This course covers basic information related to CISSP certification. (Certified Information Systems Security Professional)
This FREE course includes lessons where you will learnwhat the CISSP Certification is and how to use these skills to become a paid security professional. This course is a starting point for you to chart your course to a well paying and satisfying Cyber Security career. This course will get you on the fast track to certification, and ultimately, relentlessly pursued by recruiters.
The demand for Certified Ethical Hackers, Cyber Security Engineers, Administrators, Consultants, Architects, Business Analysts, Project Managers, etc. is immense. The Certified Ethical Hacker certification is an attainable path to helping business protect their digital assets in the cloud and on-premise. You can do it!
What are the requirements?
• You only need an internet connection and a Udemy account to access the course.
What am I going to get from this course?
• Learn sample subject matter from the various CISSP domains
• Introduction to CISSP subject matter
What is the target audience?
• This course is intended for absolute beginners and IT professionals looking to make the move into the Cyber Security field. No programming experience or prior security knowledge is required. A basic understanding of networking and TCP/IP is helpful. This course is intended for anyone who is interested in a career in Cyber Security
• CISSP concepts teach many professionals to plan for and address Cyber Security issues on a daily basis using free open source software tools.
Here we will cover modern application architectures. It is critical to have an understanding of modern application architectures and components in order to understand how to secure them.
The foundational principles of information security which include confidentiality, integrity and availability. We will also identify common security services and the mechanisms used to implement those services.
While asset management may not be the most glamorous aspect of information security it foundational to success. Let’s talk about how asset management impacts the way we manage security.
Securing LAN environments if the first order of business when it comes to network security. Here we will talk about VLAN’s, Access Control Lists and TACACS and how we can leverage these controls to keep the bad guys out.
There are several core Access Control Models that serve as standards for privilege management. In this section we will cover these core models and explore the pros and cons associated with each.
Instructor Bio – Chad Russell
Join the Cyber Security Industry in 2017!
If you are interested in starting a career in the Cyber Security Industry 2016 is the time!
Learning the fundamentals of Cyber Security provides you with a powerful and very useful set of skills. Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.
Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.
Get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!
But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself. This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT.
Hello, I’m Chad Russell. I’ve been in the CyberSecurity industry for over 15 years. I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.
I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.
Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College I can help you get certified and get ahead!