CISSP is the premier certification for today's information system security professional. It is a premier certification from the international Information System Security Certification Consortium, Inc (ISC) 2 ®. The skill and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information system security field.Course ContentLesson 1: Security and Risk ManagementTopic A: Security Governance PrinciplesTopic B: ComplianceTopic C: Professional EthicsTopic D: Security DocumentationTopic E: Risk ManagementTopic F: Threat ModelingTopic G: Business Continuity Plan FundamentalsTopic H: Acquisition Strategy and PracticeTopic I: Personnel Security PoliciesTopic J: Security Awareness and TrainingLesson 2: Asset SecurityTopic A: Asset ClassificationTopic B: Privacy ProtectionTopic C: Asset RetentionTopic D: Data Security ControlsTopic E: Secure Data HandlingLesson 3: Security EngineeringTopic A: Security in the Engineering LifecycleTopic B: System Component SecurityTopic C: Security ModelsTopic D: Controls and Countermeasures in Enterprise SecurityTopic E: Information System Security CapabilitiesTopic F: Design and Architecture Vulnerability MitigationTopic G: Vulnerability Mitigation in Embedded, Mobile, and Web-Based SystemsTopic H: Cryptography ConceptsTopic I: Cryptography TechniquesTopic J: Site and Facility Design for Physical SecurityTopic K: Physical Security Implementation in Sites and FacilitiesLesson 4: Communications and Network SecurityTopic A: Network Protocol SecurityTopic B: Network Components SecurityTopic C: Communication Channel SecurityTopic D: Network Attack MitigationLesson 5: Identity and Access ManagementTopic A: Physical and Logical Access ControlTopic B: Identification, Authentication, and AuthorizationTopic C: Identity as a ServiceTopic D: Authorization MechanismsTopic E: Access Control Attack MitigationLesson 6: Security Assessment and TestingTopic A: System Security Control TestingTopic B: Software Security Control TestingTopic C: Security Process Data CollectionTopic D: AuditsLesson 7: Security OperationsTopic A: Security Operations ConceptsTopic B: Physical SecurityTopic C: Personnel SecurityTopic D: Logging and MonitoringTopic E: Preventative MeasuresTopic F: Resource Provisioning and ProtectionTopic G: Patch and Vulnerability ManagementTopic H: Change ManagementTopic I: Incident ResponseTopic J: InvestigationsTopic K: Disaster Recovery PlanningTopic L: Disaster Recovery StrategiesTopic M: Disaster Recovery ImplementationLesson 8: Software Development SecurityTopic A: Security Principles in the System LifecycleTopic B: Security Principles in the Software Development LifecycleTopic C: Database Security in Software DevelopmentTopic D: Security Controls in the Development EnvironmentTopic E: Software Security Effectiveness Assessment
Overview
Taught by
Computer Training Source, Inc.