Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
CISSP 2013 Domain: Software Development Security $74.95
CISSP 2013 Domain: Security Architecture and Design $74.95
CISSP 2013 Domain: Business Continuity and Disaster Recovery Planning $74.95
CISSP 2013 Domain: Legal, Regulations, Investigations, and Compliance $74.95
CISSP 2013 Domain: Physical (Environment) Security $74.95

Bundle Price: $199.00
Total Savings: $175.75


CISSP 2013 Domain: Software Development Security

Poorly written systems or applications can allow an attacker to exploit coding errors and thus interrupt the orderly processes of the system or application. This course discusses methods to increase the security of operating system and application development and thwart attacker attempts to manipulate source code. It also covers application and database development models such as the SDLC and how choosing the right model supports security. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: January 1, 2012.
  • match issues related to software development with corresponding ways in which they create security vulnerabilities
  • recognize types of attacks used in the enterprise environment
  • determine the appropriate methods to counteract a given attack
  • match types of computer attacks to their corresponding countermeasures
  • match types of malicious code to their corresponding descriptions
  • recognize the purpose of software forensics
  • match types of antivirus software with their corresponding descriptions
  • recognize the type of attack being perpetrated in a given scenario
  • determine the appropriate steps to counteract a given attack
  • recognize the characteristics of knowledge-based systems
  • determine the appropriate development model to use for a given software development project
  • distinguish between various database models and technologies
  • recognize the software development phase a given project team is in
  • determine the appropriate development model to use for a given software development project
  • select the appropriate database model for a given set of criteria

CISSP 2013 Domain: Security Architecture and Design

Computer administrators have a variety of mechanisms that can be used to secure modern enterprise environments. Several access control standards and models have been created by the international community to secure both personnel access and information recovery within an enterprise environment. This course examines hardware and software systems, memory storage types, security models, and security controls. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: January 1, 2012.
  • recognize the components of a basic information system architecture
  • identify the considerations involved in implementing security architecture
  • recognize key CPU operational factors involved in secure addressing
  • match system operating states to their descriptions
  • differentiate between machine types
  • identify the purpose of the resource manager
  • classify memory types as either RAM or ROM
  • match storage types to their descriptions
  • plan a secure computer network
  • determine the network resources required for a given scenario
  • match the phases of the evaluation process to their descriptions
  • recognize the essential features of operating system protection
  • match the access control mechanism to it's description
  • recognize the methods used to evaluate security in a networking environment
  • identify the key features of security models
  • match key peer-to-peer security issues with their descriptions
  • describe the main security issues associated with grid computing
  • describe the key challenges related to securing data in the cloud
  • identify the questions a potential user of cloud data storage needs to ask when conducting a risk assessment
  • propose an operating system security solution for a given scenario
  • evaluate security in a networking environment
  • determine the appropriate security model for a given scenario
  • describe the security challenges presented by distributed systems

CISSP 2013 Domain: Business Continuity and Disaster Recovery Planning

Business continuity is an essential part of any enterprise. When a disaster occurs, it is imperative that a company be prepared, and has policies and people in place to step in and restore normal business operations. This course discusses the processes that are used to create a business continuity and disaster recovery plan and strategies for critical resource recovery. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: January 1, 2012.
  • identify activities that occur during the project initiation phase of business continuity planning
  • recognize considerations for business continuity and disaster recovery planning
  • perform a business impact analysis on given business functions
  • recognize key considerations when conducting a business impact analysis
  • conduct activities related to initiating a project to plan a business continuity and disaster recovery program
  • perform the steps of a business impact analysis given a scenario
  • recognize the considerations that are weighed when determining an appropriate recovery strategy
  • match recovery strategies for business operations to corresponding descriptions
  • match recovery strategies for technology environments to corresponding descriptions
  • recognize the components of a business continuity and disaster recovery plan
  • match test types to their corresponding purposes
  • determine the appropriate recovery strategy, given a scenario
  • recognize elements of a business continuity and disaster recovery plan

CISSP 2013 Domain: Legal, Regulations, Investigations, and Compliance

Computer crime is a major area of concern for everyone from the standard end user to the enterprise environment. Government agencies and corporate groups have come together to create rules and laws that deal with computer crimes and how perpetrators should be dealt with. This course brings together different aspects of computer crime, such as types of crime, laws to deal with crimes, and the ethics that must be used when investigating crime. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: January 1, 2012.
  • distinguish between the major categories of computer crime
  • match examples of categories of computer crime to their descriptions
  • recognize the characteristics of various computer-related crimes
  • match the type of intellectual property law that applies to a given scenario
  • match categories of law to their descriptions
  • identify laws related to information security and privacy
  • categorize laws according to the computer crime they protect against
  • determine what type of computer crime has been committed in a given scenario
  • specify the law that protects against a computer crime in a given scenario
  • identify definitions of due care and due diligence
  • recognize the characteristics of computer crime investigations
  • recognize the investigative considerations involved in dealing with computer crime
  • differentiate between ethics and ethical fallacies
  • determine the appropriate processes for investigating a computer-related crime in a given scenario

CISSP 2013 Domain: Physical (Environment) Security

Physical security is the foundation for all networking security mechanisms. Unless a network is physically secure from threats, all other types of security can be negated. This course focuses on the need for, and implementation of physical security and how it is used as an all encompassing backbone for enterprise security. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: January 1, 2012.
  • recognize threats to an organization's physical security
  • identify the components of a layered defense system
  • identify perimeter security mechanisms
  • identify the physical security considerations when designing or building a facility
  • match the CPTED strategies to their descriptions
  • propose a security solution for a given scenario
  • determine the design measures that can be taken to increase facility security for a given scenario
  • identify the mechanisms and controls for securing building services
  • match the technologies used by an IDS to their descriptions
  • select the most appropriate intrusion detection technology for a scenario
  • identify the characteristics of a compartmentalized area
  • specify an appropriate strategy for securing compartmentalized areas in a given scenario
  • recognize the features of physical security elements
  • identify the fundamental considerations involved in key control
  • determine the best approach to securing building services for a given scenario
  • identify how to secure a facility and its contents in a given scenario
  • recognize how to implement an effective physical barrier as a security measure
Register Now
Certified Information Systems Security Professional (CISSP) 2013 Part 2 e-learning bundle
  • Course ID:
    252713
  • Duration:
    10 hours
  • Price:
    $199