Subcategories

ITU Online - Certified Information Systems Security Pro (CISSP) 2015

Posted By: serpmolot
ITU Online - Certified Information Systems Security Pro (CISSP) 2015

ITU Online - Certified Information Systems Security Pro (CISSP) 2015
English | mp4 | H264 640x360 | AAC 2 ch | 9.66 GB
eLearning

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)?, the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.



Module 1: Security and Risk Management

1.1 Introduction
1.2 CIA Triad Security Governance Part 1
1.3 CIA Triad Security Governance Part 2
1.4 Compliance Legal And Regulatory Issues Part 1
1.5 Compliance Legal And Regulatory Issues Part 2
1.6 Understanding Professional Ethics Part 1
1.7 Understanding Professional Ethics Part 2
1.8 Risk Management Part 1
1.9 Risk Management Part 2
1.10 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training Part 1
1.11 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training Part 2

Module 2: Asset Security

2.1 Asset Security Part 1
2.2 Asset Security Part 2

Module 3: Security Engineering
3.1 Engineering And Management Of Security Part 1
3.2 Engineering And Management Of Security Part 2
3.3 Engineering And Management Of Security Part 3
3.4 Engineering And Management Of Security Part 4
3.5 Engineering And Management Of Security Part 5
3.6 Engineering And Management Of Security Part 6

Module 4: Communication and Network Security

4.1 Apply Secure Design Principles To Networks Part 1
4.2 Apply Secure Design Principles To Networks Part 2
4.3 Apply Secure Design Principles To Networks Part 3
4.4 Apply Secure Design Principles To Networks Part 4
4.5 Apply Secure Design Principles To Networks Part 5
4.6 Apply Secure Design Principles To Networks Part 6
4.7 Securing Network Components Part 1
4.8 Securing Network Components Part 2
4.9 Design And Establish Secure Communication Channels Part 1
4.10 Design And Establish Secure Communication Channels Part 2
4.11 Design And Establish Secure Communication Channels Part 3

Module 5: Identity and Access Management

5.1 Controlling Access And Managing Identity Part 1
5.2 Controlling Access And Managing Identity Part 2
5.3 Controlling Access And Managing Identity Part 3
5.4 Controlling Access And Managing Identity Part 4

Module 6: Security Assessment Testing

6.1 Designing Performing And Analyzing Security Testing

Module 7: Security Operations

7.1 Foundational Concepts And Investigations Part 1
7.2 Foundational Concepts And Investigations Part 2
7.3 Incident Management And Preventative Measures Part 1
7.4 Incident Management And Preventative Measures Part 2
7.5 Disaster Recovery Process Part 1
7.6 Disaster Recovery Process Part 2

Module 8: Software Development Security

8.1 Understanding Applying And Enforcing Software Security Part 1
8.2 Understanding Applying And Enforcing Software Security Part 2
8.3 Conclusion

Screenshots:

ITU Online - Certified Information Systems Security Pro (CISSP) 2015

ITU Online - Certified Information Systems Security Pro (CISSP) 2015

ITU Online - Certified Information Systems Security Pro (CISSP) 2015

NO MIRRORS PLEASE

WANT MORE? VISIT MY BLOG!


ITU Online - Certified Information Systems Security Pro (CISSP) 2015