20 Hours 36 Minutes

44 Course Videos

60 Test Questions

Certified Information Systems Security Pro (CISSP) 2015

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement. **NOTE: Effective April 15, 2015, the CISSP exam is based on a new exam blueprint.

Video Titles Included In this Course
  • Introduction
  • CIA Triad Security Governance - Part 1
  • CIA Triad Security Governance - Part 2
  • Compliance Legal And Regulatory Issues - Part 1
  • Compliance Legal And Regulatory Issues - Part 2
  • Understanding Professional Ethics - Part 1
  • Understanding Professional Ethics - Part 2
  • Risk Management - Part 1
  • Risk Management - Part 2
  • Threat Modeling Acquisition Strategy And Practice Security Awareness And Training - Part 1
  • Threat Modeling Acquisition Strategy And Practice Security Awareness And Training - Part 2
  • Asset Security - Part 1
  • Asset Security - Part 2
  • Engineering And Management Of Security - Part 1
  • Engineering And Management Of Security - Part 2
  • Engineering And Management Of Security - Part 3
  • Engineering And Management Of Security - Part 4
  • Engineering And Management Of Security - Part 5
  • Engineering And Management Of Security - Part 6
  • Apply Secure Design Principles To Networks - Part 1
  • Apply Secure Design Principles To Networks - Part 2
  • Apply Secure Design Principles To Networks - Part 3
  • Apply Secure Design Principles To Networks - Part 4
  • Apply Secure Design Principles To Networks - Part 5
  • Apply Secure Design Principles To Networks - Part 6
  • Securing Network Components - Part 1
  • Securing Network Components - Part 2
  • Design And Establish Secure Communication Channels - Part 1
  • Design And Establish Secure Communication Channels - Part 2
  • Design And Establish Secure Communication Channels - Part 3
  • Controlling Access And Managing Identity - Part 1
  • Controlling Access And Managing Identity - Part 2
  • Controlling Access And Managing Identity - Part 3
  • Controlling Access And Managing Identity - Part 4
  • Designing Performing And Analyzing Security Testing
  • Foundational Concepts And Investigations - Part 1
  • Foundational Concepts And Investigations - Part 2
  • Incident Management And Preventative Measures - Part 1
  • Incident Management And Preventative Measures - Part 2
  • Disaster Recovery Process - Part 1
  • Disaster Recovery Process - Part 2
  • Understanding Applying And Enforcing Software Security - Part 1
  • Understanding Applying And Enforcing Software Security - Part 2
  • Conclusion

Description

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement. **NOTE: Effective April 15, 2015, the CISSP exam is based on a new exam blueprint.

Video Titles Included In this Course
  • Introduction
  • CIA Triad Security Governance – Part 1
  • CIA Triad Security Governance – Part 2
  • Compliance Legal And Regulatory Issues – Part 1
  • Compliance Legal And Regulatory Issues – Part 2
  • Understanding Professional Ethics – Part 1
  • Understanding Professional Ethics – Part 2
  • Risk Management – Part 1
  • Risk Management – Part 2
  • Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 1
  • Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 2
  • Asset Security – Part 1
  • Asset Security – Part 2
  • Engineering And Management Of Security – Part 1
  • Engineering And Management Of Security – Part 2
  • Engineering And Management Of Security – Part 3
  • Engineering And Management Of Security – Part 4
  • Engineering And Management Of Security – Part 5
  • Engineering And Management Of Security – Part 6
  • Apply Secure Design Principles To Networks – Part 1
  • Apply Secure Design Principles To Networks – Part 2
  • Apply Secure Design Principles To Networks – Part 3
  • Apply Secure Design Principles To Networks – Part 4
  • Apply Secure Design Principles To Networks – Part 5
  • Apply Secure Design Principles To Networks – Part 6
  • Securing Network Components – Part 1
  • Securing Network Components – Part 2
  • Design And Establish Secure Communication Channels – Part 1
  • Design And Establish Secure Communication Channels – Part 2
  • Design And Establish Secure Communication Channels – Part 3
  • Controlling Access And Managing Identity – Part 1
  • Controlling Access And Managing Identity – Part 2
  • Controlling Access And Managing Identity – Part 3
  • Controlling Access And Managing Identity – Part 4
  • Designing Performing And Analyzing Security Testing
  • Foundational Concepts And Investigations – Part 1
  • Foundational Concepts And Investigations – Part 2
  • Incident Management And Preventative Measures – Part 1
  • Incident Management And Preventative Measures – Part 2
  • Disaster Recovery Process – Part 1
  • Disaster Recovery Process – Part 2
  • Understanding Applying And Enforcing Software Security – Part 1
  • Understanding Applying And Enforcing Software Security – Part 2
  • Conclusion

Additional information

20 Hours 36 Minutes

44 Course Videos

60 Test Questions

You may also like…