CISSP Deep Dive
CISSP Deep Dive Online Courses in Nigeria
This 2KO CISSP Deep Dive course provides students with the knowledge and skills that are needed for the CISSP certification. 2KO Africa offers IT consulting, technical IT services and top-of-the-range IT training on multiple platforms. Our best-of-breed computer courses are presented as instructor led classes or as online internet-based elearning. from the comfort of home or work.
Overview
The CISSP: Certified Information Systems Security
Professional Certification training package covers topics
such as Access Control Systems, Cryptography, and Security
Management Practices, teaching students the eight domains of
information system security knowledge.
Earning the CISSP proves you have what it takes to
effectively design, implement and manage a best-in-class
cybersecurity program. With a CISSP, you validate your
expertise and become an (ISC)2 member, unlocking a broad
array of exclusive resources, educational tools, and
peer-to-peer networking opportunities.
Objectives
Security and Risk Management
Asset Security
Security Engineering
Communication and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security
Target Audience
Chief Information Security Officer
Chief Information Officer
Director of Security
IT Director/Manager
Security Systems Engineer
Security Analyst
Security Manager
Security Auditor
Security Architect
Security Consultant
Network Architect
To buy a ISC2 course now using Credit Card, click the icon below
Curriculum
Security
And Risk Management
Overview
Confidentiality, Integrity, Availability (CIA)
Confidentiality, Integrity, Availability (CIA) Pt2
Evaluate, Apply Security Governance Principles
Evaluate, Apply Security Goverance Principles Pt2
Overview
Confidentiality, Integrity, Availability (CIA)
Confidentiality, Integrity, Availability (CIA) Pt2
Evaluate, Apply Security Governance Principles
Evaluate, Apply Security Goverance Principles Pt2
Determine Compliance Requirements
Determine Compliance Requirements Part 2
Determine Compliance Requirements Part 3
Understand Legal And Regulatory Issues
Understand Legal And Regulatory Issues Part 2
Understand, Adhere To And Promote Ethics
Policy, Standards, Procedures And Guidelines
Understand Business Continuity Requirements
Understand Business Continuity Requirements Part 2
Understand Business Continuity Requirements Part 3
Personnel, Security Policies And Procedures
Understand/Apply Risk Management Concepts
Understand/Apply Risk Management Concepts Part 2
Understand/Apply Risk Management Concepts Part 3
Understand/Apply Risk Management Concepts Part 4
Understand/Apply Risk Management Concepts Part 5
Understanding/Apply Threat Modeling Concepts
Apply Risk Management To The Supply Chain
Security Awareness/Education And Training
Security And Risk Management - Key Points
CIA Deep Dive
Organizational Roles And Responsibilities
Risk Terminology And Concepts
Asset
Security
Identify And Classify Information And Assets
Determine And Maintain Information/Asset OwnershIP
Protect Privacy
Protect Privacy Part 2
Ensure Appropriate Asset Retention
Determine Data Security Controls
Determine Data Security Controls Part 2
Determine Data Security Controls Part 3
Establish Asset Handling Requirements
Asset Security - Key Points
Security
Architecture And Engineering
Implement And Manage Engineering Processes
Fundamental Concepts Of Systems And Security
Fundamental Concepts Of Systems And Security Pt.2
Fundamental Concepts Of Systems And Security Pt.3
Fundamental Concepts Of Systems And Security Pt.4
Fundamental Concepts Of Systems And Security Pt.5
Controls Based On Security Requirements
Controls Based On Security Requirements Part 2
Vulnerabilities Of Security Architecture
Vulnerabilities Of Security Architecture Part 2
Vulnerabilities Of Security Architecture Part 3
Vulnerabilities Of Security Architectures Part 4
Vulnerabilities In Web-Based Systems
Vulnerabilities In Web-Based Systems Part 2
Vulnerabilities In Mobile Systems
Vulnerabilities In Embedded Devices
Apply Cryptography
Apply Cryptography Part 2
Apply Cryptography Part 3
Apply Cryptography Part 4
Apply Cryptography Part 5
Apply Cryptography Part 6
Apply Cryptography Part 7
Apply Cryptography Part 8
Apply Cryptography Part 9
Apply Cryptography Part 10
Apply Cryptography Part 11
Apply Cryptography Part 12
Apply Cryptography Part 13
Site/Facility Design And Security
Site/Facility Design And Security Part 2
Site/Facility Design And Security Part 3
Site/Facility Design And Security Part 4
Security Architecture And Engineering - Key Points
Communication And Network Security
Secure
Design Principles In Networks
Secure Design Principles In Networks Part 2
Secure Design Principles In Networks Part 3
Secure Design Principles In Networks Part 4
Secure Design Principles In Networks Part 5
Secure Design Principles In Networks Part 6
Secure Design Principles In Networks Part 7
Secure Design Principles In Networks Part 8
Secure Design Principles In Networks Part 9
Secure Design Principles In Networks Part 10
Secure Design Principles In Networks Part 11
Secure Design Principles In Networks Part 12
Secure Network Components
Secure Network Components Part 2
Secure Network Components Part 3
Secure Network Components Part 4
Secure Network Components Part 5
Implement Secure Communication Channels
Implement Secure Communication Channels Part 2
Implement Secure Communication Channels Part 3
Implement Secure Communication Channels Part 4
Implement Secure Communication Channels Part 5
Implement Secure Communication Channels Part 6
Communication And Network Security - Key Points
Identity
And Access Management (Iam)
Control
Physical And Logical Access To Assets
Control Physical And Logical Access To Assets Pt 2
Manage Identification And Authentication
Manage Identification And Authentication Part 2
Manage Identification And Authentication Part 3
Integrate Identity As A Third-Party Service
Implement/Manage Authorization Mechanisms
Implement/Manage Authorization Mechanisms Pt.2
Manage Identity And Access Provisioning Lifecycle
Access Control Attacks
Access Control Attacks Part 2
Identity And Access Management - Key Points
Security
Assessment And Testing
Assessment, Test And Audit
Assessment, Test And Audit Part 2
Conduct Security Control Testing
Conduct Security Control Testing Part 2
Conduct Security Control Testing Part 3
Collect Security Process Data
Security Assessment And Testing - Key Points
Security
Operations
Understand And Support Investigations
Conduct Logging And Monitoring Activities
Provisioning And Protecting Resources
Provisioning And Protecting Resources Part 2
Apply Foundational Security Operation Concepts
Conduct Incident Management
Detective And Preventative Measures
Detective And Preventative Measures Part 2
Patch And Vulnerability Management
Understand Change Management
Implement Recovery Strategies
Implement Recovery Strategies Part 2
Implement Recovery Strategies Part 3
Implement Recovery Strategies Part 4
Implement Recovery Strategies Part 5
Implement And Test BCDR
Implement And Test BCDR Part 2
Implement And Test BCDR Part 3
Implement And Manage Physical Security
Implement And Manage Physical Security Part 2
Personnel Safety And Security Concerns
Security Operations - Key Points
Details about this course
Over 81 hours of learning
Includes video, presentations, workbooks, quizzes,
flashcards & games
Receive a Certificate of Excellence on successful completion
Presented by highly qualified, industry leading experts
12 Months access (Unless indicated otherwise)