• CATALOG
  • FINANCIAL ASSISTANCE
  • MILITARY
  • LOGIN
Asbury University
Home > Training Programs > Security > Certified Information Systems Security Professional (CISSP)
CALL
NOW

855.520.6806

Fill out the form below

By continuing you are agreeing to have ed2go contact you.
Close Window

Thank you for your interest in this program. We should be contacting you shortly.

Close Window

Certified Information Systems Security Professional (CISSP)

information-systems-security-cissp-certification
$1,995.00 (USD)

DETAILS

OUTLINE

I.        Security and Risk Management
                A.    Security Governance
                B.    Security Policies
                C.    Confidentiality
                D.    Business Continuity
                E.    Legal and Regulatory
                F.    Professional Ethic
                G.    Risk Management
II.       Asset Security
                A.    Information Classification
                B.    Handling Requirements
                C.    Ownership
                D.    Data Security Controls
                E.    Protect Privacy
                F.    Retention
III.      Security Engineering
                A.    Security Models
                B.    Security Designs
                C.    Engineering Processes
                D.    Vulnerabilities
                E.    Cryptography
                F.    Embedded Devices
                G.    Site Design and Security
IV.       Communication and Network Security
                A.    Network Architecture Design
                B.    Network Components
                C.    Communication Channels
                D.    Network Attacks
V.        Identity and Access Management
                A.    Physical and Logical Assets Control
                B.    Identification and Authentication
                C.    Third-Party Identity Services
                D.    Identity as a Service
                E.    Provisioning Lifecycle
                F.    Authorization Mechanisms
VI.      Security Assessment and Testing
                A.    Assessment and Test Strategies
                B.    Test Outputs
                C.    Security Control Testing
                D.    Security Process Data
                E.    Security Architectures
VII.      Security Operations
                A.    Foundational Security Operations Concepts
                B.    Logging, Monitoring and Investigating Activities
                C.    Provisioning of Resources
                D.    Management Processes
                E.    Physical Security
                F.    Preventative Measures
                G.    Business Continuity
VIII.    Software Development Security
                A.    Security in the Software Development Lifecycle
                B.    Development Environment Security Controls
                C.    Software Security Effectiveness
                D.    Software Security Impact

REQUIREMENTS

PREREQUISITES

INSTRUCTOR

FAQS

Asbury University
Continuing Education
1 Macklem Drive
Wilmore, KY 40390 US
MAIN CONTENT

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning.