Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
CISSP 2013 Domain: Access Control $74.95
CISSP 2013 Domain: Telecommunications and Network Security $74.95
CISSP 2013 Domain: Information Security Governance and Risk Management $74.95
CISSP 2013 Domain: Cryptography $74.95
CISSP 2013 Domain: Operations Security $74.95

Bundle Price: $199.00
Total Savings: $175.75


CISSP 2013 Domain: Access Control

This course focuses on the need for access control mechanisms to secure an organization's network and minimize its vulnerability to attacks or intrusion. It covers various access control models, techniques, mechanisms, and methodologies. You will learn about the latest in authentication strategies and intrusion detection and prevention techniques. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains. The CISSP credential certifies student expertise in ten different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: January 1, 2012.
  • identify the types of access control technologies used in a networking environment
  • identify critical activities related to information classification
  • identify knowledge-based authentication technologies
  • identify characteristics-based authentication technologies
  • recognize how single sign-on systems (SSOs) are used for authentication
  • recognize how one-time passwords (OTPs) and smart cards are used for authentication
  • recognize ways of securing passwords
  • identify different types of attack against passwords and password files
  • determine the appropriate type of authentication to implement in a given enterprise scenario
  • evaluate given passwords
  • recognize appropriate access control models given a scenario
  • identify the features of the DAC and MAC access control models
  • recognize how different types of access control technique control access to resources
  • identify the advantages and disadvantages of centralized and decentralized identity management systems
  • identify intrusion detection system (IDS) mechanisms and implementation methods
  • identify intrusion detection and prevention techniques
  • determine the most appropriate access control model to implement in a given scenario
  • recognize access control and intrusion detection techniques

CISSP 2013 Domain: Telecommunications and Network Security

Access to a company's resources through unauthorized means is the number one goal of most attackers. The security professional must understand the proper countermeasures in order to stop attacks on e-mail systems, over the network, and on the PBX. This course discusses the transport mechanisms, structures, and security measures used to ensure availability, confidentiality, integrity, and authentication over both public and private networks. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: January 1, 2012.
  • recognize the components of a network infrastructure
  • identify the key features of firewall technologies
  • identify the characteristics of TCP/IP
  • match the layers of the OSI model to their functions
  • recognize how specific network attack techniques operate
  • propose a high level security solution for a given scenario
  • define how networks interact
  • specify the type of cable to use in a given scenario
  • recognize LAN transmission considerations
  • identify network topology characteristics
  • recognize features of media access technologies
  • classify statements as characteristics of either synchronous and asynchronous communications
  • recognize LAN and WAN specific devices and technologies
  • match the technologies used by packet-switched networks to their descriptions
  • match the remote access protocols to their functions
  • identify the characteristics of Ethernet
  • recognize how data is transmitted in Token Ring networks
  • recognize the characteristics of the network communications mechanisms and technologies used in an enterprise environment
  • identify currently available VPN protocols
  • specify the most appropriate network components for a given scenario
  • propose a network communication solution for a given scenario
  • match the network protocols to their descriptions
  • recognize how transport layer mechanisms secure network data
  • recognize how different technologies are used to protect data at the application layer
  • identify how to secure network communications in a given scenario
  • distinguish between the technologies that secure the transport and application layers

CISSP 2013 Domain: Information Security Governance and Risk Management

Information Security Governance and Risk Management is an all encompassing domain that the information security professional must constantly be aware of. This course examines the frameworks and planning structures used to make sure that information assets are protected within an organization. This course also examines the governance, organizational structures and cultures, and the awareness training that should be imparted to employees at all levels. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: January 1, 2012.
  • recognize responsibilities related to information security risk management
  • match information security principles with examples of controls used to apply them
  • match the components of a policy framework with their corresponding descriptions
  • identify methodological frameworks for implementing and auditing security controls
  • identify methodological frameworks for performing information security risk assessment
  • distinguish between the results of qualitative and quantitative risk assessments
  • match stages of the risk assessment process with corresponding descriptions
  • label examples of actions taken by a company in response to a risk as either avoidance, transfer, mitigation, or acceptance
  • recognize the appropriate application of risk management concepts
  • distinguish between risk assessment and control methodologies
  • identify responsibilities of an Information Security Officer
  • recognize the advantages and disadvantages of various reporting models
  • recognize how various personnel security strategies work to minimize employee risk
  • recognize strategies for implementing information security training
  • recognize the topics a computer ethics program should address
  • match common computer ethics fallacies to the corresponding correct views
  • recognize the ethical principles that all information security professionals should apply as they do their jobs
  • recognize how to handle organizational issues
  • recognize appropriate actions to implement security awareness training in your organization
  • recognize ethical principles that all information security professionals must apply

CISSP 2013 Domain: Cryptography

Cryptography has been used for thousands of years to secure messages, identities, vital information, and communications mechanisms. This course covers the invention of cryptography, the use of algorithms and ciphers, and the secure mechanisms used for message authentication and certificate authority. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: January 1, 2012.
  • define key cryptographic terms
  • identify the characteristics of quantum cryptography
  • match symmetric key algorithms to their corresponding descriptions
  • distinguish between types of asymmetric algorithms
  • determine the appropriate use for a given message format
  • recognize types of ciphers
  • match types of cryptanalytic attack with their corresponding descriptions
  • distinguish between types of algorithms, message formats, ciphers, and cryptanalytic attacks
  • determine the appropriate cryptography implementation for a given scenario
  • determine the appropriate hash algorithm to use in a given scenario
  • recognize characteristics of message authentication codes
  • identify the characteristics of digital signatures
  • identify guidelines for key management and distribution
  • identify characteristics of the XKMS
  • recognize the appropriate application of the split knowledge method of key management
  • recognize methods of key distribution
  • determine the appropriate hashing algorithm to use in a given scenario
  • evaluate the actions of an individual who is practicing key management
  • recognize examples of key management methods

CISSP 2013 Domain: Operations Security

In today's enterprise environment, security operations takes on many faces, but always comes back to making sure that all aspects of the operation of an enterprise environment are secured and functioning correctly. This course delves into the mechanisms used to track security threats, resource protection, and securing the enterprise environment. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: January 1, 2012.
  • recognize the activities involved in securing the operations of an enterprise
  • classify audit measures as either internal or external
  • identify the technologies used to maintain resource availability
  • match the attack type to their potential effects
  • recognize different approaches to securing operations
  • identify how audit trails can be used in operations security
  • differentiate between monitoring tools and techniques
  • define a strategy for securing and maintaining resources for a given scenario
  • secure enterprise operations against network violations for a given scenario
  • identify approaches to examining operations security
  • identify the reasons for resource protection
  • distinguish between e-mail protocols
  • recognize different types of e-mail vulnerability
  • recognize security issues associated with the web interfacing
  • identify the characteristics of technologies for transferring and sharing files over the Internet
  • match the reconnaissance methods to their descriptions
  • identify the key considerations involved in implementing administrative controls
  • specify how to secure media and media storage devices
  • specify the reasons resource and e-mail should be secure
  • propose safer file sharing practices for a given scenario
  • determine how to secure media in a given scenario
Register Now
Certified Information Systems Security Professional (CISSP) 2013 Part 1 e-learning bundle
  • Course ID:
    252712
  • Duration:
    12 hours
  • Price:
    $199