Sale!

ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

Original price was: $44.00.Current price is: $14.00.

Price: 15.00 USD | Size:3.44 GB |   Duration : 21.29 Hours |365 Video Lessons |

BRAND:

ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️4.9

Description

Price: 15.00 USD | Size:3.44 GB |   Duration : 21.29 Hours |365 Video Lessons |

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️4.9

 

ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

 

Course details

In this course, instructor and cybersecurity expert Mike Chapple covers the entire set of information you need to know as you prepare for the ISC2 Certified Information Systems Security Professional (CISSP) certification. The CISSP is one of the most in-demand certifications for security professionals. Learn about security and risk management and asset security. Explore security architecture and engineering. Learn about communication and network security, as well as identity and access management (IAM). Go over security assessment, testing, and operations. Plus, gain valuable insights into software development security. This course gets your preparations for the CISSP exam off to a great start.

This course was created by Mike Chapple. We are pleased to host this training in our library.

Skills you’ll gain

  • Network Security
  • Information Security
  • IT Security Assessments
  • Security Operations

 

Contents
Introduction
1. The CISSP Exam
2. Inside the CISSP Exam
3. Preparing for the Exam
4. Experience Requirement
5. Domain 1: Security and Risk Management
6. Security Fundamentals
7. Security Governance
8. Compliance and Ethics
9. Security Policy
10. Business Continuity
11. Personnel Security
12. Risk Management
13. Threat Modeling
14. Supply Chain Risk Management
15. Awareness and Training
16. Domain 2: Asset Security
17. Data Security
18. Data Security Controls
19. Change and Configuration Management
20. Domain 3: Security Engineering
21. Secure Design
22. Virtualization and Cloud Computing
23. Hardware Security
24. Server Security Issues
25. Embedded Systems Security
26. Encryption
27. Symmetric Cryptography
28. Asymmetric Cryptography
29. Key Management
30. Public Key Infrastructure
31. Cryptanalytic Attacks
32. Physical Security
33. Software Security Architecture
34. Domain 4: Communication and Network Security
35. TCP/IP Networking
36. Secure Network Design
37. Network Security Devices
38. Network Security Techniques
39. Specialized Networking
40. Transport Encryption
41. Wireless Networking
42. Mobile Device Security
43. Host Security
44. Domain 5: Identity and Access Management
45. Identification
46. Authentication
47. Accountability
48. Account Management
49. Authorization
50. Access Control Attacks
51. Domain 6: Security Assessment and Testing
52. Vulnerability Scanning
53. Penetration Testing
54. Log Reviews
55. Code Testing
56. Disaster Recovery Planning
57. Assessing Security Processes
58. Domain 7: Security Operations
59. Investigations and Forensics
60. Privilege Management
61. Incident Management
62. Personnel Safety
63. Domain 8: Software Development Security
64. Software Development Lifecycle
65. Application Attacks
66. Secure Coding Practices
67. What’s Next

 

 


Discover more from Easy Learning (Since 2013)

Subscribe to get the latest posts sent to your email.

You may also like…