Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Diploma in Certified Information Systems Security Professional (CISSP 2019)

Course Cover
compare button icon

Course Features

icon

Duration

20 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Teaching Type

Self Paced

icon

Video Content

20 hours

Course Description

This free course will provide you with an understanding of everything you need to know about becoming a Certified Information Systems Security Professional, and help prepare you for the Certified Information Security Professionals exam. In the first part of the course, you will go over professional ethics, security policy, standards and procedures, and you will also learn more about protecting assets and security controls. After a section dedicated to security architecture and engineering, we will cover secure network components and secure communication design. In later modules, you will learn more about managing access to important services, assessing and testing security, and we will examine security control testing. After that, the course focuses on investigating security activity, preventing breaches and responding to breaches, which will pave the way for a foundation in protection techniques and preventative measures. Before the final assessment, a section is dedicated to software development security. By taking this course you will learn crucial information about security in the modern age and have all of the necessary knowledge to become an Information Systems Auditor. So why wait? Start learning today and continue your professional education.

Course Overview

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Analyze how secure a system is

Describe Identity and Access Management

Explain the architecture of a security system

Identify potential risks to the system

Perform a proper security audit both internally and externally

React to a security breach with disaster recovery

Recognize the software development life cycle's impact on security

Course Cover