Cyber Security Manager
Learn how to effectively manage your organisation's cyber security.
StudyOnline247
Summary
- Exam(s) / assessment(s) not included in price, and must be purchased separately
Overview
Cyber Security Managers command salaries of £75,000 on average which makes them some of the top earners in the IT industry. Are you interested in cyber security and looking to expand on what you already know? Then a career as a Cyber Security Manager is just what you were looking for.
Certification
Certified Information Systems Security Professional (CISSP)
Description
This Cyber Security Manager course covers the Certified Information Systems Security Professional (CISSP) curriculum. CISSP is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)². As of 1 January 2018, there are 122,289 (ISC)² members holding the CISSP certification worldwide. This popular certification will allow you to live and work on the forefront of information security.
What you will learn
You will learn about the eight domains of the CISSP CBK — including discussion of industry best practices and timely security concepts. Some of the topics that will be covered include; operations security, disaster recovery planning, security management and more.
Why study online?
Online learning gives you the freedom that classroom-based training doesn’t. With no travelling costs you can participate from the convenience of your computer.
Curriculum
Module 1:
Introduction
Least Bad Answer Part 1
Least Bad Answer Part 2
Least Bad Answer Part 3
Least Bad Answer Part 4
Least Bad Answer Part 5
Least Bad Answer Part 6
Least Bad Answer Part 7
Ethics
Module 2:
Accounts And Identity Management - Part 1
Accounts And Identity Management - Part 2
Accounts And Identity Management - Part 3
Accounts And Identity Management - Part 4
Accounts And Identity Management - Part 5
Authentication Services – Part 1
Authentication Services – Part 2
Authentication Services – Part 3
Authentication Services – Part 4
Authentication Services – Part 5
Categories And Types – Part 1
Categories And Types – Part 2
Categories And Types – Part 3
Penetration Testing And Auditing – Part 1
Penetration Testing And Auditing – Part 2
Penetration Testing And Auditing – Part 3
Penetration Testing And Auditing – Part 4
Penetration Testing And Auditing – Part 5
Systems M A C D A C R B A C – Part 1
Systems M A C D A C R B A C – Part 2
Systems M A C D A C R B A C – Part 3
Systems M A C D A C R B A C – Part 4
Module 3:
Telecommunications
Wired Physical Interfaces
Physical Layer
Layer – Part 1
Layer – Part 2
Wireless
Wireless Lan
Layer 34 And Firewalls
Firewalls
Protocols
Transport Layer
Layers 5 And 6
Controls
Layer 5 Protocols
Presentation Layer
Layer 7
Authentication
Printing
Messaging
Security Protocol
Application Attacks
Honeypots
Telecommunications
Voice Over IP
Attacks
VOIP Controls
Module 4:
Layers of Protection
Penetration Testing
Vectors Of Test
Scope
Technical Penetration Testing
Pen Testing Methodology
Module 5:
Application Security – Part 1
Application Security – Part 2
Connectivity Interfaces And Applications
Malware
Attack Types
Malformed Input
Payload
Web Risks – Part 1
Web Risks – Part 2
Insecure Direct Object Reference
Security Misconfiguration
How To Pass The Exam
Overview
Risk Management
Patch Management
Levels Of Patch Management
Software Development Life Cycle – Part 1
Software Development Life Cycle – Part 2
Security
Module 6:
Cryptology
Symmetric Vs Asymmetric
Managing Key Sizes
Initialization Vector
Asymmetric
Crytology Law
Message Integrity Controls
Apply Integrity Controls
Digital Signature Overview
Types Of Encryption
Digital Signatures
Key Agreement
Hierarchical Trust Model
PGP And Digital Signatures
Spam Vs PKI
Cryptolography And Steganography
Investigating For Steganography
Code Breaking
Common Cryptanalytical Attacks
Types Of Attacks
Module 7:
Common Criteria And Trusted Computing Base – Part 1
Common Criteria And Trusted Computing Base – Part 2
Common Criteria And Trusted Computing Base – Part 3
Frameworks – Part 1
Frameworks – Part 2
Frameworks – Part 3
Frameworks – Part 4
Frameworks – Part 5
Hardware – Part 1
Hardware – Part 2
Hardware – Part 3
Security Architecture Models – Part 1
Security Architecture Models – Part 2
Security Architecture Models – Part 3
Security Architecture Models – Part 4
Security Architecture Models – Part 5
Software OS Design – Part 1
Software OS Design – Part 2
Software OS Design – Part 3
Software OS Design – Part 4
Module 8:
Data Classification – Part 1
Data Classification – Part 2
Data Classification – Part 3
Data Classification – Part 4
Data Backup And Control – Part 1
Data Backup And Control – Part 2
Data Backup And Control – Part 3
Data Backup And Control – Part 4
Privilege Entry Control – Part 1
Privilege Entry Control – Part 2
IDS And IPS – Part 1
IDS And IPS – Part 2
IDS And IPS – Part 3
Module 9:
Business Continuity Planning – Part 1
Business Continuity Planning – Part 2
Policy And Program Management – Part 1
Policy And Program Management – Part 2
Business Impact Analysis – Part 1
Business Impact Analysis – Part 2
Strategy Options
Incident Management Plans
Activity Response Plans
Test Plan
Embedding Business Continuity Plan
Module 10:
Law Domain – Part 1
Law Domain – Part 2
Law Domain – Part 3
Law Domain – Part 4
Incident Handling – Part 1
Incident Handling – Part 2
Incident Handling – Part 3
Incident Handling – Part 4
Legal Systems – Part 1
Legal Systems – Part 2
Intellectual Property – Part 1
Intellectual Property – Part 2
Intellectual Property – Part 3
Module 11:
Fire And Power – Part 1
Fire And Power – Part 2
Fire And Power – Part 3
Perimeter Barrier Lock Sensor Guard – Part 1
Perimeter Barrier Lock Sensor Guard – Part 2
Perimeter Barrier Lock Sensor Guard – Part 3
Perimeter Barrier Lock Sensor Guard – Part 4
Physical Security Planning – Part 1
Physical Security Planning – Part 2
Physical Security Planning – Part 3
Conclusion
Please note that the official exam is not included, however for those who complete the course, they will receive a completion certificate upon request.
Who is this course for?
This course is for those who are interested in challenging yourself to grow and be better. This course will strengthen the skills you need to protect your organisation from potantial threats. Once you are CISSP certified you can experience a career as an IT security professional an reap the benefits of a high paying job.
Requirements
There are no requirements for this course. However there is a requirement of 5 years work experience in at least 2 of the 8 CISSP domains. For more information please use the question and answer function at the bottom of this ad.
Career path
Cyber Security Manager
IT Manager
IT Security Architect
Security Systems Engineer
Chief Information Security Officer
Director of IT Security
IT Security Analyst
Questions and answers
hello I'm very interesting in make this course but please let me know everything with the exams how much I have to paid.
Answer:Hi, Alfonso Exam information is set by the ISC2 examining body and more information can be found on their website.
This was helpful.What are the eight domains to qualify for this course?
Answer:Hi, Shaun To qualify for the CISSP exam, you will need to have at least 5 years paid experience in at least of 2 of the following domains: Security and Risk Management Asset Security Security Engineering Communications and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security
This was helpful.I work as an intelligence analyst. Would this qualify?
Answer:You would need to check with the accrediting body
This was helpful.
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.