Identity and Access Management is the 5th domain of the CISSP common body of knowledge. Some of the main topics we will cover in this course include: theory and concepts of identity in access management, discretionary and mandatory access control, types of controls and related risk and access control attacks.
Security Operations is the 8th domain of the CISSP's common body of knowledge. This course will cover the following' application security, systems development life cycle (SDLC), security impact of acquired software, software threats, programming language concepts and concerns, secure coding and security control concepts.
Security Operations is the 7th domain of the CISSP's common body of knowledge. In this course we will cover some of the following topics: digital forensics, incident management, logging and monitoring, vulnerability and change management, investigative types, evidence handling an, recovery strategies, personnel privacy and safety, business continuity and disaster recovery, internal physical security, external physical security, and securing assets....
Security and Risk Management is the first domain of the CISSP common body of knowledge. Some of the major topics that we will cover include risk assessment, security management, legal and regulatory concerns, computer crimes, threat modelling and continuity lanning and disaster recovery.
Security Assessment and Testing is the 6th domain of the CISSP's common body of knowledge. In this course we will cover the following: assessment and testing strategies, security control effectiveness testing. security process data collection, test result analysis, third-party assessment and Information Security Continuous Monitoring (ISCM),
Security Engineering is the third domain of the Certified Information Systems Security Professional certification. In this course we will cover the following: secure design principle and processes, fundamental concepts of security modules, security evaluation models, security capabilities of information systems, vulnerabilities in security architecture and technology components, cryptography and site and secure facility design.
This course will examine each of the 5 phases of risk management i.e. 1) Introduction to Risk, 2) Risk Identification, 3) IT Risk assessment, 4) Risk Response and Mitigation, 5) Risk and Control Monitoring and Reporting, and will help you prepare for ISACA's CRISC or Certified in Risk and Information Systems Control examination.
Through this course, you will have the opportunity to gain a high-level understanding of the risk management process. This...
Communication and Network security is the 4th domain of the CISSP certification. In this course we will cover secure network architecture and design, Supervisory Control and Data Acquisition (SCADA), network protocols, securing network components, communication channels and network attacks.
Asset Security is one of the eight domains of the Certified Information Systems Security Professional certification, or as it is commonly referred to as the CISSP. Asset Security has 6 domains namely; Information and Asset classification, Data and System ownership, Privacy protection, Appropriate retention, Data security controls. And Handling requirements.