Certified Information Systems Security Professional (CISSP)
This course will help you to become a certified cyber security professional.
StudyOnline247
Summary
- Exam(s) / assessment(s) not included in price, and must be purchased separately
Overview
Certified Information Systems Security Professional (CISSP) is a premier certification for those who want to demonstrate their knowledge and advance their careers. Become a member of a community of cyber-security leaders and show you have what it takes to design and implement an information security program.
Certification
Certified Information Systems Security Professional (CISSP)
Description
This Certified Information Systems Security Professional (CISSP) course covers everything you need to know to stay one step ahead and keep your organisation safe. This course is seen as an objective measure of excellence. Once you have completed the Certified Information Systems Security Professional (CISSP) you will be recognised as an IT Professional in the field of Security.
What you will learn
Once you have completed this course you will have the deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security of an organisation.
Curriculum
Module 1:
• Introduction
• Least Bad Answer Part 1
• Least Bad Answer Part 2
• Least Bad Answer Part 3
• Least Bad Answer Part 4
• Least Bad Answer Part 5
• Least Bad Answer Part 6
• Least Bad Answer Part 7
• Ethics
Module 2:
• Accounts And Identity Management - Part 1
• Accounts And Identity Management - Part 2
• Accounts And Identity Management - Part 3
• Accounts And Identity Management - Part 4
• Accounts And Identity Management - Part 5
• Authentication Services – Part 1
• Authentication Services – Part 2
• Authentication Services – Part 3
• Authentication Services – Part 4
• Authentication Services – Part 5
• Categories And Types – Part 1
• Categories And Types – Part 2
• Categories And Types – Part 3
• Penetration Testing And Auditing – Part 1
• Penetration Testing And Auditing – Part 2
• Penetration Testing And Auditing – Part 3
• Penetration Testing And Auditing – Part 4
• Penetration Testing And Auditing – Part 5
• Systems M A C D A C R B A C – Part 1
• Systems M A C D A C R B A C – Part 2
• Systems M A C D A C R B A C – Part 3
• Systems M A C D A C R B A C – Part 4
Module 3:
• Telecommunications
• Wired Physical Interfaces
• Physical Layer
• Layer – Part 1
• Layer – Part 2
• Wireless
• Wireless Lan
• Layer 34 And Firewalls
• Firewalls
• Protocols
• Transport Layer
• Layers 5 And 6
• Controls
• Layer 5 Protocols
• Presentation Layer
• Layer 7
• Authentication
• Printing
• Messaging
• Security Protocol
• Application Attacks
• Honeypots
• Telecommunications
• Voice Over IP
• Attacks
• VOIP Controls
Module 4:
• Layers of Protection
• Penetration Testing
• Vectors Of Test
• Scope
• Technical Penetration Testing
• Pen Testing Methodology
Module 5:
• Application Security – Part 1
• Application Security – Part 2
• Connectivity Interfaces And Applications
• Malware
• Attack Types
• Malformed Input
• Payload
• Web Risks – Part 1
• Web Risks – Part 2
• Insecure Direct Object Reference
• Security Misconfiguration
• How To Pass The Exam
• Overview
• Risk Management
• Patch Management
• Levels Of Patch Management
• Software Development Life Cycle – Part 1
• Software Development Life Cycle – Part 2
• Security
Module 6:
• Cryptology
• Symmetric Vs Asymmetric
• Managing Key Sizes
• Initialization Vector
• Asymmetric
• Crytology Law
• Message Integrity Controls
• Apply Integrity Controls
• Digital Signature Overview
• Types Of Encryption
• Digital Signatures
• Key Agreement
• Hierarchical Trust Model
• PGP And Digital Signatures
• Spam Vs PKI
• Cryptolography And Steganography
• Investigating For Steganography
• Code Breaking
• Common Cryptanalytical Attacks
• Types Of Attacks
Module 7:
• Common Criteria And Trusted Computing Base – Part 1
• Common Criteria And Trusted Computing Base – Part 2
• Common Criteria And Trusted Computing Base – Part 3
• Frameworks – Part 1
• Frameworks – Part 2
• Frameworks – Part 3
• Frameworks – Part 4
• Frameworks – Part 5
• Hardware – Part 1
• Hardware – Part 2
• Hardware – Part 3
• Security Architecture Models – Part 1
• Security Architecture Models – Part 2
• Security Architecture Models – Part 3
• Security Architecture Models – Part 4
• Security Architecture Models – Part 5
• Software OS Design – Part 1
• Software OS Design – Part 2
• Software OS Design – Part 3
• Software OS Design – Part 4
Module 8:
• Data Classification – Part 1
• Data Classification – Part 2
• Data Classification – Part 3
• Data Classification – Part 4
• Data Backup And Control – Part 1
• Data Backup And Control – Part 2
• Data Backup And Control – Part 3
• Data Backup And Control – Part 4
• Privilege Entry Control – Part 1
• Privilege Entry Control – Part 2
• IDS And IPS – Part 1
• IDS And IPS – Part 2
• IDS And IPS – Part 3
Module 9:
• Business Continuity Planning – Part 1
• Business Continuity Planning – Part 2
• Policy And Program Management – Part 1
• Policy And Program Management – Part 2
• Business Impact Analysis – Part 1
• Business Impact Analysis – Part 2
• Strategy Options
• Incident Management Plans
• Activity Response Plans
• Test Plan
• Embedding Business Continuity Plan
Module 10:
• Law Domain – Part 1
• Law Domain – Part 2
• Law Domain – Part 3
• Law Domain – Part 4
• Incident Handling – Part 1
• Incident Handling – Part 2
• Incident Handling – Part 3
• Incident Handling – Part 4
• Legal Systems – Part 1
• Legal Systems – Part 2
• Intellectual Property – Part 1
• Intellectual Property – Part 2
• Intellectual Property – Part 3
Module 11:
• Fire And Power – Part 1
• Fire And Power – Part 2
• Fire And Power – Part 3
• Perimeter Barrier Lock Sensor Guard – Part 1
• Perimeter Barrier Lock Sensor Guard – Part 2
• Perimeter Barrier Lock Sensor Guard – Part 3
• Perimeter Barrier Lock Sensor Guard – Part 4
• Physical Security Planning – Part 1
• Physical Security Planning – Part 2
• Physical Security Planning – Part 3
• Conclusion
Please note that the official exam is not included, however for those who complete the course, they will receive a completion certificate upon request.
Who is this course for?
This course is for those who are interested in a career in Security and want to be a Certified Information Systems Security Professional (CISSP).
Requirements
There are no prerequisites to study this CISSP training course, however, to be eligible to write the exam you will be required to have a minimum of 5 years full time paid work experience in at least two of the eight CISSP domains.
Career path
Network Architect
IT Security Architect
IT Manager
Security Systems Engineer
Chief Information Security Officer
Director of IT Security
IT Security Analyst
Questions and answers
how much is the exam/assessment fee?
Answer:Hi, comfort CISSP exam information can be found via the ISC2 website.
This was helpful.I have no experience in IT industry but this year I´ve got my compTIA Security+. Would it be difficult for me if I have no working experience?
Answer:We can only answer course related questions. Speak with a recruitment consultant
This was helpful.
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.