NOTICE: Our payment address has changed! Click here for more info.
New Certified Information Systems Security Professional (CISSP)

Chapter 1: Cybersecurity principles

Module A: Security concepts
Module B: Security governance

Chapter 2: Law and ethics

Module A: Legal principles
Module B: Cybersecurity regulations

Chapter 3: Risk management

Module A: Threats and vulnerabilities
Module B: Risk assessment
Module C: Risk management

Chapter 4: Security policies

Module A: Security frameworks
Module B: Security policies
Module C: Controls and procedures
Module D: Training and coordination

Chapter 5: Information assets

Module A: Classification
Module B: Securing data

Chapter 6: Cryptographic techniques

Module A: Cryptographic principles
Module B: Ciphers and hashes

Chapter 7: Applied cryptography

Module A: Public key infrastructure
Module B: Cryptographic protocols

Chapter 8: Secure enterprise architecture

Module A: Security models
Module B: Trusted systems
Module C: Architecture integration

Chapter 9: Secure system design

Module A: System hardware vulnerabilities
Module B: Securing hosts
Module C: Physical security and safety

Chapter 10: Specialized system security

Module A: Architecture elements
Module B: Databases
Module C: Mobile device security
Module D: Virtual and cloud systems

Chapter 11: Network fundamentals

Module A: Network models
Module B: Physical networking
Module C: Network infrastructure devices

Chapter 12: Network technologies

Module A: Local wireless networks
Module B: WAN technologies
Module C: Network convergence

Chapter 13: Network protocols

Module A: IP addressing
Module B: Core protocols
Module C: Network ports and applications

Chapter 14: Network security architecture

Module A: Network vulnerabilities
Module B: Packet flow
Module C: Network security systems
Module D: Network access technologies

Chapter 15: Secure network configuration

Module A: Hardening networks
Module B: Securing communications

Chapter 16: Identity management

Module A: Access control vulnerabilities
Module B: Identity systems

Chapter 17: Access control technologies

Module A: Access control components
Module B: Authentication technologies

Chapter 18: Vulnerability management

Module A: Security testing programs
Module B: Vulnerability assessment
Module C: Vulnerability management programs

Chapter 19: Scanning and monitoring

Module A: Reconnaissance techniques
Module B: Network Monitoring
Module C: Data analysis

Chapter 20: Incident response

Module A: Incident response planning
Module B: Incident response procedures
Module C: Investigation support

Chapter 21: Security operations

Module A: Secure asset management
Module B: Resilience and business continuity
Module C: Fault tolerance and recovery

Chapter 22: Software threats

Module A: Software vulnerabilities
Module B: Malware

Chapter 23: Secure development

Module A: Software development
Module B: Secure programs

Welcome to 30 Bird's Certified Information Systems Security Professional (CISSP) training course. This course provides the knowledge needed to implement security solutions within an enterprise policy framework, using a vendor-neutral format. This includes security and risk management programs, organizational policies and training, asset security, enterprise security architecture and engineering, network and communication security, identity and access management, security assessments and testing, operational security and secure software development. This course maps to the (ISC)² CISSP certification exam. Objective coverage is marked throughout the course.

You will benefit most from this course if you are an experienced security professional who intends to take an (ISC)² CISSP exam.

This course assumes that you have some applied knowledge of computers, networks, and cybersecurity principles in an enterprise environment.

Certified Information Systems Security Professional (CISSP)

  • Product Code: CISSP-R10-
  • Availability: In Stock
  • Days of Training: 5
  • $85.00

Build Your Solution

Tags: CISSP