CISSP - Certified Information Systems Security Professional

Certificate in Certified Information Systems Security Professional. New Edition 2015
3.9 (49 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
775 students enrolled
$19
$35
46% off
Take This Course
  • Lectures 118
  • Length 7 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 9/2015 English

Course Description

The CISSP: Certified Information Systems Security Professional, covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge.

As the first certification of information security ANSI accredited with ISO recognition, the CISSP certification provides security professionals the information an objective measure of validity and professionalism recognized internationally. The certification demonstrates advanced knowledge within 8 domains of the (ISC) ² CISSP CBK


The CISSP exam tests one's competence in the 8 domains of the CISSP CBK, which cover:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². (ISC)² promotes the CISSP exam as an aid to evaluating personnel performing information security functions.

In this course, It is mentioned maps directly to the exam objectives and offers numerous features such as exam tips, case studies, and practice exams.

CISSP candidates must have a minimum of five years of professional work experience direct full-time security in two or more of the ten domains of the (ISC) 2® CISSP CBK®, or four years of professional work experience directly on security full time in two or more of the ten domains of the CISSP CBK with a tertiary degree.

Alternatively, there is a reduction from year to year professional experience requirement to possess an additional credential on the approved list of (ISC) 2

What are the requirements?

  • It is an advance course for Security Professionals and the student is expected to have working knowledge in the security field

What am I going to get from this course?

  • Appear for the CISSP certification Exam
  • Understand core concepts from the CISSP curriculum
  • Prepare for the exam in a better way
  • covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge

What is the target audience?

  • Security Professionals who want to appear and excel in the CISSP course

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
Introduction. CISSP Certification Goals
Preview
01:25
Security Professional Certification Value
Preview
01:25
Exam Common Body of Knowledge
Preview
00:49
Becoming a CISSP
Preview
02:25
Section 2: Cryptography
Cryptography Concepts
Preview
06:19
History of Cryptography
06:47
Cryptosystem Features
02:13
Encryption Systems
06:23
Substitution Ciphers
01:59
Symmetric Algorithms
07:19
Asymmetric Algorithms
05:06
Message Integrity
07:52
Digital Signatures
01:28
Public Key Infrastructure
06:19
Trusted Platform Module
02:41
Encryption Communication Levels
01:56
E-Mail Security
01:47
Internet Security
05:35
Cryptography Attacks
05:48
Section 3: Physical (Environmental) Security
Threat Mitigation Techniques
01:05
Geographical-Man Made and Political Threats
06:09
Site and Facility Design
04:35
Perimeter Security
05:27
Building and Internal Security
04:18
Secure Data Centers and Fire Detection Systems
03:53
Types of Power Issues
03:36
HVAC Guidelines
00:54
Equipment Security and Personal Security
01:42
Section 4: Security Architecture and Design
Security Model Concepts
00:57
System Architecture
05:05
Computing Platforms
01:56
Virtual Computing and Security Services
02:27
System Components
03:54
Memory Concepts
04:08
Enforcing Process Security and Multitasking
02:08
System Security Architecture
05:05
Security Models and Modes
04:59
System Evaluation and Assurance Levels
03:36
Certification and Accreditation
01:28
Security Architecture Threats
02:47
Database Security and Distributed Systems Security
03:41
Section 5: Access Control
Access Control Concepts
02:41
Identification and Authentication
02:31
Password Types and Management
04:39
Ownership-Character-Physiological-Behavioral Factors
04:10
Biometric Considerations
03:08
Authorization Concepts
03:28
User Accountability
03:10
Vulnerability Assessment
Preview
00:49
Penetration Testing and Threat Modeling
03:36
Access Control Categories-Types-Models and Administration
06:38
Provisioning Life Cycle and Access Control Monitoring
03:48
Access Control Threats
05:12
Section 6: Software Development Security
System Development Life Cycle
01:23
Software Testing and Validation
01:48
Software Development Security Best Practices
00:57
Software Development Methods
06:54
Programming Languages
05:02
Database Architecture and Models
01:29
Database Interface Languages
00:52
Data Warehouse-Mining and Threats
01:05
Database and Application Access Control
01:49
Monitoring for Problems
01:28
Software Threats and Security
06:45
Section 7: Information Security Governance and Risk Management
Principles and Terms
03:47
Security Frameworks and Methodologies
05:37
Risk Assessment
01:51
Asset Values-Vulnerabilities and Threats
02:21
Quantitative Risk Analysis
05:59
Safeguard Selection
02:37
Risk Management
04:39
Security Governance Components
01:51
Security Policies
04:21
Classification Life Cycle
02:21
Responsibilities and Roles
02:11
Personnel Security
01:44
Security Awareness Training
02:27
Section 8: Telecommunications and Network Security
OSI and TCIP Models
07:11
IP Addressing
02:53
Transmission Methods
03:10
Types of Cabling
02:55
Network Topologies
06:19
Network Protocols and Services
03:59
Network Routing and Devices
07:22
Network Connection Types
04:02
Network Authentication
02:47
Wireless Technologies
02:29
WLAN Security Methods
01:54
Network Threats and Cabling Behaviors
06:02
Section 9: Operation Security
Operation Security Concepts
01:48
Protecting Tangible and Intangible Assets
Preview
01:28

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Naps Tecnologia Academy Inc, Master, MCSA, MCSE ,MCP, MCDST, A+, Network+, Security+

Naps Tecnologia Academy Inc - Formaciones en Linea ahora pasa ser una academia de instructores Certificados en varias áreas de IT, Seguridad, Información, Proyectos y mucho mas! Disponemos de Cursos en categorías de Financias, Mobile Apps, Diseño y Multimedia, Redes, entre otros incluyendo cursos tanto en español como en ingles!

Responsable: CEO Juan Carlos Rodríguez García
Empresa: Naps Tecnologia Inc - Formaciones en Línea
Web: (En remodelación)

Certificaciones del CEO: MCT, MCSA, MCSE ,MCP, MCDST, A+, Network+, Security+, MVP 2010, MCITP y otras….

Experiencia del CEO:
Cuento con más de 15 años de experiencia en el campo de las computadoras y sistemas de información. Poseo un Bachillerato de la Universidad del Turabo y más de 30 certificaciones en el área de Servidores, Ethical Hacking, Windows Server y otras.

Autor de los libros:

  • El Arte del Hacking
  • Conviértete en un Ethical Hacker
  • Aprende Redes y Servidores
  • Aprende Joomla!
  • Aprende Windows 8
  • TOP SECRET

En el año 2010 fui elegido MVP “Microsoft Value Professional” en el área de Windows Experience. Este galardón se lo entrega Microsoft a diferentes profesionales en diferentes plataformas a nivel mundial. Me desempeño como Instructor y está certificado como: Microsoft Certified Trainer.

Actualmente dirijo la corporación del Colegio de Informática y Tecnología de Puerto Rico, institución licenciada por el Consejo de Educación de Puerto Rico.

Ready to start learning?
Take This Course