This series is designed to help users prepare for the Certified Information Systems Security Professional (CISSP) certification exam. The courses in this series cover the ten CISSP common body of knowledge domains, which relate to topics such as access co
This CISSP Security Professional 2012 online training series provides over 30 hours of self-paced courseware. This web-based training provides 6 months of unlimited access to all of the following lessons:
1 . Access Control
2 . Access Control Attacks and Monitoring
3 . Architectural Threats and Countermeasures
4 . Cryptography
5 . Malicious Code and Application Attacks
6 . PKI and Cryptographic Applications
7 . Risk and Personnel Management
8 . Secure Communications
9 . Securing Network Components
10 . Security Governance
11 . Security Models, Design, and Capabilities
12 . Software Development Security
This course covers topics and issues related to granting and revoking the right to access data or perform an action on a system.
Access Control Attacks and Monitoring
This course builds on access control topics and discusses key information on logging and monitoring, access control attacks, and assessing the effectiveness of access controls.
Architectural Threats and Countermeasures
This course covers underlying concerns about the security of a system itself and its foundation by discussing computer architecture: The physical design of computers from various components.
This course covers the history of cryptography, the basics of cryptographic communications, and the fundamental principles of private key cryptosystems.
Malicious Code and Application Attacks
This course covers the risks posed by malicious code objects -- viruses, worms, logic bombs, and Trojan horses. The course also looks at some of the other security exploits used by someone attempting to gain unauthorized access to a system or to prevent l
PKI and Cryptographic Applications
This course explores the world of asymmetric (or public key) cryptography and the public key infrastructure (PKI) that supports worldwide secure communication between parties that don't necessarily know each other prior to the communication.
Risk and Personnel Management
This course covers hiring practices, formalizing security structure, risk management, awareness training, and management planning.
This course covers the many forms of communications security, vulnerabilities, and countermeasures.
Securing Network Components
This course discusses the OSI model as a guiding principle in networking, cabling, wireless connectivity, TCP/IP and related protocols, networking devices, and firewalls.
This course covers the Information Security Governance and Risk Management domain of the Common Body of Knowledge for the CISSP certification exam, which deals with the common and foundational elements of security solutions. These include elements essenti
Security Models, Design, and Capabilities
This course covers security models such as state machine, Bell-LaPadula, Biba, Clark-Wilson, Take-Grant, and Brewer and Nash. This course also describes Common Criteria and other methods governments and corporations use to evaluate information systems fro
Software Development Security
This course covers maintaining security during the software development process. It also covers the various types of threats you will encounter throughout the process, and what you can do to prevent these risks.
CISSP Security Professional 2012
This series is for anyone who is preparing to take the Certified Information Systems Security Professional (CISSP) exam.
What You Get:
You will receive Unlimited Access to all of the CISSP Security Professional 2012 training tutorials listed above. Your online training courses will be available from anywhere you have internet access.This e-learning series includes all of the online training tutorials listed and is provided in an interactive, self-paced format. Retake any or all of our computer training as often as you want. Our online tutorials allow you to learn anywhere, anytime from any computer with internet access. All courses allow for 6 months of unlimited access (1 user), include a variety of features and qualify for Continuing Education Unit credit.
Web-Based Training Products:
You might also be interested in our Technical Package which includes all of the CISSP Security Professional 2012 training courses listed above plus hundreds of hours of related online training courses