Name | Fees | |
---|---|---|
Certified Information Systems Security Professional (CISSP) | $ 2393.25 | Register Now |
Details + Objectives
What you will learn
Learn how to handle security and risk management
Understand asset security
Know how to implement security engineering
Realize best practices for communications and network security
Master identity and access management
How you will benefit
Become prepared to work as a Certified Information Systems Security Professional (CISSP)
Gain hands-on experience in the information/cyber security industry
Begin a career in information security or broaden your skills if you're already working
Become more efficient on the job and better able to identify risks
How the course is taught
Self-paced, online course
6 Months to complete
Open enrollment, begin anytime
150 course hours
Security and Risk Management Security Governance Security Policies Confidentiality Business Continuity Legal and Regulatory Professional Ethic Risk Management Asset Security Information Classification Handling Requirements Ownership Data Security Controls Protect Privacy Retention Security Engineering Security Models Security Designs Engineering Processes Vulnerabilities Cryptography Embedded Devices Site Design and Security Communication and Network Security Network Architecture Design Network Components Communication Channels Network Attacks Identity and Access Management Physical and Logical Assets Control Identification and Authentication Third-Party Identity Services Identity as a Service Provisioning Lifecycle Authorization Mechanisms Security Assessment and Testing Assessment and Test Strategies Test Outputs Security Control Testing Security Process Data Security Architectures Security Operations Foundational Security Operations Concepts Logging, Monitoring and Investigating Activities Provisioning of Resources Management Processes Physical Security Preventative Measures Business Continuity Software Development Security Security in the Software Development Lifecycle Development Environment Security Controls Software Security Effectiveness Software Security Impact