SlideShare a Scribd company logo
1 of 9
Download to read offline
Home All products CISSP 2020 Certified Information Syst...
Questions? Call 0345 053 7673 or Email us sales@Learning247.co.uk Subscribe & Save
Price: £59.00
Quantity: 1
CISSP 2020 Certified Information
Systems Security Professional Online
Course
SKU: LE-CISSP2020
£120.00
Add to cart
Description
Course Description
The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills,
experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from
growing sophisticated attacks.
Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the
Course Categories
Home Special Offers Get In Touch Blogs About Us XO Student Card
Search our courses …
0
first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.
Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.
Video Content: 19 Hours 45 Minutes
Test Questions: 245
Courses Include 12 Months Unlimited Online Access to:
Expert Instructor-Led Training: We use only the industry's finest instructors in the IT industry. They have a minimum of 15 years real-world
experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a
personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
Visual Demonstrations & Multimedia Presentations: Our courseware includes instructor-led demonstrations and visual presentations that
allow students to develop their skills based on real world scenarios explained by the instructor. Learn 365 always focuses on real world scenarios
and skill-set development.
Quizzes & Exam Simulators: Learn 365's custom practice exams prepare you for your exams differently and more effectively than the traditional
exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before
proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Learn 365 courses also include
practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you
are 100% prepared before taking your certification exam.
Mobile Optimization & Progress Tracking: Our courses are optimized for all mobile devices allowing students to learn on the go whenever they
have free time. Students can access their courses from anywhere and their progress is completely tracked and recorded.
Flash Cards & Educational Games: IT online learning knows that education is not a one size fits all approach. Students learn in different ways
through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that
keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as
educational games designed to make sure your retention level of the materials is extremely high.
Navigation and Controls: Learn 365's self-paced training programs are designed in a modular fashion to allow you the flexibility to work with
expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of
your training. This allows students to learn at their own pace around their schedule.
Certificate of Completion: Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course
completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.
Course Outline
Module 1: Security And Risk Management
Module 2: Asset Security
1.1 Course And Instructor Introduction
1.2 Introduction To Security And Risk Management
1.3 Understand And Apply Concepts Of Confidentiality Integrity Availability
1.4 Apply Security Governance Principles Part 1
1.5 Apply Security Governance Principles Part 2
1.6 Compliance
1.7 Understanding Legal And Regulatory Issues That Pertain To Information Security In A Global Context
1.8 Understand Professional Ethics
1.9 Develop And Implement Documented Security Policy Standards Procedures And Guidelines
1.10 Understand Business Continuity Requirements
1.11 Contribute To Personnel Security Policies
1.12 Understand And Apply Risk Management Concepts Part 1
1.13 Understand And Apply Risk Management Concepts Part 2
1.14 Understand And Apply Risk Management Concepts Part 3
1.15 Understand And Apply Risk Management Concepts Part 4
1.16 Understand And Apply Risk Management Concepts Part 5
1.17 Understand And Apply Threat Modeling
1.18 Integrate Security Risk Considerations Into Acquisitions Strategy And Practice
1.19 Establish And Manage Security Education Training And Awareness
2.1 Introduction To Asset Security
Module 3: Security Engineering
2.2 Classify Information And Supporting Assets Part 1
2.3 Classify Information And Supporting Assets Part 2
2.4 Determine And Maintain Ownership
2.5 Protect Privacy Part 1
2.6 Protect Privacy Part 2
2.7 Protect Privacy Part 3
2.8 Protect Privacy Part 4
2.9 Protect Privacy Part 5
2.10 Ensure Appropriate Retention
2.11 Determine Data Security Controls Part 1
2.12 Determine Data Security Controls Part 2
2.13 Establish Handing Requirements
3.1 Introduction To Security Engineering
3.2 Implement And Manage An Engineering Lifecycle Using Security Design Principles
3.3 Understand Fundamental Concepts Of Security Models Part 1
3.4 Understand Fundamental Concepts Of Security Models Part 2
3.5 Understand Fundamental Concepts Of Security Models Part 3
3.6 Understand Fundamental Concepts Of Security Models Part 4
3.7 Select Controls And Countermeasures Based Upon Information SystemsSecurity Standards
3.8 UnderstandTheSecurityCapabilitiesOfInformationSystems
3.9 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 1
3.10 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 2
3.11 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 3
3.12 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 4
3.13 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 5
3.14 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 6
3.15 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 7
3.16 Assess And Mitigate Vulnerabilities In WebBased Systems Part 1
3.17 Assess And Mitigate Vulnerabilities In WebBased Systems Part 2
Module 4: Communication And Network Security
Module 5: Identity And Access Management
3.18 Assess And Mitigate VulnerabilitiesIn Mobile Systems
3.19 Assess And Mitigate Vulnerabilities In Embedded Devices And CyberPhysical Systems
3.20 Apply Cryptography Part 1
3.21 Apply Cryptography Part 2
3.22 Apply Cryptography Part 3
3.23 Apply Cryptography Part 4
3.24 Apply Cryptography Part 5
3.25 Apply Secure Principles To Site And Facility Design Part 1
3.26 Apply Secure Principles To Site And Facility Design Part 2
3.27 Design And Implement Facility Security
4.1 Introduction To Communication And Network Security
4.2 Apply Secure Design Principles To Network Architecture Part 1
4.3 Apply Secure Design Principles To Network Architecture Part 2
4.4 Apply Secure Design Principles To Network Architecture Part 3
4.5 Apply Secure Design Principles To Network Architecture Part 4
4.6 Apply Secure Design Principles To Network Architecture Part 5
4.7 Securing Network Components Part 1
4.8 Securing Network Components Part 2
4.9 Design And Establish Secure Communication Channels Part 1
4.10 Design And Establish Secure Communication Channels Part 2
4.11 Design And Establish Secure Communication Channels Part 3
4.12 Design And Establish Secure Communication Channels Part 4
4.13 Design And Establish Secure Communication Channels Part 5
4.14 Prevent Or Mitigate Network Attacks Part 1
4.15 Prevent Or Mitigate Network Attacks Part 2
5.1 Introduction To Identity And Access Management
5.2 Control Physical And Logical Access To Assets
5.3 Manage Identification And Authentication Of People Of Devices Part 1
Module 6: Security Assessment And Testing
Module 7: Security Operations
5.4 Manage Identification And Authentication Of People Of Devices Part 2
5.6 Manage Identification And Authentication Of People Of Devices Part 3
5.7 Manage Identification And Authentication Of People Of Devices Part 4
5.8 Manage Identification And Authentication Of People Of Devices Part 5
5.9 Manage Identification And Authentication Of People Of Devices Part 6
5.10 Integrate Identity As A Service
5.11 Integrate ThirdParty Identity Service
5.12 Implement And Manage Authorization Mechanisms Part 1
5.13 Implement And Manage Authorization Mechanisms Part 2
5.14 Manage The Identity And Access Provisioning Life Cycle
6.1 Introduction To Security Assessment And Testing
6.2 Design And Validate Assessment Test Strategies
6.3 Conduct Security Control Testing Part 1
6.4 Conduct Security Control Testing Part 2
6.5 Conduct Security Control Testing Part 3
6.6 Conduct Security Control Testing Part 4
6.7 Conduct Security Control Testing Part 5
6.8 Coiled Security Process Data
6.9 Conduct Or Facilitate Internal And ThirdParty Audits
7.1 Introduction To Security Operations
7.2 Understand And Support Investigation
7.3 Understand Requirements For Investigation Types
7.4 ConductLoggingAndMonitoringActivities
7.5 Secure The Provisioning Of Resources Through Configuration Management
7.6 Understand And Apply Foundational Security Operations Concepts
7.7 Employ Resource Protection Techniques
7.8 Conduct Incident Response
7.9 Operate And Maintain Preventative Measures
Module 8: Software Development Security
Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases.
7.10 Implement And Support Patch And Vulnerability Management
7.11 Participate In And Understand Change Management Processes
7.12 Implement Recovery Strategies Part 1
7.13 Implement Recovery Strategies Part 2
7.14 Implement Disaster Recovery Processes Part 1
7.15 Implement Disaster Recovery Processes Part 2
7.16 Test Disaster Recovery Plan
7.17 Participate In Business Continuity Planning
7.18 Implement And Manage Physical Security
7.19 Participate In Personnel Safety
8.1 Introduction To Software Development Security
8.2 Understand And Apply Security In The Software Development Life Cycle
8.3 Enforce Security Controls In The Development Environment Part 1
8.4 Enforce Security Controls In The Development Environment Part 2
8.5 Enforce Security Controls In The Development Environment Part 3
8.6 Enforce Security Controls In The Development Environment Part 4
8.7 Enforce Security Controls In The Development Environment Part 5
8.8 Assess The Effectiveness Of Software Security
8.9 Assess Software Acquisition Security
8.10 Conclusion
Payment & Security
You may also like
View A-Z Courses
Special Offers
Multi Course Bundles
Bulk Purchase Discounts
Testimonials & Reviews
Our Affiliate Program
About Us
Get In Touch
Privacy Policy
FAQ's & Ordering Info
Terms & Conditions
View Cart
Learning247
61 Caroline Street
The Jewellery Quarter
Birmingham, B3 1UF
United Kingdom
Subscribe to our mailing list for Offers
and Updates on New Courses
Your payment information is processed securely. We do not
store credit card details nor have access to your credit card
information.
Your email
CISM - Certified Information
Security Manager Online
Training Course (Updated 2021)
£59.00 £120.00
CompTIA Security+ Certification
(Exam SY0-601) Online Course
£59.00 £99.00
Cloud Computing Security
Knowledge CCSK Online Course
£59.00 £120.00
CompTIA Cybersecurity Analyst
(CySA+) CS0-002 Certification
Training
£59.00 £120.00
PDFmyURL.com - convert URLs, web pages or even full websites to PDF online. Easy API for developers!
☎0345 053 7673
✉sales@Learning247.co.uk
🔗www.Learning247.co.uk
© 2023 Learning247
Crafted By Firstwire
Follow Us We Accept
×
Free shipping
The discount code has been applied to your cart
Code:
CHPDISC6357X1
Copy code
Start shopping
Subscribe

More Related Content

Similar to Cissp Course Online

Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
Info-Tech Research Group
 
Gabriel Ong Resume 22112016
Gabriel Ong Resume 22112016Gabriel Ong Resume 22112016
Gabriel Ong Resume 22112016
Gabriel Ong
 
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
Susan Hannan
 

Similar to Cissp Course Online (20)

Security+ Course Overview (2008)
Security+ Course Overview (2008)Security+ Course Overview (2008)
Security+ Course Overview (2008)
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
IAPP_CIPM_certification_training_Course_Content
IAPP_CIPM_certification_training_Course_ContentIAPP_CIPM_certification_training_Course_Content
IAPP_CIPM_certification_training_Course_Content
 
Gabriel Ong Resume 22112016
Gabriel Ong Resume 22112016Gabriel Ong Resume 22112016
Gabriel Ong Resume 22112016
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
12 Crucial Windows Security Skills for 2018
12 Crucial Windows Security Skills for 201812 Crucial Windows Security Skills for 2018
12 Crucial Windows Security Skills for 2018
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
 
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
 
SailPoint IdentityIQ – Admin and Developer.pptx
SailPoint IdentityIQ – Admin and Developer.pptxSailPoint IdentityIQ – Admin and Developer.pptx
SailPoint IdentityIQ – Admin and Developer.pptx
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
 
Exin Agile Scrum Master - Course Preview
Exin Agile Scrum Master - Course PreviewExin Agile Scrum Master - Course Preview
Exin Agile Scrum Master - Course Preview
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber Range
 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat Modelling
 
SOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | BestSOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | Best
 
Certificate in Researching - John Academy
Certificate in Researching - John Academy Certificate in Researching - John Academy
Certificate in Researching - John Academy
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Session
 
Certified Identity Access Manager (CIAM) Online Training
Certified Identity  Access Manager (CIAM) Online TrainingCertified Identity  Access Manager (CIAM) Online Training
Certified Identity Access Manager (CIAM) Online Training
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC Analyst
 
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfSecurity, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 

Recently uploaded (20)

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 

Cissp Course Online

  • 1. Home All products CISSP 2020 Certified Information Syst... Questions? Call 0345 053 7673 or Email us sales@Learning247.co.uk Subscribe & Save Price: £59.00 Quantity: 1 CISSP 2020 Certified Information Systems Security Professional Online Course SKU: LE-CISSP2020 £120.00 Add to cart Description Course Description The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the Course Categories Home Special Offers Get In Touch Blogs About Us XO Student Card Search our courses … 0
  • 2. first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement. Video Content: 19 Hours 45 Minutes Test Questions: 245 Courses Include 12 Months Unlimited Online Access to: Expert Instructor-Led Training: We use only the industry's finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7. Visual Demonstrations & Multimedia Presentations: Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Learn 365 always focuses on real world scenarios and skill-set development. Quizzes & Exam Simulators: Learn 365's custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Learn 365 courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam. Mobile Optimization & Progress Tracking: Our courses are optimized for all mobile devices allowing students to learn on the go whenever they have free time. Students can access their courses from anywhere and their progress is completely tracked and recorded. Flash Cards & Educational Games: IT online learning knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.
  • 3. Navigation and Controls: Learn 365's self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule. Certificate of Completion: Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment. Course Outline Module 1: Security And Risk Management Module 2: Asset Security 1.1 Course And Instructor Introduction 1.2 Introduction To Security And Risk Management 1.3 Understand And Apply Concepts Of Confidentiality Integrity Availability 1.4 Apply Security Governance Principles Part 1 1.5 Apply Security Governance Principles Part 2 1.6 Compliance 1.7 Understanding Legal And Regulatory Issues That Pertain To Information Security In A Global Context 1.8 Understand Professional Ethics 1.9 Develop And Implement Documented Security Policy Standards Procedures And Guidelines 1.10 Understand Business Continuity Requirements 1.11 Contribute To Personnel Security Policies 1.12 Understand And Apply Risk Management Concepts Part 1 1.13 Understand And Apply Risk Management Concepts Part 2 1.14 Understand And Apply Risk Management Concepts Part 3 1.15 Understand And Apply Risk Management Concepts Part 4 1.16 Understand And Apply Risk Management Concepts Part 5 1.17 Understand And Apply Threat Modeling 1.18 Integrate Security Risk Considerations Into Acquisitions Strategy And Practice 1.19 Establish And Manage Security Education Training And Awareness 2.1 Introduction To Asset Security
  • 4. Module 3: Security Engineering 2.2 Classify Information And Supporting Assets Part 1 2.3 Classify Information And Supporting Assets Part 2 2.4 Determine And Maintain Ownership 2.5 Protect Privacy Part 1 2.6 Protect Privacy Part 2 2.7 Protect Privacy Part 3 2.8 Protect Privacy Part 4 2.9 Protect Privacy Part 5 2.10 Ensure Appropriate Retention 2.11 Determine Data Security Controls Part 1 2.12 Determine Data Security Controls Part 2 2.13 Establish Handing Requirements 3.1 Introduction To Security Engineering 3.2 Implement And Manage An Engineering Lifecycle Using Security Design Principles 3.3 Understand Fundamental Concepts Of Security Models Part 1 3.4 Understand Fundamental Concepts Of Security Models Part 2 3.5 Understand Fundamental Concepts Of Security Models Part 3 3.6 Understand Fundamental Concepts Of Security Models Part 4 3.7 Select Controls And Countermeasures Based Upon Information SystemsSecurity Standards 3.8 UnderstandTheSecurityCapabilitiesOfInformationSystems 3.9 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 1 3.10 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 2 3.11 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 3 3.12 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 4 3.13 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 5 3.14 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 6 3.15 Assess And Mitigate The Vulnerabilities Of Security Architectures Designs And Solution Elements Part 7 3.16 Assess And Mitigate Vulnerabilities In WebBased Systems Part 1 3.17 Assess And Mitigate Vulnerabilities In WebBased Systems Part 2
  • 5. Module 4: Communication And Network Security Module 5: Identity And Access Management 3.18 Assess And Mitigate VulnerabilitiesIn Mobile Systems 3.19 Assess And Mitigate Vulnerabilities In Embedded Devices And CyberPhysical Systems 3.20 Apply Cryptography Part 1 3.21 Apply Cryptography Part 2 3.22 Apply Cryptography Part 3 3.23 Apply Cryptography Part 4 3.24 Apply Cryptography Part 5 3.25 Apply Secure Principles To Site And Facility Design Part 1 3.26 Apply Secure Principles To Site And Facility Design Part 2 3.27 Design And Implement Facility Security 4.1 Introduction To Communication And Network Security 4.2 Apply Secure Design Principles To Network Architecture Part 1 4.3 Apply Secure Design Principles To Network Architecture Part 2 4.4 Apply Secure Design Principles To Network Architecture Part 3 4.5 Apply Secure Design Principles To Network Architecture Part 4 4.6 Apply Secure Design Principles To Network Architecture Part 5 4.7 Securing Network Components Part 1 4.8 Securing Network Components Part 2 4.9 Design And Establish Secure Communication Channels Part 1 4.10 Design And Establish Secure Communication Channels Part 2 4.11 Design And Establish Secure Communication Channels Part 3 4.12 Design And Establish Secure Communication Channels Part 4 4.13 Design And Establish Secure Communication Channels Part 5 4.14 Prevent Or Mitigate Network Attacks Part 1 4.15 Prevent Or Mitigate Network Attacks Part 2 5.1 Introduction To Identity And Access Management 5.2 Control Physical And Logical Access To Assets 5.3 Manage Identification And Authentication Of People Of Devices Part 1
  • 6. Module 6: Security Assessment And Testing Module 7: Security Operations 5.4 Manage Identification And Authentication Of People Of Devices Part 2 5.6 Manage Identification And Authentication Of People Of Devices Part 3 5.7 Manage Identification And Authentication Of People Of Devices Part 4 5.8 Manage Identification And Authentication Of People Of Devices Part 5 5.9 Manage Identification And Authentication Of People Of Devices Part 6 5.10 Integrate Identity As A Service 5.11 Integrate ThirdParty Identity Service 5.12 Implement And Manage Authorization Mechanisms Part 1 5.13 Implement And Manage Authorization Mechanisms Part 2 5.14 Manage The Identity And Access Provisioning Life Cycle 6.1 Introduction To Security Assessment And Testing 6.2 Design And Validate Assessment Test Strategies 6.3 Conduct Security Control Testing Part 1 6.4 Conduct Security Control Testing Part 2 6.5 Conduct Security Control Testing Part 3 6.6 Conduct Security Control Testing Part 4 6.7 Conduct Security Control Testing Part 5 6.8 Coiled Security Process Data 6.9 Conduct Or Facilitate Internal And ThirdParty Audits 7.1 Introduction To Security Operations 7.2 Understand And Support Investigation 7.3 Understand Requirements For Investigation Types 7.4 ConductLoggingAndMonitoringActivities 7.5 Secure The Provisioning Of Resources Through Configuration Management 7.6 Understand And Apply Foundational Security Operations Concepts 7.7 Employ Resource Protection Techniques 7.8 Conduct Incident Response 7.9 Operate And Maintain Preventative Measures
  • 7. Module 8: Software Development Security Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases. 7.10 Implement And Support Patch And Vulnerability Management 7.11 Participate In And Understand Change Management Processes 7.12 Implement Recovery Strategies Part 1 7.13 Implement Recovery Strategies Part 2 7.14 Implement Disaster Recovery Processes Part 1 7.15 Implement Disaster Recovery Processes Part 2 7.16 Test Disaster Recovery Plan 7.17 Participate In Business Continuity Planning 7.18 Implement And Manage Physical Security 7.19 Participate In Personnel Safety 8.1 Introduction To Software Development Security 8.2 Understand And Apply Security In The Software Development Life Cycle 8.3 Enforce Security Controls In The Development Environment Part 1 8.4 Enforce Security Controls In The Development Environment Part 2 8.5 Enforce Security Controls In The Development Environment Part 3 8.6 Enforce Security Controls In The Development Environment Part 4 8.7 Enforce Security Controls In The Development Environment Part 5 8.8 Assess The Effectiveness Of Software Security 8.9 Assess Software Acquisition Security 8.10 Conclusion Payment & Security
  • 8. You may also like View A-Z Courses Special Offers Multi Course Bundles Bulk Purchase Discounts Testimonials & Reviews Our Affiliate Program About Us Get In Touch Privacy Policy FAQ's & Ordering Info Terms & Conditions View Cart Learning247 61 Caroline Street The Jewellery Quarter Birmingham, B3 1UF United Kingdom Subscribe to our mailing list for Offers and Updates on New Courses Your payment information is processed securely. We do not store credit card details nor have access to your credit card information. Your email CISM - Certified Information Security Manager Online Training Course (Updated 2021) £59.00 £120.00 CompTIA Security+ Certification (Exam SY0-601) Online Course £59.00 £99.00 Cloud Computing Security Knowledge CCSK Online Course £59.00 £120.00 CompTIA Cybersecurity Analyst (CySA+) CS0-002 Certification Training £59.00 £120.00
  • 9. PDFmyURL.com - convert URLs, web pages or even full websites to PDF online. Easy API for developers! ☎0345 053 7673 ✉sales@Learning247.co.uk 🔗www.Learning247.co.uk © 2023 Learning247 Crafted By Firstwire Follow Us We Accept × Free shipping The discount code has been applied to your cart Code: CHPDISC6357X1 Copy code Start shopping Subscribe