$142.90
- 14 Courses | 12h 6m 51s
- 7 Books | 110h 24m
Prepare for the CISSP certification by acquiring the knowledge to design, implement, and manage secure information systems.
The price above is for a single user on an annual subscription. For more users please enter the number of users next to the ‘Add to cart’ option.
Description
Prepare for the CISSP certification by acquiring the knowledge to design, implement, and manage secure information systems.
COURSES INCLUDED
(ISC)² & SECURITY FUNDAMENTALS
Explore information about the (ISC)² organization such as the (ISC)² Code of Professional Ethics and confidentiality, integrity, and availability, as well as fundamental security terminology.
11 videos | 40m Assessment
CRYPTOGRAPHIC CLIENT-BASED SYSTEMS
Gain an advanced knowledge of cryptographic systems, life cycles, techniques, and methodologies for cryptography and cryptanalysis.
10 videos | 56m Assessment
COMMUNICATION & NETWORK SECURITY
Discover how to implement secure architectures and controls for communication and network security.
12 videos | 1h 15m Assessment
IDENTITY AND ACCESS MANAGEMENT (IAM)
Explore domain topics related to management, control, deployment, and accountability of various identity and access services in the enterprise, as well as the provisioning life cycle.
9 videos | 1h Assessment
SITE & FACILITY SECURITY CONTROLS
Explore the domain of physical security as it relates to the corporate facility and on-site locales.
9 videos | 34m Assessment
CISSP: SECURITY
Explore the domain areas concerning governance, compliance, and business continuity planning for the enterprise security practitioner and engineer.
13 videos | 1h Assessment
CISSP: RISK MANAGEMENT
Explore the governance, compliance, and business continuity planning domain areas for the enterprise security practitioner and engineer.
7 videos | 41m Assessment
SECURITY ARCHITECTURE AND ENGINEERING
Explore security engineering and design of various components, such as engineering processes using secure design principles and the fundamentals of security concept models.
6 videos | 46m Assessment
VULNERABILITY ASSESSMENT & MITIGATION
Explore security assessment, design, and mitigation for web-based, mobile, and embedded systems.
10 videos | 48m Assessment
CISSP: SECURITY ASSESSMENT & TESTING
Learn about investigations, logging, monitoring, auditing, and reporting as you explore security assessments.
8 videos | 51m Assessment
CISSP: SECURITY OPERATIONS
Explore security principles and management tasks of continuous security operations and initiatives.
9 videos | 37m Assessment
MONITORING & REPORTING
Discover the security principles and the management tasks of continuous security operations and initiatives
9 videos | 52m Assessment
CONDUCTING INCIDENT MANAGEMENT
Discover various methods for incident handling, disaster recovery, and business continuity, and examine physical security at the property edge and in the enterprise.
12 videos | 1h 27m Assessment
CISSP: SOFTWARE DEVELOPMENT SECURITY
Explore the Software Development Life Cycle, as well as how to secure and manage the software development and application development environments.
8 videos | 33m Assessment
Resources
Contact Us for more information.