CISSP - Certified Information Systems Security Professional
3.9 (92 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,133 students enrolled
Wishlisted Wishlist

Please confirm that you want to add CISSP - Certified Information Systems Security Professional to your Wishlist.

Add to Wishlist

CISSP - Certified Information Systems Security Professional

CISSP Certification Course - Certified Information Systems Security Professional 2015
3.9 (92 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,133 students enrolled
Last updated 2/2017
English
Current price: $12 Original price: $200 Discount: 94% off
3 days left at this price!
30-Day Money-Back Guarantee
Includes:
  • 7.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion

Training 5 or more people?

Get your team access to Udemy's top 2,000 courses anytime, anywhere.

Try Udemy for Business
What Will I Learn?
  • Understand access control systems and methodology
  • Apply application and systems development security
  • Implement business continuity planning & disaster recovery planning
  • Understand Cryptography and how it's used
  • Understand law, investigation and ethics
  • Implement operations security
  • Implement physical security
  • Understand security architecture and models
  • Handle security management practices
  • Understand telecommunications and networking security
View Curriculum
Requirements
  • Roughly five years of direct full-time security work experience is recommended, but not required
Description

The CISSP: Certified Information Systems Security Professional Certification certification training package covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge.  

The new eight domains are:

  1. Security and Risk Management
  2. Asset Security
  3. Security Engineering
  4. Communications and Network Security
  5. Identity and Access Management
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². (ISC)² promotes the CISSP exam as an aid to evaluating personnel performing information security functions.  Candidates for this exam are typically network security professionals and system administrators with at least four years of direct work experience in two or more of the ten test domains.  As the first ANSI ISO accredited credential in the field of information security, the Certified Information Systems Security Professional (CISSP) certification provides information security professionals with not only an objective measure of competence, but a globally recognized standard of achievement.

Who is the target audience?
  • Experienced IT security-related practitioners, auditors, consultants, investigators or instructors, including network or security analysts and engineers, network administrators, information security specialists and risk management professionals, who wish to advance their current computer security careers
Compare to Other CISSP Courses
Curriculum For This Course
145 Lectures
07:44:24
+
Course Introduction
1 Lecture 00:18
+
The CISSP Exam
5 Lectures 06:19
Introduction
00:15

CISSP Certification Goals
01:25

Security Professional Certification Value
01:25

Exam Common Body of Knowledge
00:49

+
Cryptography
20 Lectures 01:23:01
Introduction
00:18

Cryptography Concepts Part1
06:19

Cryptography Concepts Part2
02:53

History of Cryptography
06:47

Cryptosystem Features
02:13

Encryption Systems Part1
06:23

Encryption Systems Part2
03:04

Substitution Ciphers
01:58

Symmetric Algorithms Part1
07:19

Symmetric Algorithms Part2
05:11


Message Integrity
07:52

Digital Signatures
01:28

Public Key Infrastructure Part1
06:19

Public Key Infrastructure Part2
02:04

Trusted Platform Module
02:41

Encryption Communication Levels
01:56

E-Mail Security
01:47

Internet Security
05:35

Cryptography Attacks
05:48
+
Physical (Environmental) Security
10 Lectures 31:56
Introduction
00:18


Geographical-Man Made and Political Threats
06:09

Site and Facility Design
04:35

Perimeter Security
05:27

Building and Internal Security
04:18

Secure Data Centers and Fire Detection Systems
03:53

Types of Power Issues
03:36

HVAC Guidelines
00:54

Equipment Security and Personal Security
01:42
+
Security Architecture and Design
15 Lectures 45:37
Introduction
00:23

Security Model Concepts
00:57


Computing Platforms
01:56

Virtual Computing and Security Services
02:27

System Components
03:54

Memory Concepts
04:08

Enforcing Process Security and Multitasking
02:08

System Security Architecture
05:05

Security Models and Modes Part1
04:58

Security Models and Modes Part2
04:28

System Evaluation and Assurance Levels
03:36

Certification and Accreditation
01:28

Security Architecture Threats
02:46

Database Security and Distributed Systems Security
03:40
+
Access Control
14 Lectures 48:07
Introduction
00:19


Identification and Authentication
02:30

Password Types and Management
04:39

Ownership-Character-Physiological-Behavioral Factors
04:10

Biometric Considerations
03:08

Authorization Concepts Part1
03:28

Authorization Concepts Part2
03:59

User Accountability
03:10

Vulnerability Assessment
00:49

Penetration Testing and Threat Modeling
03:36

Access Control Categories-Types-Models and Administration
06:38

Provisioning Life Cycle and Access Control Monitoring
03:48

Access Control Threats
05:12
+
Software Development Security
12 Lectures 29:51
Introduction
00:21

System Development Life Cycle
01:23


Software Development Security Best Practices
00:57

Software Development Methods
06:54

Programming Languages
05:02

Database Architecture and Models
01:28

Database Interface Languages
00:52

Data Warehouse-Mining and Threats
01:04

Database and Application Access Control
01:49

Monitoring for Problems
01:28

Software Threats and Security
06:45
+
Information Security Governance and Risk Management
15 Lectures 47:13
Introduction
00:14


Security Frameworks & Methodologies Part1
05:37

Security Frameworks & Methodologies Part2
05:15

Risk Assessment
01:51

Asset Values-Vulnerabilities and Threats
02:20

Quantitative Risk Analysis
05:59

Safeguard Selection
02:37

Risk Management
04:39

Security Governance Components
01:51

Security Policies
04:21

Classification Life Cycle
02:20

Responsibilities and Roles
02:11

Personnel Security
01:44

Security Awareness Training
02:27
+
Telecommunications and Network Security
15 Lectures 57:49
Introduction
00:16


OSI and TCIP Models Part2
01:52

IP Addressing
02:53

Transmission Methods
03:10

Types of Cabling
02:55

Network Topologies
06:19

Network Protocols and Services
03:59

Network Routing and Devices
07:22

Network Connection Types Part1
04:01

Network Connection Types Part2
04:40

Network Authentication
02:47

Wireless Technologies
02:29

WLAN Security Methods
01:54

Network Threats and Cabling Behaviors
06:02
+
Operation Security
11 Lectures 14:12
Introduction
00:16

Operation Security Concepts
01:48

Protecting Tangible and Intangible Assets
01:28

Asset and Media Management
02:55


Network and Resource Management
00:49

Incident Response and Change Management
01:12

Patch Management-Audit and Review
00:44

Threats and Preventative Measures
00:53

Trusted Paths-Trusted Recovery and System Hardening
01:02

Monitoring and Reporting
01:00
2 More Sections
About the Instructor
iCollege Certifications
4.1 Average rating
2,115 Reviews
13,729 Students
100 Courses
Certification Leader

iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

Utilizing state of the art technologies, highly experienced consultants and innovative methodologies, we provide, cutting-edge education products, services and solutions for individuals, corporate organizations, governmental institutions and education providers.

Our collective knowledge and experience in education and training sets the standard for service delivery in learning solutions.

Stone River eLearning
4.2 Average rating
17,325 Reviews
286,539 Students
203 Courses
280,000+ Happy Udemy Students

At Stone River eLearning, technology is all we teach. If you're interested in programming, development or design - we have it covered. 

Check out our huge catalog of courses and join the over 450,000 students currently taking Stone River eLearning courses. We currently offer 100+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.