CISSP Deep Dive

CISSP Deep Dive Online Courses in Zambia

 

This 2KO CISSP Deep Dive course provides students with the knowledge and skills that are needed for the CISSP certification. 2KO Africa offers IT consulting, technical IT services and top-of-the-range IT training on multiple platforms. Our best-of-breed computer courses are presented as instructor led classes or as online internet-based elearning. from the comfort of home or work.

 

 

Overview
The CISSP: Certified Information Systems Security Professional Certification training package covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge.

Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)2 member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

 

Objectives
Security and Risk Management
Asset Security
Security Engineering
Communication and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security
 

Target Audience
Chief Information Security Officer
Chief Information Officer
Director of Security
IT Director/Manager
Security Systems Engineer
Security Analyst
Security Manager
Security Auditor
Security Architect
Security Consultant
Network Architect

 

To buy a ISC2 course now using Credit Card, click the icon below

Curriculum
Security And Risk Management
Overview
Confidentiality, Integrity, Availability (CIA)
Confidentiality, Integrity, Availability (CIA) Pt2
Evaluate, Apply Security Governance Principles
Evaluate, Apply Security Goverance Principles Pt2
Overview
Confidentiality, Integrity, Availability (CIA)
Confidentiality, Integrity, Availability (CIA) Pt2
Evaluate, Apply Security Governance Principles
Evaluate, Apply Security Goverance Principles Pt2
Determine Compliance Requirements
Determine Compliance Requirements Part 2
Determine Compliance Requirements Part 3
Understand Legal And Regulatory Issues
Understand Legal And Regulatory Issues Part 2
Understand, Adhere To And Promote Ethics
Policy, Standards, Procedures And Guidelines
Understand Business Continuity Requirements
Understand Business Continuity Requirements Part 2
Understand Business Continuity Requirements Part 3
Personnel, Security Policies And Procedures
Understand/Apply Risk Management Concepts
Understand/Apply Risk Management Concepts Part 2
Understand/Apply Risk Management Concepts Part 3
Understand/Apply Risk Management Concepts Part 4
Understand/Apply Risk Management Concepts Part 5
Understanding/Apply Threat Modeling Concepts
Apply Risk Management To The Supply Chain
Security Awareness/Education And Training
Security And Risk Management - Key Points
CIA Deep Dive
Organizational Roles And Responsibilities
Risk Terminology And Concepts

Asset Security
Identify And Classify Information And Assets
Determine And Maintain Information/Asset OwnershIP Protect Privacy
Protect Privacy Part 2
Ensure Appropriate Asset Retention
Determine Data Security Controls
Determine Data Security Controls Part 2
Determine Data Security Controls Part 3
Establish Asset Handling Requirements
Asset Security - Key Points

Security Architecture And Engineering
Implement And Manage Engineering Processes
Fundamental Concepts Of Systems And Security
Fundamental Concepts Of Systems And Security Pt.2
Fundamental Concepts Of Systems And Security Pt.3
Fundamental Concepts Of Systems And Security Pt.4
Fundamental Concepts Of Systems And Security Pt.5
Controls Based On Security Requirements
Controls Based On Security Requirements Part 2
Vulnerabilities Of Security Architecture
Vulnerabilities Of Security Architecture Part 2
Vulnerabilities Of Security Architecture Part 3
Vulnerabilities Of Security Architectures Part 4
Vulnerabilities In Web-Based Systems
Vulnerabilities In Web-Based Systems Part 2
Vulnerabilities In Mobile Systems
Vulnerabilities In Embedded Devices
Apply Cryptography
Apply Cryptography Part 2
Apply Cryptography Part 3
Apply Cryptography Part 4
Apply Cryptography Part 5
Apply Cryptography Part 6
Apply Cryptography Part 7
Apply Cryptography Part 8
Apply Cryptography Part 9
Apply Cryptography Part 10
Apply Cryptography Part 11
Apply Cryptography Part 12
Apply Cryptography Part 13
Site/Facility Design And Security
Site/Facility Design And Security Part 2
Site/Facility Design And Security Part 3
Site/Facility Design And Security Part 4
Security Architecture And Engineering - Key Points

Communication And Network Security
Secure Design Principles In Networks
Secure Design Principles In Networks Part 2
Secure Design Principles In Networks Part 3
Secure Design Principles In Networks Part 4
Secure Design Principles In Networks Part 5
Secure Design Principles In Networks Part 6
Secure Design Principles In Networks Part 7
Secure Design Principles In Networks Part 8
Secure Design Principles In Networks Part 9
Secure Design Principles In Networks Part 10
Secure Design Principles In Networks Part 11
Secure Design Principles In Networks Part 12
Secure Network Components
Secure Network Components Part 2
Secure Network Components Part 3
Secure Network Components Part 4
Secure Network Components Part 5
Implement Secure Communication Channels
Implement Secure Communication Channels Part 2
Implement Secure Communication Channels Part 3
Implement Secure Communication Channels Part 4
Implement Secure Communication Channels Part 5
Implement Secure Communication Channels Part 6
Communication And Network Security - Key Points

Identity And Access Management (Iam)
Control Physical And Logical Access To Assets
Control Physical And Logical Access To Assets Pt 2
Manage Identification And Authentication
Manage Identification And Authentication Part 2
Manage Identification And Authentication Part 3
Integrate Identity As A Third-Party Service
Implement/Manage Authorization Mechanisms
Implement/Manage Authorization Mechanisms Pt.2
Manage Identity And Access Provisioning Lifecycle
Access Control Attacks
Access Control Attacks Part 2
Identity And Access Management - Key Points

Security Assessment And Testing
Assessment, Test And Audit
Assessment, Test And Audit Part 2
Conduct Security Control Testing
Conduct Security Control Testing Part 2
Conduct Security Control Testing Part 3
Collect Security Process Data
Security Assessment And Testing - Key Points

Security Operations
Understand And Support Investigations
Conduct Logging And Monitoring Activities
Provisioning And Protecting Resources
Provisioning And Protecting Resources Part 2
Apply Foundational Security Operation Concepts
Conduct Incident Management
Detective And Preventative Measures
Detective And Preventative Measures Part 2
Patch And Vulnerability Management
Understand Change Management
Implement Recovery Strategies
Implement Recovery Strategies Part 2
Implement Recovery Strategies Part 3
Implement Recovery Strategies Part 4
Implement Recovery Strategies Part 5
Implement And Test BCDR
Implement And Test BCDR Part 2
Implement And Test BCDR Part 3
Implement And Manage Physical Security
Implement And Manage Physical Security Part 2
Personnel Safety And Security Concerns
Security Operations - Key Points
 

Details about this course
Over 81 hours of learning

Includes video, presentations, workbooks, quizzes, flashcards & games
Receive a Certificate of Excellence on successful completion
Presented by highly qualified, industry leading experts
12 Months access (Unless indicated otherwise)