Skip to content

Cyber Security Manager

Learn how to effectively manage your organisation's cyber security.


StudyOnline247

Summary

Price
£199 inc VAT
Or £66.33/mo. for 3 months...
Study method
Online
Duration
1 month · Self-paced
Certification
Certified Information Systems Security Professional (CISSP)
Professional certification What's this?
Additional info
  • Exam(s) / assessment(s) not included in price, and must be purchased separately

Overview

Cyber Security Managers command salaries of £75,000 on average which makes them some of the top earners in the IT industry. Are you interested in cyber security and looking to expand on what you already know? Then a career as a Cyber Security Manager is just what you were looking for.

Certification

Certified Information Systems Security Professional (CISSP)

Description

This Cyber Security Manager course covers the Certified Information Systems Security Professional (CISSP) curriculum. CISSP is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)². As of 1 January 2018, there are 122,289 (ISC)² members holding the CISSP certification worldwide. This popular certification will allow you to live and work on the forefront of information security.

What you will learn

You will learn about the eight domains of the CISSP CBK — including discussion of industry best practices and timely security concepts. Some of the topics that will be covered include; operations security, disaster recovery planning, security management and more.

Why study online?

Online learning gives you the freedom that classroom-based training doesn’t. With no travelling costs you can participate from the convenience of your computer.

Curriculum

Module 1:

Introduction

Least Bad Answer Part 1

Least Bad Answer Part 2

Least Bad Answer Part 3

Least Bad Answer Part 4

Least Bad Answer Part 5

Least Bad Answer Part 6

Least Bad Answer Part 7

Ethics

Module 2:

Accounts And Identity Management - Part 1

Accounts And Identity Management - Part 2

Accounts And Identity Management - Part 3

Accounts And Identity Management - Part 4

Accounts And Identity Management - Part 5

Authentication Services – Part 1

Authentication Services – Part 2

Authentication Services – Part 3

Authentication Services – Part 4

Authentication Services – Part 5

Categories And Types – Part 1

Categories And Types – Part 2

Categories And Types – Part 3

Penetration Testing And Auditing – Part 1

Penetration Testing And Auditing – Part 2

Penetration Testing And Auditing – Part 3

Penetration Testing And Auditing – Part 4

Penetration Testing And Auditing – Part 5

Systems M A C D A C R B A C – Part 1

Systems M A C D A C R B A C – Part 2

Systems M A C D A C R B A C – Part 3

Systems M A C D A C R B A C – Part 4

Module 3:

Telecommunications

Wired Physical Interfaces

Physical Layer

Layer – Part 1

Layer – Part 2

Wireless

Wireless Lan

Layer 34 And Firewalls

Firewalls

Protocols

Transport Layer

Layers 5 And 6

Controls

Layer 5 Protocols

Presentation Layer

Layer 7

Authentication

Printing

Messaging

Security Protocol

Application Attacks

Honeypots

Telecommunications

Voice Over IP

Attacks

VOIP Controls

Module 4:

Layers of Protection

Penetration Testing

Vectors Of Test

Scope

Technical Penetration Testing

Pen Testing Methodology

Module 5:

Application Security – Part 1

Application Security – Part 2

Connectivity Interfaces And Applications

Malware

Attack Types

Malformed Input

Payload

Web Risks – Part 1

Web Risks – Part 2

Insecure Direct Object Reference

Security Misconfiguration

How To Pass The Exam

Overview

Risk Management

Patch Management

Levels Of Patch Management

Software Development Life Cycle – Part 1

Software Development Life Cycle – Part 2

Security

Module 6:

Cryptology

Symmetric Vs Asymmetric

Managing Key Sizes

Initialization Vector

Asymmetric

Crytology Law

Message Integrity Controls

Apply Integrity Controls

Digital Signature Overview

Types Of Encryption

Digital Signatures

Key Agreement

Hierarchical Trust Model

PGP And Digital Signatures

Spam Vs PKI

Cryptolography And Steganography

Investigating For Steganography

Code Breaking

Common Cryptanalytical Attacks

Types Of Attacks

Module 7:

Common Criteria And Trusted Computing Base – Part 1

Common Criteria And Trusted Computing Base – Part 2

Common Criteria And Trusted Computing Base – Part 3

Frameworks – Part 1

Frameworks – Part 2

Frameworks – Part 3

Frameworks – Part 4

Frameworks – Part 5

Hardware – Part 1

Hardware – Part 2

Hardware – Part 3

Security Architecture Models – Part 1

Security Architecture Models – Part 2

Security Architecture Models – Part 3

Security Architecture Models – Part 4

Security Architecture Models – Part 5

Software OS Design – Part 1

Software OS Design – Part 2

Software OS Design – Part 3

Software OS Design – Part 4

Module 8:

Data Classification – Part 1

Data Classification – Part 2

Data Classification – Part 3

Data Classification – Part 4

Data Backup And Control – Part 1

Data Backup And Control – Part 2

Data Backup And Control – Part 3

Data Backup And Control – Part 4

Privilege Entry Control – Part 1

Privilege Entry Control – Part 2

IDS And IPS – Part 1

IDS And IPS – Part 2

IDS And IPS – Part 3

Module 9:

Business Continuity Planning – Part 1

Business Continuity Planning – Part 2

Policy And Program Management – Part 1

Policy And Program Management – Part 2

Business Impact Analysis – Part 1

Business Impact Analysis – Part 2

Strategy Options

Incident Management Plans

Activity Response Plans

Test Plan

Embedding Business Continuity Plan

Module 10:

Law Domain – Part 1

Law Domain – Part 2

Law Domain – Part 3

Law Domain – Part 4

Incident Handling – Part 1

Incident Handling – Part 2

Incident Handling – Part 3

Incident Handling – Part 4

Legal Systems – Part 1

Legal Systems – Part 2

Intellectual Property – Part 1

Intellectual Property – Part 2

Intellectual Property – Part 3

Module 11:

Fire And Power – Part 1

Fire And Power – Part 2

Fire And Power – Part 3

Perimeter Barrier Lock Sensor Guard – Part 1

Perimeter Barrier Lock Sensor Guard – Part 2

Perimeter Barrier Lock Sensor Guard – Part 3

Perimeter Barrier Lock Sensor Guard – Part 4

Physical Security Planning – Part 1

Physical Security Planning – Part 2

Physical Security Planning – Part 3

Conclusion

Please note that the official exam is not included, however for those who complete the course, they will receive a completion certificate upon request.

Who is this course for?

This course is for those who are interested in challenging yourself to grow and be better. This course will strengthen the skills you need to protect your organisation from potantial threats. Once you are CISSP certified you can experience a career as an IT security professional an reap the benefits of a high paying job.

Requirements

There are no requirements for this course. However there is a requirement of 5 years work experience in at least 2 of the 8 CISSP domains. For more information please use the question and answer function at the bottom of this ad.

Career path

Cyber Security Manager
IT Manager
IT Security Architect
Security Systems Engineer
Chief Information Security Officer
Director of IT Security
IT Security Analyst

Questions and answers


No questions or answers found containing ''.


Alfonso asked:

hello I'm very interesting in make this course but please let me know everything with the exams how much I have to paid.

Answer:

Hi, Alfonso Exam information is set by the ISC2 examining body and more information can be found on their website.

This was helpful. Thank you for your feedback.
Shaun asked:

What are the eight domains to qualify for this course?

Answer:

Hi, Shaun To qualify for the CISSP exam, you will need to have at least 5 years paid experience in at least of 2 of the following domains: Security and Risk Management Asset Security Security Engineering Communications and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

This was helpful. Thank you for your feedback.
Nadia asked:

I work as an intelligence analyst. Would this qualify?

Answer:

You would need to check with the accrediting body

This was helpful. Thank you for your feedback.
Dj asked:

I have been a security guard since 2015..would this be acceptable with the cissp domains

Answer:

Hi, Dj This certificate is aimed at IT security professionals who have at least 5 years of paid experience in one of the following IT domains: Security and Risk Management Asset Security Security Engineering Communications and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

This was helpful. Thank you for your feedback.
Marcelot asked:

Can you explain better regarding the examination and certificate of this particular course?

Answer:

It is based on the sylubus of CISSP

This was helpful. Thank you for your feedback.
Barry asked:

How is the course delivered? How many hours? How long do you have access to the course materials

Answer:

the course is delivered online with 1 months access

This was helpful. Thank you for your feedback.
Barry asked:

Reed cannot process my credit card because I am in the US, so I need to take this course directly. How do I achieve this?

Answer:

This course is only available on Reed

This was helpful. Thank you for your feedback.
Jerome asked:

If I complete this course could I apply for high earning roles as Cyber Security Manager? And how much weight does the certificate hold?

Answer:

The course follows the CISSP curriculum. This is set by the ISC2 examining body and more information can be found on their website

This was helpful. Thank you for your feedback.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.