Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add CISSP - Certified Information Systems Security Professional to your Wishlist.

Add to Wishlist

CISSP - Certified Information Systems Security Professional

Certificate in Certified Information Systems Security Professional. New Edition 2015
3.7 (55 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
842 students enrolled
Last updated 9/2015
English
$15 $35 57% off
30-Day Money-Back Guarantee
Includes:
  • 7 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
Description

The CISSP: Certified Information Systems Security Professional, covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge.

As the first certification of information security ANSI accredited with ISO recognition, the CISSP certification provides security professionals the information an objective measure of validity and professionalism recognized internationally. The certification demonstrates advanced knowledge within 8 domains of the (ISC) ² CISSP CBK


The CISSP exam tests one's competence in the 8 domains of the CISSP CBK, which cover:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². (ISC)² promotes the CISSP exam as an aid to evaluating personnel performing information security functions.

In this course, It is mentioned maps directly to the exam objectives and offers numerous features such as exam tips, case studies, and practice exams.

CISSP candidates must have a minimum of five years of professional work experience direct full-time security in two or more of the ten domains of the (ISC) 2® CISSP CBK®, or four years of professional work experience directly on security full time in two or more of the ten domains of the CISSP CBK with a tertiary degree.

Alternatively, there is a reduction from year to year professional experience requirement to possess an additional credential on the approved list of (ISC) 2

Who is the target audience?
  • Security Professionals who want to appear and excel in the CISSP course
Students Who Viewed This Course Also Viewed
What Will I Learn?
Appear for the CISSP certification Exam
Understand core concepts from the CISSP curriculum
Prepare for the exam in a better way
covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge
View Curriculum
Requirements
  • It is an advance course for Security Professionals and the student is expected to have working knowledge in the security field
Curriculum For This Course
Expand All 118 Lectures Collapse All 118 Lectures 06:49:00
+
Cryptography
15 Lectures 01:09:32

History of Cryptography
06:47

Cryptosystem Features
02:13

Encryption Systems
06:23

Substitution Ciphers
01:59

Symmetric Algorithms
07:19

Asymmetric Algorithms
05:06

Message Integrity
07:52

Digital Signatures
01:28

Public Key Infrastructure
06:19

Trusted Platform Module
02:41

Encryption Communication Levels
01:56

E-Mail Security
01:47

Internet Security
05:35

Cryptography Attacks
05:48
+
Physical (Environmental) Security
9 Lectures 31:39
Threat Mitigation Techniques
01:05

Geographical-Man Made and Political Threats
06:09

Site and Facility Design
04:35

Perimeter Security
05:27

Building and Internal Security
04:18

Secure Data Centers and Fire Detection Systems
03:53

Types of Power Issues
03:36

HVAC Guidelines
00:54

Equipment Security and Personal Security
01:42
+
Security Architecture and Design
13 Lectures 42:11
Security Model Concepts
00:57

System Architecture
05:05

Computing Platforms
01:56

Virtual Computing and Security Services
02:27

System Components
03:54

Memory Concepts
04:08

Enforcing Process Security and Multitasking
02:08

System Security Architecture
05:05

Security Models and Modes
04:59

System Evaluation and Assurance Levels
03:36

Certification and Accreditation
01:28

Security Architecture Threats
02:47

Database Security and Distributed Systems Security
03:41
+
Access Control
12 Lectures 43:50
Access Control Concepts
02:41

Identification and Authentication
02:31

Password Types and Management
04:39

Ownership-Character-Physiological-Behavioral Factors
04:10

Biometric Considerations
03:08

Authorization Concepts
03:28

User Accountability
03:10


Penetration Testing and Threat Modeling
03:36

Access Control Categories-Types-Models and Administration
06:38

Provisioning Life Cycle and Access Control Monitoring
03:48

Access Control Threats
05:12
+
Software Development Security
11 Lectures 29:32
System Development Life Cycle
01:23

Software Testing and Validation
01:48

Software Development Security Best Practices
00:57

Software Development Methods
06:54

Programming Languages
05:02

Database Architecture and Models
01:29

Database Interface Languages
00:52

Data Warehouse-Mining and Threats
01:05

Database and Application Access Control
01:49

Monitoring for Problems
01:28

Software Threats and Security
06:45
+
Information Security Governance and Risk Management
13 Lectures 41:46
Principles and Terms
03:47

Security Frameworks and Methodologies
05:37

Risk Assessment
01:51

Asset Values-Vulnerabilities and Threats
02:21

Quantitative Risk Analysis
05:59

Safeguard Selection
02:37

Risk Management
04:39

Security Governance Components
01:51

Security Policies
04:21

Classification Life Cycle
02:21

Responsibilities and Roles
02:11

Personnel Security
01:44

Security Awareness Training
02:27
+
Telecommunications and Network Security
12 Lectures 51:03
OSI and TCIP Models
07:11

IP Addressing
02:53

Transmission Methods
03:10

Types of Cabling
02:55

Network Topologies
06:19

Network Protocols and Services
03:59

Network Routing and Devices
07:22

Network Connection Types
04:02

Network Authentication
02:47

Wireless Technologies
02:29

WLAN Security Methods
01:54

Network Threats and Cabling Behaviors
06:02
+
Operation Security
10 Lectures 13:59
Operation Security Concepts
01:48


Asset and Media Management
02:55

Storage Options
02:05

Network and Resource Management
00:50

Incident Response and Change Management
01:13

Patch Management-Audit and Review
00:44

Threats and Preventative Measures
00:53

Trusted Paths-Trusted Recovery and System Hardening
01:03

Monitoring and Reporting
01:00
+
Business Continuity and Disaster Recovery
9 Lectures 39:08
Business Continuity and Disaster Recovery Concepts
06:02

BIA Development
06:32

Business Continuity Planning
02:26

Preventive Controls
02:54

Recovery Strategies
07:22

Data Backup Types
05:14

Data Recovery Terms
03:38

Critical Teams and Duties
02:12

BCP Testing
02:48
1 More Section
About the Instructor
3.7 Average rating
325 Reviews
2,679 Students
8 Courses
Master, MCSA, MCSE ,MCP, MCDST, A+, Network+, Security+

Naps Tecnologia Academy Inc - Formaciones en Linea, ahora pasa ser una academia de instructores Certificados en varias áreas de IT, Seguridad, Información, Proyectos y mucho mas! Disponemos de Cursos en categorías de Financias, Mobile Apps, Diseño y Multimedia, Redes, entre otros incluyendo cursos tanto en español como en ingles!

Responsable: CEO Juan Carlos Rodríguez García
Empresa: Naps Tecnologia Inc - Formaciones en Línea
Web: (En remodelación)

Certificaciones del CEO: MCT, MCSA, MCSE ,MCP, MCDST, A+, Network+, Security+, MVP 2010, MCITP y otras….

Experiencia del CEO:
Cuento con más de 15 años de experiencia en el campo de las computadoras y sistemas de información. Poseo un Bachillerato de la Universidad del Turabo y más de 30 certificaciones en el área de Servidores, Ethical Hacking, Windows Server y otras.

Autor de los libros:

  • El Arte del Hacking
  • Conviértete en un Ethical Hacker
  • Aprende Redes y Servidores
  • Aprende Joomla!
  • Aprende Windows 8
  • TOP SECRET

En el año 2010 fui elegido MVP “Microsoft Value Professional” en el área de Windows Experience. Este galardón se lo entrega Microsoft a diferentes profesionales en diferentes plataformas a nivel mundial. Me desempeño como Instructor y está certificado como: Microsoft Certified Trainer.

Actualmente dirijo la corporación del Colegio de Informática y Tecnología de Puerto Rico, institución licenciada por el Consejo de Educación de Puerto Rico.

Report Abuse