part 2

• Least Bad Answer Part 3

• Least Bad Answer Part 4

• Least Bad Answer Part 5

• Least Bad Answer Part 6

• Least Bad Answer Part 7

• Ethics

Module 2:

• Accounts And Identity Management - Part 1

• Accounts And Identity Management - Part 2

• Accounts And Identity Management - Part 3

• Accounts And Identity Management - Part 4

• Accounts And Identity Management - Part 5

• Authentication Services – Part 1

• Authentication Services – Part 2

• Authentication Services – Part 3

• Authentication Services – Part 4

• Authentication Services – Part 5

• Categories And Types – Part 1

• Categories And Types – Part 2

• Categories And Types – Part 3

• Penetration Testing And Auditing – Part 1

• Penetration Testing And Auditing – Part 2

• Penetration Testing And Auditing – Part 3

• Penetration Testing And Auditing – Part 4

• Penetration Testing And Auditing – Part 5

• Systems M A C D A C R B A C – Part 1

• Systems M A C D A C R B A C – Part 2

• Systems M A C D A C R B A C – Part 3

• Systems M A C D A C R B A C – Part 4

Module 3:

• Telecommunications

• Wired Physical Interfaces

• Physical Layer

• Layer – Part 1

• Layer – Part 2

• Wireless

• Wireless Lan

• Layer 34 And Firewalls

• Firewalls

• Protocols

• Transport Layer

• Layers 5 And 6

• Controls

• Layer 5 Protocols

• Presentation Layer

• Layer 7

• Authentication

• Printing

• Messaging

• Security Protocol

• Application Attacks

• Honeypots

• Telecommunications

• Voice Over IP

• Attacks

• VOIP Controls

Module 4:

• Layers of Protection

• Penetration Testing

• Vectors Of Test

• Scope

• Technical Penetration Testing

• Pen Testing Methodology

Module 5:

• Application Security – Part 1

• Application Security – Part 2

• Connectivity Interfaces And Applications

• Malware

• Attack Types

• Malformed Input

• Payload

• Web Risks – Part 1

• Web Risks – Part 2

• Insecure Direct Object Reference

• Security Misconfiguration

• How To Pass The Exam

• Overview

• Risk Management

• Patch Management

• Levels Of Patch Management

• Software Development Life Cycle – Part 1

• Software Development Life Cycle – Part 2

• Security

Module 6:

• Cryptology

• Symmetric Vs Asymmetric

• Managing Key Sizes

• Initialization Vector

• Asymmetric

• Crytology Law

• Message Integrity Controls

• Apply Integrity Controls

• Digital Signature Overview

• Types Of Encryption

• Digital Signatures

• Key Agreement

• Hierarchical Trust Model

• PGP And Digital Signatures

• Spam Vs PKI

• Cryptolography And Steganography

• Investigating For Steganography

• Code Breaking

• Common Cryptanalytical Attacks

• Types Of Attacks

Module 7:

• Common Criteria And Trusted Computing Base – Part 1

• Common Criteria And Trusted Computing Base – Part 2

• Common Criteria And Trusted Computing Base – Part 3

• Frameworks – Part 1

• Frameworks – Part 2

• Frameworks – Part 3

• Frameworks – Part 4

• Frameworks – Part 5

• Hardware – Part 1

• Hardware – Part 2

• Hardware – Part 3

• Security Architecture Models – Part 1

• Security Architecture Models – Part 2

• Security Architecture Models – Part 3

• Security Architecture Models – Part 4

• Security Architecture Models – Part 5

• Software OS Design – Part 1

• Software OS Design – Part 2

• Software OS Design – Part 3

• Software OS Design – Part 4

Module 8:

• Data Classification – Part 1

• Data Classification – Part 2

• Data Classification – Part 3

• Data Classification – Part 4

• Data Backup And Control – Part 1

• Data Backup And Control – Part 2

• Data Backup And Control – Part 3

• Data Backup And Control – Part 4

• Privilege Entry Control – Part 1

• Privilege Entry Control – Part 2

• IDS And IPS – Part 1

• IDS And IPS – Part 2

• IDS And IPS – Part 3

Module 9:

• Business Continuity Planning – Part 1

• Business Continuity Planning – Part 2

• Policy And Program Management – Part 1

• Policy And Program Management – Part 2

• Business Impact Analysis – Part 1

• Business Impact Analysis – Part 2

• Strategy Options

• Incident Management Plans

• Activity Response Plans

• Test Plan

• Embedding Business Continuity Plan

Module 10:

• Law Domain – Part 1

• Law Domain – Part 2

• Law Domain – Part 3

• Law Domain – Part 4

• Incident Handling – Part 1

• Incident Handling – Part 2

• Incident Handling – Part 3

• Incident Handling – Part 4

• Legal Systems – Part 1

• Legal Systems – Part 2

• Intellectual Property – Part 1

• Intellectual Property – Part 2

• Intellectual Property – Part 3

Module 11:

• Fire And Power – Part 1

• Fire And Power – Part 2

• Fire And Power – Part 3

• Perimeter Barrier Lock Sensor Guard – Part 1

• Perimeter Barrier Lock Sensor Guard – Part 2

• Perimeter Barrier Lock Sensor Guard – Part 3

• Perimeter Barrier Lock Sensor Guard – Part 4

• Physical Security Planning – Part 1

• Physical Security Planning – Part 2

• Physical Security Planning – Part 3

• Conclusion

Please note that the official exam is not included, however for those who complete the course, they will receive a completion certificate upon request.

Who is this course for?

This course is for those who are interested in a career in Security and want to be a Certified Information Systems Security Professional (CISSP).

Requirements

There are no prerequisites to study this CISSP training course, however, to be eligible to write the exam you will be required to have a minimum of 5 years full time paid work experience in at least two of the eight CISSP domains.

Career path

Network Architect
IT Security Architect
IT Manager
Security Systems Engineer
Chief Information Security Officer
Director of IT Security
IT Security Analyst

Questions and answers


No questions or answers found containing ''.


comfort asked:

how much is the exam/assessment fee?

Answer:

Hi, comfort CISSP exam information can be found via the ISC2 website.

This was helpful. Thank you for your feedback.

Rating and reviews

There haven't been any reviews for this course yet.

Leave a review

Modals

Mobile Navigation