Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore CISSP Program Brochure

CISSP Program Brochure

Published by mouttou.rajkumar, 2020-06-10 09:05:06

Description: CISSP Program Brochure

Search

Read the Text Version

CISSP - Master Class Online Edition CISSP Certification provides the credibility and the mobility to advance your career in the Information security. The CISSP is the most sought-after certification for mid- level Info Sec professionals. CISSP Master Class is the most reliable training for anyone aspiring to crack their CISSP exam in the first attempt Who should attend : Security Consultants | Network Architects I Security Analysts I Security Auditors I IT Managers I Security Engineers I Directors / CIO / CTO Prerequisites : In order to appear for the CISSP Certifications, the candidate should possess a minimum of five years of full-time professional work experience in two or more of the eight domains of the CISSP – (ISC) CBK 2018. If the candidate has less than five years of experience, they will receive the Associate of (ISC) title. The Learning Outcomes : By the end of the program, you will be able to define the architecture, design, and management of the security of their organization. Will acquire the relevant knowledge and skills to pass the CISSP certification exam. You will be able to perform risk analysis and prevent data loss. The candidate also gains familiarity with communications and network security, identity and access management, and security testing and operations

Module 1 - Introduction to CBK 2019 Module 4 - Security Engineering Preparing for the CISSP – (ISC) CBK 2019 Security Architecture Security Models Module 2 - Security and Risk Management Evaluation Criteria System Security Information Security Management CPU Security Controls Memory Information Security Management and Security Mode Governance Cloud Computing Goals, IoT Mission, and Objectives Industrial Control System (ICS) Due Care Cryptography Security Policy Encryption Methods Compliance DES Computer Crimes Asymmetric Cryptography Legal Systems Public Key Infrastructure Intellectual Property (IP) Law Cryptanalysis Privacy Key Management General Data Protection Regulation Critical Path Analysis Security Site Location Risk Analysis Fire Types of Risk Analysis HVAC Security Control Assessment Threat Modelling Module 5 - Communications and Network Supply-Chain Risk Management Security Third-Party Management Business Continuity Planning Network Architecture and Design Business Continuity Planning Phases IP Addressing Managing Personnel Security Network Protocols Security Awareness Training Transmission Media Firewall Module 3 - Asset Security Intrusion Detection System and Intrusion Prevention System Information Classification Network Access Control (NAC) Data Classification Content Delivery Network (CDN) Data Life Cycle Networks Software-Defined Networking Data Management (SDN) Different Roles Remote Access Data Remanence Internet Security Protocol (IPsec) Privacy Voice over Internet Protocol (VoIP) States of Data Phreaking Data Loss Prevention Secure Access Protocols Wireless Technologies Network Attacks

Module 6 - Identity and Access Management Module 8 - Security Operations Identity Management Security Operations Biometrics Investigation Passwords Forensic Investigation Tokens Evidence Memory Cards and Smart Cards Electronic Discover· Access and Authorization Concepts Incident Management Identity Management Implementation Security Operations Management Kerberos Identity and Access Management Access Control Types Assets Access Control Models Malware Management Access Control Tools and Techniques Recovery and Backup Accountability Disaster Recovery Access Control Monitoring Perimeter Security Identity Proofing Markup Languages Module 9 - Software Development Security Identity as a Service (IDaaS) Software Development Security Module 7 - Security Assessment and Testing Importance of Software Development Security Security Assessment and Testing Programming Concepts Security Assessment Systems Development Life Cycle Vulnerability Assessment Application Program Interface Penetration Testing Software Security and Assurance Audits Database and Data Warehouse Log Management Environments Synthetic Transaction and Real Transaction Knowledge Management Testing Web Application Environment Software Testing Security Threats and Attacks Interface Key Performance Indicators (KPI)


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook