Certified Information Systems Security Professional (CISSP)

$142.90




  • 14 Courses | 12h 6m 51s
  • 7 Books | 110h 24m

Prepare for the CISSP certification by acquiring the knowledge to design, implement, and manage secure information systems.

The price above is for a single user on an annual subscription. For more users please enter the number of users next to the ‘Add to cart’ option.

Category:

Description

Prepare for the CISSP certification by acquiring the knowledge to design, implement, and manage secure information systems.

COURSES INCLUDED

(ISC)² & SECURITY FUNDAMENTALS
Explore information about the (ISC)² organization such as the (ISC)² Code of Professional Ethics and confidentiality, integrity, and availability, as well as fundamental security terminology.
11 videos | 40m Assessment


CRYPTOGRAPHIC CLIENT-BASED SYSTEMS

Gain an advanced knowledge of cryptographic systems, life cycles, techniques, and methodologies for cryptography and cryptanalysis.
10 videos | 56m Assessment


COMMUNICATION & NETWORK SECURITY

Discover how to implement secure architectures and controls for communication and network security.
12 videos | 1h 15m Assessment


IDENTITY AND ACCESS MANAGEMENT (IAM)

Explore domain topics related to management, control, deployment, and accountability of various identity and access services in the enterprise, as well as the provisioning life cycle.
9 videos | 1h Assessment


SITE & FACILITY SECURITY CONTROLS

Explore the domain of physical security as it relates to the corporate facility and on-site locales.
9 videos | 34m Assessment


CISSP: SECURITY

Explore the domain areas concerning governance, compliance, and business continuity planning for the enterprise security practitioner and engineer.
13 videos | 1h Assessment


CISSP: RISK MANAGEMENT

Explore the governance, compliance, and business continuity planning domain areas for the enterprise security practitioner and engineer.
7 videos | 41m Assessment


SECURITY ARCHITECTURE AND ENGINEERING

Explore security engineering and design of various components, such as engineering processes using secure design principles and the fundamentals of security concept models.
6 videos | 46m Assessment


VULNERABILITY ASSESSMENT & MITIGATION

Explore security assessment, design, and mitigation for web-based, mobile, and embedded systems.
10 videos | 48m Assessment


CISSP: SECURITY ASSESSMENT & TESTING

Learn about investigations, logging, monitoring, auditing, and reporting as you explore security assessments.
8 videos | 51m Assessment


CISSP: SECURITY OPERATIONS

Explore security principles and management tasks of continuous security operations and initiatives.
9 videos | 37m Assessment


MONITORING & REPORTING

Discover the security principles and the management tasks of continuous security operations and initiatives
9 videos | 52m Assessment


CONDUCTING INCIDENT MANAGEMENT

Discover various methods for incident handling, disaster recovery, and business continuity, and examine physical security at the property edge and in the enterprise.
12 videos | 1h 27m Assessment


CISSP: SOFTWARE DEVELOPMENT SECURITY

Explore the Software Development Life Cycle, as well as how to secure and manage the software development and application development environments.
8 videos | 33m Assessment

Resources


Contact Us for more information.