25

Key Highlights

  • Category: Cyber Security
  • Duration: 48 watching hours
  • Certificate: On completion
  • Price: $2999  $3099
  • Enroll Now

Course Description

The Certified Information Systems Security Professional (CISSP) certification is considered the gold standard in the field of information security. This CISSP training is aligned with (ISC)² CBK 2018 requirements and will train you to become an information assurance professional who defines all aspects of IT security, including architecture, design, management, and controls. Most IT security positions require or prefer a CISSP certification, so get started with your CISSP training today.

Course Objectives

EduBuddyz CISSP® certification training is aligned to the (ISC)² CBK 2018 requirements. The course trains you in the industry’s latest best practices which will help you pass the exam in the first attempt. The certification helps you develop expertise in defining the architecture and in designing, building, and maintaining a secure business environment for your organization using globally approved Information Security standards.

Course Outline

  • Course Introduction
  • Introduction
  • Security Controls
  • Information Security Management and Governance
  • Goals Mission and Objectives
  • Due Care
  • Security Policy
  • Compliance
  • Computer Crimes
  • Risk Analysis
  • Types of Risk Analysis
  • Supply-Chain Risk Management
  • Third-Party Management
  • Business Continuity
  • Knowledge Check
  • Asset Security
  • Data Classification
  • Data Life Cycle
  • Data Management(1)
  • Data Remanence
  • Privacy
  • States of Data
  • Data Loss Prevention
  • Key Takeaways
  • Knowledge Check
  • Security Engineering
  • Security Architecture
  • Evaluation Criteria
  • System Security
  • CPU
  • Memory
  • Security Mode
  • Cloud computing
  • Cryptography
  • Encryption Methods
  • Asymmetric Cryptography
  • Public Key Infrastructure
  • Cryptanalysis
  • Site Location
  • Key Takeaways
  • Knowledge Check
  • Introduction
  • IP Addressing
  • Network Protocols
  • Transmission Media
  • Intrusion Detection System and Intrusion Prevention System
  • Firewall
  • Network Access Control (NAC)
  • Content Delivery Network (CDN)
  • Networks
  • Phreaking
  • Secure Access Protocols
  • Wireless Technologies
  • Network Attacks
  • Key Takeaways
  • Knowledge Check
  • Identity and Access Management
  • Identity Management
  • Biometrics
  • Passwords
  • Tokens
  • Memory Cards and Smart Cards
  • Identity Management Implementation
  • Kerberos
  • Access Control Types
  • Access Control Models
  • Accountability
  • Access Control Monitoring
  • Identity Proofing
  • Markup Languages
  • Identity as a Service IaaS
  • Key Takeaways
  • Knowledge Check
  • Security Assessment
  • Vulnerability Assessment
  • Penetration Testing
  • Audits
  • Log Management
  • Synthetic Transaction and Real Transaction
  • Testing
  • Software Testing
  • Interface
  • Key Performance Indicators KPI
  • Key Takeaway
  • Knowledge Check
  • Investigation
  • Forensic investigation
  • Evidence
  • Electronic discovery
  • Incident Management
  • Security Operations Management
  • Identity and Access Management
  • Assets
  • Recovery and Backup
  • Perimeter Security
  • Key Takeaways
  • Knowledge Check
  • Software Development Security
  • Importance of Software Development Security
  • Programming Concepts
  • Application Program Interface
  • Database and Data Warehouse Environments
  • Knowledge Management
  • Web Application Environment
  • Security threats and Attacks
  • Key Takeaways
  • Knowledge Check