RISPARMIA 40%
My Training Academy

Certified Information Systems Security Professional (CISSP)

My Training Academy
Online
Prezzo Emagister

573 € 341 
+IVA
*Prezzo Orientativo
Importo originale in GBP:
£ 495  £ 295

Informazioni importanti

Tipologia Vocational qualification
Metodologia Online
Inizio Scegli data
  • Vocational qualification
  • Online
  • Inizio:
    Scegli data
Descrizione

Developed and maintained by the International Information Systems Security Certification Consortium (ISC)2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK).

The CISSP course provides you with the knowledge and skills to pass the CISSP certification, after which you'll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security.

The great thing about our Certified Information Systems Security Professional (CISSP) course is that you are in charge of your start and finish date, with no deadline pressures!

We train our students to the very best standards, offering expert instructor-led training via our state of the art eLearning platform.

By achieving the Certified Information Systems Security Professional (CISSP) certification, you will create more career opportunities and be better positioned when applying for work.

Enrol today and prepare for a future you deserve.WHY STUDY WITH MY TRAINING ACADEMY?

Flexible training- study anytime, anywhere and from any device.
Expert Instructor-Led Training Ðour courses are delivered by the finest instructors with a minimum of 15 years real-world experience and are subject matter experts in their field, which is why we have a 97.4% pass rate.
Visual Demonstrations & Multimedia PresentationsÐ allows students to develop their skills based on real world scenarios explained by the instructor.
Quizzes & Exam SimulatorsÐ custom practice exams to prepare students for their final exams. We offer practice quizzes after each module to ensure students are confident before proceeding to the next topic.
Social Learning & NetworkingÐ world class learning management...

Informazioni importanti
È la formazione giusta per me?


Ideal for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.

Prezzo per gli utenti Emagister:

Strutture (1)
Dove e quando
Inizio Luogo
Scegli data
Online
Inizio Scegli data
Luogo
Online

Cosa impari in questo corso?

Fire
Risk
Access
Risk Management
Information Systems
Network
Network security
Hacking
Data Protection
Computer Engineering
Design
International
systems
IT risk
IT Security
Network Training
Data security
Computer Systems
IT Systems
Computer Science
Fire
Network Engineering
Computering
Computering

Programma

Access Control
General Concepts
Authentication
Principles
Types and Categories
Reference Monitor
Techniques
Models
Passwords
Smart Cards
Biometrics
Access Control Systems
Administration
Residuals
Accountability
SummaryTelecommunications and Network Security
OSI Reference Model
ISO/OSI Layers and Characteristics
Topologies
LAN Access Methods
Wireless
System and Security Management
Internet Protocols and Security
Firewall Terms and Types
Web Security
Common Attacks
Remote Access Security
SummaryInformation Security Governance and Risk Management
Key Concepts
Definitions
Key Concepts
Risk Management
Risk Assessment
Useful Formulas
3rd Party Governance
Information Classification
Roles and Responsibilities
Written Guidance
Policies and Standards
Employment Policies
Employee Education Programs
Change Management
SummarySoftware Architecture and Design
Problems
Databases
Query Language
Object Oriented
Applications Beyond the Database
Definitions
Application System Development
Controls
Compiled vs. Interpreted
Vulnerabilities
Botnets
SummaryCryptography
Definitions
Cryptanalysis Terms
Symmetric Encryption
Asymmetric Encryption
Hybrid Encryption
Public Key Infrastructures
Hash Functions
Digital Signatures
Protocol Based
Pretty Good Privacy
Cracking Techniques
SummarySecurity Architecture and Design
Abstract Levels
Computer Hardware
Operating Systems
Processors
Types of Storage
Information Security Architecture
Open and Closed Systems
Access Controls
Architectural Foundation
Modes of Operation
Certification and Accreditation
Evaluation Criteria
Security Models
SummaryOperations Security
Threats in an Operating Environment
Control Categories
Accountability
Trusted Recovery
Management and Administrative Control
Due Care and Diligence
Hardware and Software Controls
Email and Fax
Privilege
Physical Access
Monitoring Techniques
Problem Management
Threats and Vulnerabilities
Defence in Depth
SummaryBusiness Continuity and Disaster Recovery
The Basics
Reasons for BCP
Key Concepts
Definitions
Business Continuity Life Cycle
Project Initiation
Business Impact Analysis
Assessing Risk
Recovery Strategies
Off-Site Requirements
Data Redundancy
System Backups
Plan Development
Testing and Maintenance
Stages in an Incident
SummaryLegal Requirements and Investigations
Ethics
Code of Ethics
Laws
Intellectual Property
Proprietary Rights
Liability
Computer Crime
Computer Crime Laws
Computer Investigation
Investigation Steps
Computer Forensics
Evidence Admissibility
SummaryPhysical and Environmental Security
Physical Security
Crime Prevention
Site Design and Configuration
Boundary Protection
Computing Facility Requirements
Fire Prevention
Fire Suppression
Fire Classes
Media Protection
Access Controls
Physical Security
SummaryCourse Summary EXAM PREREQUISITESCandidates must have a minimum of 5 years cumulative paid full-time work experience in two or more of the 8 domains:
Security and Risk Management
Asset Security
Security Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security Candidates may receive a one-year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)_ approved list, thus requiring four years of direct full-time professional security work experience in 2 or more of the 8 domains of the CISSP CBK. Don't have the experience? Become an Associate of (ISC)_ by successfully passing the CISSP exam. You'll have 6 years to earn your experience to become a CISSP.MULTI-USER TRAINING PACKAGESThis online course can be integrated in your professional training plan. M.T.A. can provide you with a tailored learning solution, that can be customised to meet each team member's requirements. Choosing a multi-user training package, you can get significant discounts for 5+ users and even further discounts for 10+ users Ð and an excellent return on your investment.