MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Certified Information Systems Security Professional (CISSP)

Course Summary

Get 30 PDUs , 35 CPEs. Learn everything about Information Systems Security


  • +

    Course Syllabus

    • Introduction
      • Introduction
      • E-book - Introduction
    • Information Security Governance and Risk Management
      • Welcome
      • Objectives
      • Security and Organizational Goals, Mission, and Objectives
      • Information Security Management
      • The Big Three – CIA
      • Information Classification
      • Security Policy Implementation
      • Information Risk Management
      • Risk Analysis
      • Managing Personnel Security
      • Security Awareness Training
      • Managing Security Function
      • Quiz
      • Summary
      • Thank You
      • E-book - Information Security Governance and Risk Management
    • Access Control
      • Welcome
      • Objectives
      • Definitions
      • Access Control Terminologies
      • Password Types
      • Types of Access Control
      • Access Control Models
      • Access Control Concepts
      • Access Control Administration
      • Access Control Monitoring and testing
      • Quiz
      • Summary
      • Thank you
      • E-book - Access Control
    • Security Architecture and Design
      • Welcome
      • Objectives
      • Importance of Security Architecture and Design
      • Architecture Frameworks
      • Security Models
      • Evaluation Criteria
      • Enterprise Security Architecture
      • System Security Architecture
      • Distributed Systems
      • Security Threats and Countermeasures
      • Quiz
      • Summary
      • Thanks you
      • E-book - Security Architecture and Design
    • Physical and Environment Security
      • Welcome
      • Objectives
      • Importance of Physical and environmental security
      • Need for Physical and Environmental Security
      • Site and Facility Design Criteria
      • Perimeter Security
      • Importance and types of Lighting systems
      • Access Control
      • Building and Inside Security
      • Secure Operational Areas
      • Environmental Controls
      • Quiz
      • Summary
      • Thanks you
      • E-book - Physical and Environment Security
    • Telecommunications and Network Security
      • Welcome
      • Objectives
      • Importance of telecommounications and network security
      • Secure Network Architecture And Design
      • OSI Model Layers
      • Securing Network Components
      • VLANs and Gateways
      • Secure Communication Channels
      • Wireless Technologies
      • Network Attacks And Countermeasures
      • Quiz
      • Summary
      • Thanks you
      • E-book - Telecommunications and Network Security
    • Software Development Security
      • Welcome
      • Objectives
      • Importance of software development security
      • System Environments
      • System Life Cycle and Systems Development
      • Object-Oriented Programming
      • Software Security and Assurance
      • Database and Data Warehousing Environments
      • Malwares
      • Knowledge Management
      • Web Application Environment
      • The 10 Best Practices
      • Quiz
      • Summary
      • Thank you
      • E-book - Software Development Security
    • Cryptography
      • Welcome
      • Objectives
      • Importance of Cryptography
      • Cryptography Concepts
      • Symmetric Cryptography
      • Advanced Encryption Standard
      • Asymmetric Cryptography
      • Symmetric vs. Asymmetric Cryptography
      • Hash Function
      • Public Key Infrastructure
      • Key Management
      • Internet Security
      • Attacks on Cryptography
      • Quiz
      • Summary
      • Thank you
      • E-book - Cryptography
    • Business Continuity and Disaster Recovery Planning
      • Welcome
      • Objectives
      • Importance of business continuity and disaster recovery planning
      • Basic Concepts
      • BCP/DRP Phases
      • BIA Steps-Business Unit Level
      • Types of recovery and Types of Testing
      • BCP/DRP Phase 6- Implementation, Testing, and Training
      • BCP/DRP Frameworks
      • Best Practices
      • Quiz
      • Summary
      • Thank you
      • E-book - Business Continuity and Disaster Recovery Planning
    • Legal, Regulations, Investigations, and Compliance
      • Welcome
      • Objectives
      • Importance of Legal regulations, investigations and compliance
      • Computer Crimes
      • Major Legal Systems
      • Intellectual Property Law
      • Privacy
      • Incident Response
      • Investigations
      • Compliance
      • (ISC)2 Code of Ethics
      • Quiz
      • Summary
      • Thank you
      • E-book - Legal, Regulations, Investigations, and Compliance
    • Operations Security
      • Welcome
      • Objectives
      • Importance of Operations security
      • Operations Security Cocepts
      • Maintaining Operational Resilience
      • Maintaining Resilient Systems
      • Protecting Valuable Assets
      • Controlling System Accounts
      • Managing Security Services Effectively
      • Key Operational Processes and Procedures
      • Quiz
      • Summary
      • Thank you
      • E-book - Operations Security
    • CISSP - Glossary
      • Certified Information Systems Security Professional Glossary
    • CISSP - Case-Studies
      • Tackling Acquisition Challenges
      • Effects of Social Engineering on Regulatory Compliance
    • CISSP Simulation Test Papers
      • Full Length CISSP Simulation Test Paper 1
      • Full Length CISSP Simulation Test Paper 2
      • Full Length CISSP Simulation Test Paper 3
      • Full Length CISSP Simulation Test Paper 4
      • Full Length CISSP Simulation Test Paper 5


Course Fee:
USD 249

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top