CISSP® Certified Information Systems Security Professional (cybersecurity) - eLearning (without exam)

450,00 EUR

  • 67 hours
Blended Learning
eLearning
Live Virtual Classroom

CISSP certification training develops your expertise in defining IT architecture and designing, building, and maintaining a secure business environment using globally approved information security standards. This course covers industry best practices and prepares you for the CISSP certification exam held by (ISC).

Course timeline

Hero
  1. Course Introduction

    Lesson 01

  2. Security and Risk Management

    Lesson 02

    - Security and Risk Management

    - Information Security Management

    - Security Controls

    - Information Security Management and Governance

    - Goals, Mission, and Objectives

    - Due Care

    - Security Policy

    - Compliance

    - Computer Crimes

    - Legal Systems

    - Intellectual Property (IP) Law

    - Privacy

    - General Data Protection Regulation

    - Security

    - Risk Analysis

    - Types of Risk Analysis

    - Security Control Assessment

    - Threat Modeling

    - Supply-Chain Risk Management

    - Third-Party Management

    - Business Continuity Planning

    - Business Continuity Planning Phases

    - Managing Personnel Security

    - Security Awareness Training

    - Program Effectiveness Evaluation

    - Key Takeaways

    - Knowledge Check

  3. Asset Security

    Lesson 03

    - Asset Security

    - Information Classification

    - Data Classification

    - Data Life Cycle

    - Data Management

    - Different Roles

    - Data Remanence

    - Privacy

    - States of Data

    - Data Loss Prevention

    - Key Takeaways

    - Knowledge Check

  4. Security Engineering

    Lesson 04

    - Introduction

    - Security Engineering

    - Security Architecture

    - Security Models

    - Evaluation Criteria

    - System Security

    - CPU

    - Memory

    - Security Mode

    - Cloud Computing

    - IoT

    - Industrial Control System (ICS)

    - Cryptography

    - Encryption Methods

    - DES

    - Asymmetric Cryptography

    - Public Key Infrastructure

    - Cryptanalysis

    - Key Management

    - Critical Path Analysis

    - Site Location

    - Fire

    - HVAC

    - Key Takeaways

    - Knowledge Check

  5. Communications and Network Security

    Lesson 05

    - Introduction

    - Network Architecture and Design

    - IP Addressing

    - Network Protocols

    - Transmission Mediaç

    - Firewall

    - Intrusion Detection System and Intrusion Prevention System

    - Network Access Control (NAC)

    - Content Delivery Network (CDN)

    - Networks

    - Software-Defined Networking (SDN)

    - Remote Access

    - Internet Security Protocol (IPsec)

    - Voice over Internet Protocol (VoIP)

    - Phreaking

    - Secure Access Protocols

    - Wireless Technologies

    - Network Attacks

    - Key Takeaways

    - Knowledge Check

  6. Identity and Access Management

    Lesson 06

    - Identity and Access Management

    - Identity Management

    - Biometrics

    - Passwords

    - Tokens

    - Memory Cards and Smart Cards

    - Access and Authorization Concepts

    - Identity Management Implementation

    - Kerberos

    - Access Control Types

    - Access Control Models

    - Access Control Tools and Techniques

    - Accountability

    - Access Control Monitoring

    - Identity Proofing

    - Markup Languages

    - Identity as a Service (IDaaS)

    - Key Takeaways

    - Knowledge Check

  7. Security Assessment and Testing

    Lesson 07

    - Security Assessment and Testing

    - Security Assessment

    - Vulnerability Assessment

    - Penetration Testing

    - Audits

    - Log Management

    - Synthetic Transaction and Real Transaction

    - Testing

    - Software Testing

    - Interface

    - Key Performance Indicators (KPI)

    - Key Takeaways

    - Knowledge Check

  8. Security Operations

    Lesson 08

    - Security Operations

    - Investigation

    - Forensic Investigation

    - Evidence

    - Electronic Discovery

    - Incident Management

    - Security Operations Management

    - Identity and Access Management

    - Assets

    - Malware

    - Management

    - Recovery and Backup

    - Disaster Recovery

    - Perimeter Security

    - Key Takeaways

    - Knowledge Check

  9. Software Development Security

    Lesson 09

    - Software Development Security

    - Importance of Software Development Security

    - Programming Concepts

    - Systems Development Life Cycle

    - Application Program Interface

    - Software Security and Assurance

    - Database and Data Warehouse Environments

    - Knowledge Management

    - Web Application Environment

    - Security Threats and Attacks

    - Key Takeaways

    - Knowledge Check

Learning Outcomes

At the end of this CISSP eLearning Course ,you will be able to:

Be able to define the architecture, design, and management of the security of your organization

Acquire the relevant knowledge and skills required to pass the CISSP certification exam

Perform risk analysis and prevent data loss

Learn about security architecture, engineering, models, and cryptography

Gain familiarity with communications and network security, identity and access management, and security testing and operations.

Key Features

67 Hours of blended learning

35 Hours of online self-placed learning

48 Hours of instructor-led training

Five simulation test papers to prepare you for CISSP Certification

Hero

Who Should Enroll in this Program?

The CISSP is ideal for experienced security practitioners, managers, and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions:

Chief Information Security Officer

Chief Information Officer

Director of Security

IT Director/Manager

Security Analyst

Security Manger

Security Auditor

Security Architect

Security Consultant

Network Architect

Start course now

Prerequisites

Candidates must have at least five years cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Earning a four-year college degree or regional equivalent or an additional credential from the (ISC)2 approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience. A candidate that doesn’t have the required experience to become a CISSP may become an Associate of (ISC)2 by successfully passing the CISSP examination. The Associate of (ISC)2 will then have six years to earn the five years required experience.

Completion Criteria:

Online Classroom:

  • Attend one complete batch
  • Complete one simulation test with a minimum score of 60 percent

Online Self-Learning:

  • Complete 85 percent of the course
  • Complete one simulation test with a minimum score of 60 percent

Need corporate solutions or LMS integration?

Didn't find the course or program which would work for your business? Need LMS integration? Write us, we will solve everything!

;