0% found this document useful (0 votes)
41 views9 pages

Cissp Course Online

The document provides details about the CISSP 2020 Certified Information Systems Security Professional Online Course offered by Learning247, priced at £59. It includes 12 months of unlimited online access to expert-led training, quizzes, exam simulators, and a certificate of completion. The course covers various modules related to security and risk management, asset security, security engineering, and more, aimed at preparing individuals for the CISSP certification exam.

Uploaded by

Learning 247
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views9 pages

Cissp Course Online

The document provides details about the CISSP 2020 Certified Information Systems Security Professional Online Course offered by Learning247, priced at £59. It includes 12 months of unlimited online access to expert-led training, quizzes, exam simulators, and a certificate of completion. The course covers various modules related to security and risk management, asset security, security engineering, and more, aimed at preparing individuals for the CISSP certification exam.

Uploaded by

Learning 247
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Questions? Call 0345 053 7673 or Email us [email protected].

uk Subscribe & Save

0
Search our courses …

Home Course Categories Special Offers Get In Touch Blogs About Us XO Student Card

Home All products CISSP 2020 Certif ied Information Syst...

CISSP 2020 Certified Information


Systems Security Professional Online
Course
SKU: LE-CISSP2020

Price: £59.00 £120.00

Quantity: 1

Add to cart

Description

Course Description
The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills,
experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from
growing sophisticated attacks.

Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the
first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.

Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.

Video Content: 19 Hours 45 Minutes


Test Questions: 245

Courses Include 12 Months Unlimited Online Access to:

Expert Instructor-Led Training: We use only the industry's finest instructors in the IT industry. They have a minimum of 15 years real-world
experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a
personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

Visual Demonstrations & Multimedia Presentations: Our courseware includes instructor-led demonstrations and visual presentations that
allow students to develop their skills based on real world scenarios explained by the instructor. Learn 365 always focuses on real world scenarios
and skill-set development.

Quizzes & Exam Simulators: Learn 365's custom practice exams prepare you for your exams differently and more effectively than the traditional
exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before
proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Learn 365 courses also include
practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you
are 100% prepared before taking your certification exam.

Mobile Optimization & Progress Tracking: Our courses are optimized for all mobile devices allowing students to learn on the go whenever they
have free time. Students can access their courses from anywhere and their progress is completely tracked and recorded.

Flash Cards & Educational Games: IT online learning knows that education is not a one size fits all approach. Students learn in different ways
through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that
keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as
educational games designed to make sure your retention level of the materials is extremely high.
Navigation and Controls: Learn 365's self-paced training programs are designed in a modular fashion to allow you the flexibility to work with
expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of
your training. This allows students to learn at their own pace around their schedule.

Certificate of Completion: Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course
completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.

Course Outline
Module 1: Security And Risk Management
1.1 Course And Instructor Introduction

1.2 Introduction To Security And Risk Management

1.3 Understand And Apply Concepts Of Confidentiality Integrity Availability

1.4 Apply Security Governance Principles Part 1

1.5 Apply Security Governance Principles Part 2

1.6 Compliance

1.7 Understanding Legal And Regulatory Issues That Pertain To Information Security In A Global Context

1.8 Understand Professional Ethics

1.9 Develop And Implement Documented Security Policy Standards Procedures And Guidelines

1.10 Understand Business Continuity Requirements

1.11 Contribute To Personnel Security Policies

1.12 Understand And Apply Risk Management Concepts Part 1

1.13 Understand And Apply Risk Management Concepts Part 2

1.14 Understand And Apply Risk Management Concepts Part 3

1.15 Understand And Apply Risk Management Concepts Part 4

1.16 Understand And Apply Risk Management Concepts Part 5

1.17 Understand And Apply Threat Modeling

1.18 Integrate Security Risk Considerations Into Acquisitions Strategy And Practice

1.19 Establish And Manage Security Education Training And Awareness

Module 2: Asset Security


2.1 Introduction To Asset Security
2.2 Classify Information And Supporting Assets Part 1

2.3 Classify Information And Supporting Assets Part 2

2.4 Determine And Maintain Ownership

2.5 Protect Privacy Part 1

2.6 Protect Privacy Part 2

2.7 Protect Privacy Part 3

2.8 Protect Privacy Part 4

2.9 Protect Privacy Part 5

2.10 Ensure Appropriate Retention

2.11 Determine Data Security Controls Part 1

2.12 Determine Data Security Controls Part 2

2.13 Establish Handing Requirements

Module 3: Security Engineering


3.1 Introduction To Security Engineering

3.2 Implement And Manage An Engineering Lifecycle Using Security Design Principles

3.3 Understand Fundamental Concepts Of Security Models Part 1

3.4 Understand Fundamental Concepts Of Security Models Part 2

3.5 Understand Fundamental Concepts Of Security Models Part 3

3.6 Understand Fundamental Concepts Of Security Models Part 4

3.7 Select Controls And Countermeasures Based Upon Information SystemsSecurity Standards

3.8 UnderstandTheSecurityCapabilitiesOfInformationSystems

3.9 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 1

3.10 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 2

3.11 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 3

3.12 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 4

3.13 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 5

3.14 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 6

3.15 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 7

3.16 Assess And Mitigate Vulnerabilities In WebBased Systems Part 1

3.17 Assess And Mitigate Vulnerabilities In WebBased Systems Part 2


3.18 Assess And Mitigate VulnerabilitiesIn Mobile Systems

3.19 Assess And Mitigate Vulnerabilities In Embedded Devices And CyberPhysical Systems

3.20 Apply Cryptography Part 1

3.21 Apply Cryptography Part 2

3.22 Apply Cryptography Part 3

3.23 Apply Cryptography Part 4

3.24 Apply Cryptography Part 5

3.25 Apply Secure Principles To Site And Facility Design Part 1

3.26 Apply Secure Principles To Site And Facility Design Part 2

3.27 Design And Implement Facility Security

Module 4: Communication And Network Security


4.1 Introduction To Communication And Network Security

4.2 Apply Secure Design Principles To Network Architecture Part 1

4.3 Apply Secure Design Principles To Network Architecture Part 2

4.4 Apply Secure Design Principles To Network Architecture Part 3

4.5 Apply Secure Design Principles To Network Architecture Part 4

4.6 Apply Secure Design Principles To Network Architecture Part 5

4.7 Securing Network Components Part 1

4.8 Securing Network Components Part 2

4.9 Design And Establish Secure Communication Channels Part 1

4.10 Design And Establish Secure Communication Channels Part 2

4.11 Design And Establish Secure Communication Channels Part 3

4.12 Design And Establish Secure Communication Channels Part 4

4.13 Design And Establish Secure Communication Channels Part 5

4.14 Prevent Or Mitigate Network Attacks Part 1

4.15 Prevent Or Mitigate Network Attacks Part 2

Module 5: Identity And Access Management


5.1 Introduction To Identity And Access Management

5.2 Control Physical And Logical Access To Assets

5.3 Manage Identification And Authentication Of People Of Devices Part 1


5.4 Manage Identification And Authentication Of People Of Devices Part 2

5.6 Manage Identification And Authentication Of People Of Devices Part 3

5.7 Manage Identification And Authentication Of People Of Devices Part 4

5.8 Manage Identification And Authentication Of People Of Devices Part 5

5.9 Manage Identification And Authentication Of People Of Devices Part 6

5.10 Integrate Identity As A Service

5.11 Integrate ThirdParty Identity Service

5.12 Implement And Manage Authorization Mechanisms Part 1

5.13 Implement And Manage Authorization Mechanisms Part 2

5.14 Manage The Identity And Access Provisioning Life Cycle

Module 6: Security Assessment And Testing


6.1 Introduction To Security Assessment And Testing

6.2 Design And Validate Assessment Test Strategies

6.3 Conduct Security Control Testing Part 1

6.4 Conduct Security Control Testing Part 2

6.5 Conduct Security Control Testing Part 3

6.6 Conduct Security Control Testing Part 4

6.7 Conduct Security Control Testing Part 5

6.8 Coiled Security Process Data

6.9 Conduct Or Facilitate Internal And ThirdParty Audits

Module 7: Security Operations


7.1 Introduction To Security Operations

7.2 Understand And Support Investigation

7.3 Understand Requirements For Investigation Types

7.4 ConductLoggingAndMonitoringActivities

7.5 Secure The Provisioning Of Resources Through Configuration Management

7.6 Understand And Apply Foundational Security Operations Concepts

7.7 Employ Resource Protection Techniques

7.8 Conduct Incident Response

7.9 Operate And Maintain Preventative Measures


7.10 Implement And Support Patch And Vulnerability Management

7.11 Participate In And Understand Change Management Processes

7.12 Implement Recovery Strategies Part 1

7.13 Implement Recovery Strategies Part 2

7.14 Implement Disaster Recovery Processes Part 1

7.15 Implement Disaster Recovery Processes Part 2

7.16 Test Disaster Recovery Plan

7.17 Participate In Business Continuity Planning

7.18 Implement And Manage Physical Security

7.19 Participate In Personnel Safety

Module 8: Software Development Security


8.1 Introduction To Software Development Security

8.2 Understand And Apply Security In The Software Development Life Cycle

8.3 Enforce Security Controls In The Development Environment Part 1

8.4 Enforce Security Controls In The Development Environment Part 2

8.5 Enforce Security Controls In The Development Environment Part 3

8.6 Enforce Security Controls In The Development Environment Part 4

8.7 Enforce Security Controls In The Development Environment Part 5

8.8 Assess The Effectiveness Of Software Security

8.9 Assess Software Acquisition Security

8.10 Conclusion

Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases.

Payment & Security


Your payment information is processed securely. We do not
store credit card details nor have access to your credit card
information.

You may also like

CISM - Certified Information CompTIA Security+ Certification Cloud Computing Security CompTIA Cybersecurity Analyst
Security Manager Online (Exam SY0-601) Online Course Knowledge CCSK Online Course (CySA+) CS0-002 Certification
Training Course (Updated 2021) Training
£59.00 £99.00 £59.00 £120.00
£59.00 £120.00 £59.00 £120.00

View A-Z Courses About Us Learning247 Subscribe to our mailing list for Offers

Special Offers Get In Touch 61 Caroline Street and Updates on New Courses

Multi Course Bundles Privacy Policy The Jewellery Quarter


Birmingham, B3 1UF Your email
Bulk Purchase Discounts FAQ's & Ordering Info
United Kingdom
Testimonials & Reviews Terms & Conditions

Our Affiliate Program View Cart


☎ 0345 053 7673
[email protected] Subscribe

🔗 www.Learning247.co.uk

© 2023 Learning247 Follow Us We Accept


Crafted By Firstwire

×
Free shipping
The discount code has been applied to your cart
Code:
CHPDISC6357X1
Copy code
Start shopping

PDFmyURL.com - convert URLs, web pages or even full websites to PDF online. Easy API for developers!

You might also like