Course name:
Certified Information Systems Security Pro (CISSP) 2015
Description:
he vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
Duration:
40 Hours
Audience:
Information Security Professionals
Prerequisites:
Information Security
Course outline:
<p class="heading1-text" style="margin: 0in 0in 7.5pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; color: #333333;">The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)&sup2;, the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement. **NOTE: Effective April 15, 2015, the CISSP exam is based on a new exam blueprint.</span><span style="font-family: 'Verdana',sans-serif; color: #333333;">&nbsp;</span></p> <p class="heading1-text" style="margin: 0in 0in 7.5pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="color: #333333; font-family: Verdana, sans-serif;">Learning Objective</span></p> <p class="heading1-text" style="margin: 0in 0in 7.5pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; color: #333333;">Students will learn to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. It will prepare the students to pass the exam.</span></p> <p>Outline &ndash;</p> <p>Module 1: Security and Risk Management</p> <p>Module 2: Asset Security&nbsp;&nbsp;&nbsp;</p> <p>Module 3: Security Engineering</p> <p>Module 4: Communication and Network Security</p> <p>Module 5: Identity and Access Management</p> <p>Module 6: Security Assessment Testing</p> <p>Module 7: Security Operations</p> <p>Module 8: Software Development Security</p>

Copyright © 2011-2014 Aziksa Inc, All rights reserved.