CISSP Certified Information Systems Security Professional Online Course
[ LE-OCISSP ]
Developed and maintained by the International Information Systems Security Certification Consortium (ISC)2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK).
This official CISSP course, developed by ITU in conjuction with (ISC)2, provides you with the knowledge and skills to pass the CISSP certification exam. After passing the certification you'll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security.
LEARN365 Courses Include 12 Months Unlimited Online Access to:
Expert Instructor-Led Training: Learn 365 uses only the industry's finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
Visual Demonstrations & Multimedia Presentations: Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Learn 365 always focuses on real world scenarios and skill-set development.
Quizzes & Exam Simulators: Learn 365's custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Learn 365 courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.
Social Learning & Networking: Learn 365 has designed a world class Learning Management System (LMS). This system allows you to interact and collaborate with other students and Learn 365 employees, form study groups, engage in discussions in our NOW@ Forums, rate and like different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features.
Flash Cards & Educational Games: IT online learning knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.
Navigation and Controls: Learn 365's self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.
Certificate of Completion: Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.
Module 1: Security And Risk Management
1.1 Course And Instructor Introduction
1.2 Introduction To Security And Risk Management
1.3 Understand And Apply Concepts Of Confidentiality Integrity Availability
1.4 Apply Security Governance Principles Part 1
1.5 Apply Security Governance Principles Part 2
1.7 Understanding Legal And Regulatory Issues That Pertain To Information Security In A Global Context
1.8 Understand Professional Ethics
1.9 Develop And Implement Documented Security Policy Standards Procedures And Guidelines
1.10 Understand Business Continuity Requirements
1.11 Contribute To Personnel Security Policies
1.12 Understand And Apply Risk Management Concepts Part 1
1.13 Understand And Apply Risk Management Concepts Part 2
1.14 Understand And Apply Risk Management Concepts Part 3
1.15 Understand And Apply Risk Management Concepts Part 4
1.16 Understand And Apply Risk Management Concepts Part 5
1.17 Understand And Apply Threat Modeling
1.18 Integrate Security Risk Considerations Into Acquisitions Strategy And Practice
1.19 Establish And Manage Security Education Training And Awareness
Module 2: Asset Security
2.1 Introduction To Asset Security
2.2 Classify Information And Supporting Assets Part 1
2.3 Classify Information And Supporting Assets Part 2
2.4 Determine And Maintain Ownership
2.5 Protect Privacy Part 1
2.6 Protect Privacy Part 2
2.7 Protect Privacy Part 3
2.8 Protect Privacy Part 4
2.9 Protect Privacy Part 5
2.10 Ensure Appropriate Retention
2.11 Determine Data Security Controls Part 1
2.12 Determine Data Security Controls Part 2
2.13 Establish Handing Requirements
Module 3: Security Engineering
3.1 Introduction To Security Engineering
3.2 Implement And Manage An Engineering Lifecycle Using Security Design Principles
3.3 Understand Fundamental Concepts Of Security Models Part 1
3.4 Understand Fundamental Concepts Of Security Models Part 2
3.5 Understand Fundamental Concepts Of Security Models Part 3
3.6 Understand Fundamental Concepts Of Security Models Part 4
3.7 Select Controls And Countermeasures Based Upon Information SystemsSecurity Standards