The Premium (ISC) SSCP & CISSP Certification Training Bundle
What's Included
(ISC)² Systems Security Certified Practitioner (SSCP)
- Experience level required: Advanced
- Access 152 lectures & 40 hours of content 24/7
- Length of time users can access this course: Lifetime
Course Curriculum
152 Lessons (40h)
- SECURITY AND RISK MANAGEMENTOverviewUnderstand Adhere, Promote Professional EthicsUnderstand And Apply Security Concepts (CIA)Evaluate And Apply Security Governance PrinciplesDetermine Compliance And Other RequirementsLegal, Regulatory Issues For Information SecuritySpotlight On The GDPRUnderstand Requirements For Investigation TypesSecurity Policy, Standards, Procedures, GuidelinesIdentify, Analyze, Prioritize BC RequirementsPersonnel Security Policies And ProceduresUnderstand, Apply Risk Management ConceptsSpotlight On The Risk Management FrameworkThreat Modeling Concepts And MethodologiesApply Supply Chain Risk Management (SCRM) ConceptsSecurity Awareness, Education And Training ProgramSecurity And Risk Management Key Points
- ASSET SECURITYIdentify And Classify Information, AssetsEstablish Information, Asset Handling RequirementsProvision Resources SecurelyManage Data LifecycleEnsure Appropriate Asset RetentionData Security Controls And Compliance RequirementsAssets Security - Key Points
- SECURITY ARCHITECTURE AND ENGINEERINGEngineering Process Using Secure Design PrinciplesFundamental Concepts Of Security ModelsControls Based Upon System Security RequirementsSecurity Capabilities Of Information Systems–VocabSecurity Capabilities Of Information Systems – CPUSecurity Capabilities Of Info Systems – MemoryAssess And Mitigate Vulnerabilities - The BasicsAssess And Mitigate Vulnerabilities - The RestSpotlight On Cryptographic Solutions - SymmetricSpotlight On Cryptographic Solutions - AsymmetricSpotlight On Cryptographic Solutions - PKI & CertsSpotlight On Cryptographic Solutions - HashingCryptographic Solutions - Digital SigningUnderstand Methods Of Cryptanalytic AttacksSecurity Principles For Site And Facility DesignDesign Site And Facility Security ControlsSpotlight On Fire ControlSecurity Architecture & Engineering - Key Points
- COMMUNICATION AND NETWORK SECURITYSpotlight On The OSI ModelSpotlight On Internet Protocol (IP) NetworkingSpotlight On IPsecSpotlight On Secure ProtocolsImplications Of Converged & Multilayer ProtocolsSpotlight On Micro-SegmentationWireless, Cellular & Content Distribution NetworksSecure Network ComponentsImplement secure communication channelsCommunications & Network Security - Key Points
- IDENTITY AND ACCESS MANAGEMENT (IAM)Control Physical And Logical Access To AssetsManage Identification And AuthenticationFederated Identity With A Third-Party ServiceImplement, Manage Auth Mechanisms - VocabImplement, Manage Auth Mechanisms - ModelsManage the identity, access provisioning lifecycleImplement Authentication SystemsSpotlight On KerberosSpotlight On Federated Identity Management (FIM)Identity Access Management (IAM) - Key Points
- SECURITY ASSESSMENT AND TESTINGAssessment, Test, & Security Audit StrategiesSpotlight On System And Org Controls Reports (SOC)Conduct Security Control Testing - The BasicsConduct Security Control Testing - The RestCollect Security Process DataAnalyze Test Output And Generate ReportsSecurity Assessment And Testing - Key Points
- SECURITY OPERATIONSUnderstand And Comply With InvestigationsConduct Logging & Monitoring ActivitiesConduct logging & monitoring activities - threatPerform Configuration Management (CM)Apply Foundational Security Operations ConceptsApply resource protectionConduct Incident ManagementDetective & Preventative MeasuresPatch & Vulnerability ManagementUnderstand & Participate In Change ManagementImplement Recovery StrategiesImplement Disaster Recovery (DR) ProcessesTest Disaster Recovery Plans (DRP)Business Continuity (BC) Planning & ExercisesImplement And Manage Physical SecurityAddress Personnel Safety And Security ConcernsSecurity Operations - Key Points
- SOFTWARE DEVELOPMENT SECURITYSpotlight On The Software Development Life CycleCerts & Accreditation Verification & ValidationSecurity In The SDLC - MethodologiesSecurity In The SDLC - Maturity ModelsSecurity In The SDLC - Odds & EndsApply Controls In Development Ecosystems - BasicsApply Controls In Development Ecosystems - RestSpotlight On The OWASP TOP 10Assess The Effectiveness Of Software SecurityAssess Security Impact Of Acquired SoftwareDefine, Apply Secure Coding Guidelines, StandardsSpotlight On DatabasesSoftware Development Security - Key Points
- THE CISSP TOOLBOXWhat Is The CISSP Toolbox?Who Are You?What Does Your Study Plan Look Like?What is your timeline?
(ISC)² Systems Security Certified Practitioner (SSCP)
IDUNOVA: Pioneering IT Education for Tomorrow's Leaders
With over two decades of industry experience, IDUNOVA stands as a beacon in online IT training, having trained over 1 million students globally. We are dedicated to democratizing IT education, ensuring that quality training is accessible to all, irrespective of their background. Our vast selection of IT certifications, tailored in collaboration with industry experts, makes us the preferred choice for IT enthusiasts. Our global digital team, spanning continents, collaborates virtually to deliver an unparalleled online learning experience. Partnering with tech giants, we ensure our courses are current and relevant.What truly sets IDUNOVA apart is our commitment to empowerment. We don't just offer courses; we unlock pathways for professional growth. Our values of quality, accessibility, and continuous learning drive us to innovate and adapt in the ever-evolving tech education landscape. Recognized for our excellence, we are lauded by trusted tech outlets and remain dedicated to fostering an inclusive learning environment. Choose IDUNOVA for a transformative IT learning journey, where we prioritize your success, security, and growth.
Description
The CISSP course is meticulously crafted around eight pivotal domains of information security, encompassing everything from risk management to software development security. This ensures that candidates emerge with a holistic understanding of the cybersecurity landscape. Embarking on the CISSP journey is not just about prepping for an exam. It's about immersing oneself in the vast ocean of cybersecurity, understanding its nuances, and emerging as a leader who can steer organizations toward a safer digital future. Whether you're using the (ISC)2 training for exam prep, inducting new team members, or upskilling your existing IT brigade, the CISSP course is an invaluable resource.
In today's digital age, where cyber threats are an ever-present shadow, CISSP-certified professionals emerge as the vanguards of digital defense. They are the champions of ensuring robust security in an interconnected world. For those with the ambition to lead in the cybersecurity domain and make a tangible difference, this course offers the perfect foundation.
- Access 152 lectures & 40 hours of content 24/7
- Deep dive into the multifaceted universe of information security
- Adeptly design, implement & manage sophisticated cybersecurity infrastructures
- Dive deep into specialized areas such as risk management, asset security & network security
NOTE: This course offering does NOT come with the CISSP examination nor the CISSP certification.
Specs
Important Details
- Length of time users can access this course: lifetime
- Access options: desktop & mobile
- Redemption deadline: redeem your code within 30 days of purchase
- Experience level required: advanced
- Certificate of Completion ONLY
- Have questions on how digital purchases work? Learn more here
Requirements
- At least five years of full-time professional experience in a minimum of two domains from the CISSP – (ISC)² CBK 2021
(ISC) Certified Information Systems Security Professional (CISSP)
Terms
- Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.