Certified Information Systems Security Professional – CISSP

(0 review)
Certified Information Systems Security Professional – CISSP

In today fast evolving times technological solutions by itself cannot protect an organizations important information assets. So, Employers demanding qualified information security staff give their organizations a leading edge by providing the highest standard of security for their customers, employees, stakeholders and organizational information assets..

The CISSP is an internationally recognized certification for information security professionals. Offered by the International Information Systems Security Certification Consortium, (ISC)2, the CISSP certification is both an objective measure of excellence and a globally recognized standard of achievement.

Benefits of the CISSP Certification for Professionals

  • Indicates a working knowledge of information security
  • Commitment to profession
  • Provides a career distinction, with enhanced credibility and marketability
  • Has exclusive benefits as an (ISC)² member, including valuable resources such as peer networking and idea exchange
  • Certified information security professionals earn more than their non-certified counterparts, according to the Global Information Security Workforce Study
  • Satisfies the government and organization requirements for information security certification mandates

What are the requirements?

  • 2 years of experiences in security

What am I going to get from this course?

  • Clear CISSP Exam
  • Analyze information systems access control.
  • Analyze security architecture and design
  • Analyze network security systems and telecommunications.
  • Analyze information security classification and program development.
  • Analyze risk management criteria and ethical codes of conduct.
  • Analyze cryptography characteristics and elements.
  • Analyze physical security.
  • Analyze operations security.
  • Apply Business Continuity and Disaster Recovery Plans.
  • Analyze software development security.
  • Identify legal issues, regulations, compliance standards, and investigation practices relating to information systems security.

What is the target audience?

  • IT security-related practitione
  • Security Administrators
  • Auditors
  • Network analysts
  • Security analysts
  • Information Security officer (ISO)
  • Consultants
  • Security Instructors

Frequently Asked Questions

What web browser should I use?

The EnlightMe platform works best with current versions of Chrome, Firefox or Safari, or with Internet Explorer version 9 and above.

Course Staff

Mohamed Atef

Mohamed Atef

Certified Instructor with more than 15 years of experience.

ICT Consultant and certified instructor with more than 20 years of experience deliver professional and academic courses and 2 books published.

Certified Information System Security Professional (CISSP) ID #517943
Microsoft Certified Trainer (MCT) ID #3022752
EC Council Certified Instructor (CEI) ID #ECC51750391761
CEH: Certified Ethical Hacking ID #ECC64515022319
Certified Cisco System Instructor (CCSI)
Microsoft Certified System Engineer (MCSE)
Microsoft Certified IT Professional (Windows Server Administration 2008)
CompTIA Certified (Network +) ID #
CompTIA Certified (Server +)
CompTIA Certified (Linux +)
CompTIA Certified (Security +)
Cisco Certified Network Associate (CCNA) ID #CSCO11273248
Cisco Certified Network Professional (CCNP)
Project Management Professional (PMP) ID #1772374

Course Features

  • Lectures 68
  • Quizzes 0
  • Duration 4 Hours/Week
  • Skill level
  • Language English
  • Students 1
  • Certificate No
  • Assessments Self
  • Section 1: Introduction

    • Lecture 1.1 Lecture 1 Course Objective Locked 0m
    • Lecture 1.2 Lecture 2 Course Roadmap Locked 0m
    • Lecture 1.3 Lecture 3 CISSP 3rd vs CISSP 4th Locked 0m
  • Section 2: Information Systems Access Control

    • Lecture 2.1 Lecture 4 Important Websites and Course Material Locked 0m
    • Lecture 2.2 Lecture 5 Introduction Locked 0m
    • Lecture 2.3 Lecture 6 Authorization Locked 0m
    • Lecture 2.4 Lecture 7 Authentication Locked 0m
    • Lecture 2.5 Lecture 8 Single Sign On SSO Locked 0m
    • Lecture 2.6 Lecture 9 Central Administration (RADUIS) Locked 0m
    • Lecture 2.7 Lecture 10 Access Control Attack Locked 0m
    • Lecture 2.8 Lecture 11 Intrusion Detection Systems Locked 0m
    • Lecture 2.9 Lecture 12 Penetration Testing Locked 0m
    • Lecture 2.10 Lecture 13 Acces Control Important area for the exam Locked 0m
    • Lecture 2.11 Lecture 14:Access Control Questions Locked 0m
  • Section 3: Security Architecture and Design

    • Lecture 3.1 Lecture 15 Common Security Architecture Frameworks Locked 0m
    • Lecture 3.2 Lecture 16 Trusted Computing Base Locked 0m
    • Lecture 3.3 Lecture 17 Security Models Locked 0m
    • Lecture 3.4 Lecture 18 TCB Vulnerabilities Locked 0m
    • Lecture 3.5 Lecture 19 Security Mode Types Locked 0m
    • Lecture 3.6 Lecture 20 TCSEC Locked 0m
    • Lecture 3.7 Lecture 21 Information Systems Security Standards Locked 0m
    • Lecture 3.8 Lecture 22 Security Architecture Questions Locked 0m
  • Section 4: Network and Telecommunications Security

    • Lecture 4.1 Lecture 23 The OSI Model Locked 0m
    • Lecture 4.2 Lecture 24 TCP/IP Model Locked 0m
    • Lecture 4.3 Lecture 25 Network Architecture Components Locked 0m
    • Lecture 4.4 Lecture 26 Firewall Locked 0m
    • Lecture 4.5 Lecture 27 Network Types and Topolgies Locked 0m
    • Lecture 4.6 Lecture 28 Remote Access Technology Locked 0m
    • Lecture 4.7 Lecture 29 Wireless Network Locked 0m
    • Lecture 4.8 Lecture 30 Network Attacks Locked 0m
    • Lecture 4.9 Lecture 31 Remote Access Security Mechanisms Locked 0m
    • Lecture 4.10 Lecture 32 RAID Locked 0m
    • Lecture 4.11 Lecture 33 Backup Locked 0m
    • Lecture 4.12 Lecture 34 Network Questions Locked 0m
  • Section 5: Information Security Classification and Program Development

    • Lecture 5.1 Lecture 35 Classification Schemes Locked 0m
    • Lecture 5.2 Lecture 36 Security Document Types Locked 0m
    • Lecture 5.3 Lecture 37 Security Awareness and Training Locked 0m
  • Section 6: Risk Management and Ethics

    • Lecture 6.1 Lecture 38 What is a Risk ? Locked 0m
    • Lecture 6.2 Lecture 39 Asset Evaluation Locked 0m
    • Lecture 6.3 Lecture 40 Ethics Issues in a Computing Environment Locked 0m
  • Section 7: Cryptography

    • Lecture 7.1 Lecture 41 Cryptography Locked 0m
    • Lecture 7.2 Lecture 42 Alternative Ciphers Locked 0m
    • Lecture 7.3 Lecture 43 Symmetric Encryption Locked 0m
    • Lecture 7.4 Lecture 44 Asymmetric Encryption Locked 0m
    • Lecture 7.5 Lecture 45 Hashing Locked 0m
  • Section 8: Physical Security

    • Lecture 8.1 Lecture 46 What Is Physical Security? Locked 0m
    • Lecture 8.2 Lecture 47 Physical Access Barriers Locked 0m
    • Lecture 8.3 Lecture 48 Power Issues Locked 0m
    • Lecture 8.4 Lecture 49 Fire Locked 0m
  • Section 9: Operations Security

    • Lecture 9.1 Lecture 50 Operations Security Locked 0m
    • Lecture 9.2 Lecture 51 Operations Security Control Methods Locked 0m
  • Section 10: Business Continuity and Disaster Recovery Planning

    • Lecture 10.1 Lecture 52 Business Continuity Plans Locked 0m
    • Lecture 10.2 Lecture 53 Business Impact Analysis Locked 0m
    • Lecture 10.3 Lecture 54 MTD/RTO/RPO Locked 0m
    • Lecture 10.4 Lecture 55 Disaster Recovery Plans Locked 0m
    • Lecture 10.5 Lecture 56 Alternate Sites Locked 0m
  • Section 11: Legal, Regulations, Compliance, and Investigations

    • Lecture 11.1 Lecture 57 Types of Law Locked 0m
    • Lecture 11.2 Lecture 58 Liability Locked 0m
  • Section 12: Application Security

    • Lecture 12.1 Lecture 59 The System Life Cycle Locked 0m
    • Lecture 12.2 Lecture 60 Software Escrow Locked 0m
    • Lecture 12.3 Lecture 61 Software Development Methods Locked 0m
    • Lecture 12.4 Lecture 62 The Change Control Process Locked 0m
    • Lecture 12.5 Lecture 63 Security Consideration Locked 0m
    • Lecture 12.6 Lecture 64 What is SQL Injection ? Locked 0m
    • Lecture 12.7 Lecture 65 SQL Injection attack Locked 0m
    • Lecture 12.8 Lecture 66 Software Control Locked 0m
  • Section 13: Difference between Third Edition and Fourth Editiom

    • Lecture 13.1 Lecture 67 Difference between Third Edition and Fourth Editiom Locked 0m
  • Section 14: Are you ready for the exam?

    • Lecture 14.1 Lecture 68 Are you ready for the exam ? Locked 0m
Mohamed Atef
Mohamed Atef

Certified Instructor with more than 15 years of experience

Certified Instructor with more than 15 years of experience.

ICT Consultant and certified instructor with more than 20 years of experience deliver professional and academic courses and 2 books published.

Certified Information System Security Professional (CISSP) ID #517943
Microsoft Certified Trainer (MCT) ID #3022752
EC Council Certified Instructor (CEI) ID #ECC51750391761
CEH: Certified Ethical Hacking ID #ECC64515022319
Certified Cisco System Instructor (CCSI)
Microsoft Certified System Engineer (MCSE)
Microsoft Certified IT Professional (Windows Server Administration 2008)
CompTIA Certified (Network +) ID #
CompTIA Certified (Server +)
CompTIA Certified (Linux +)
CompTIA Certified (Security +)
Cisco Certified Network Associate (CCNA) ID #CSCO11273248
Cisco Certified Network Professional (CCNP)
Project Management Professional (PMP) ID #1772374

Reviews

Average Rating

0
0 rating

Detailed Rating

5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 stars
0