E-learning: CISSP Online Self-Paced Training and Exam Bundle - 180 days (CISSP-BDL-180)
- Precio: eur1,530.00
- Código: CISSP-BDL-180
- Días de acceso: 180 días
Descripción
TopOfficial ISC2 Online Self-Paced CISSP Training is a groundbreaking way to prep for certification that uses artificial intelligence to customize your learning journey. It pinpoints areas that require additional focus and guides you through your exam prep in a way that’s truly personalized.
Study smarter, not harder, with these key advantages:
- Personalized instruction – Content, pace and difficulty adapt to your individual knowledge, learning speed and confidence level.
- Enhanced engagement – Immediate feedback and dynamic content enable you to learn at an appropriate level.
- Time savings – Training time is optimized by focusing on areas that require the most review.
- Improved learning outcomes – The platform identifies areas requiring further review and provides targeted support to maximize your understanding of the content.
Certified Information Systems Security Professional (CISSP) training leverages the power of artificial intelligence, guiding students through a self-paced learning experience adapted to their unique needs. It covers the knowledge and skills for designing, developing, and managing the overall security posture of an organization.
What is included:
- Self-paced online adaptive learning journey
- Data-driven analytics dashboard for real-time feedback on learner progress
- Robust search functionality to narrow topics
- Pre- and post-course assessments
- Knowledge checks and end-of-domain quizzes
- Official ISC2 CISSP eTextbook
- Interactive content
- Domain-by-domain study sheets with key points
- Email content support
- Online interactive flash cards
- Glossary of Terms
- 24/7/365 chat technical support
Please note an exam voucher is included as part of this course
Más Información
TopTo earn a Validation of Completion, learners must:
- Complete and pass each domain with a score of 60% or higher (includes all knowledge checks and the end-of-domain assessment).
- Complete the Learner Acknowledgement, verifying you are enrolled and authorized to take the final assessment.
- Complete and pass the final assessment with a score of 60% or higher.
- Complete the course evaluation survey.
Validity
A Validation of Completion is awarded to learners who meet the requisites and successfully complete their final assessment. While it may be used to prepare for professional certification, the Validation of Completion does not demonstrate competency, establish expertise or imply licensing or accreditation in any field. To earn the CISSP certification, you must pass the exam and meet the experience requirements.
Objetivos
TopAfter completing this course you should be able to:
- Apply the fundamental concepts and methods related to the fields of information technology and security.
- Align the overall organizational operational goals with security functions and implementations.
- Determine how to protect assets of the organization as they go through their life cycle.
- Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
- Apply the security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
- Explain the importance of cryptography and the security services it can provide in today's digital and information age.
- Evaluate the physical security elements relative to information security needs.
- Evaluate the elements that comprise communication and network security relative to information security needs.
- Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
- Determine the appropriate access control models to meet business security requirements.
- Apply the physical and logical access controls to meet information security needs.
- Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
- Apply the appropriate security controls and countermeasures to optimize an organization's operational function and capacity.
- Assess the information systems risks to an organization's operational endeavors.
- Determine the appropriate controls to mitigate specific threats and vulnerabilities.
- Apply the information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems' life cycles.
Contenido
TopDomain 1: Security and Risk Management
Domain 2: Asset Security
Domain 3: Security Architecture and Engineering
Domain 4: Communication and Network Security
Domain 5: Identity and Access Management
Domain 6: Security Assessment and Testing
Domain 7: Security Operations
Domain 8: Software Development Security
Prerrequisitos
TopThis training course is intended for professionals who have at least five years of cumulative, paid work experience in two or more of the eight domains of the (ISC)²® CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers. Individuals may be currently in roles such as:
- Security Consultant;
- Security Manager;
- IT Director/Manager Security Auditor;
- Security Architect;
- Security Analyst;
- Security Systems Engineer;
- Chief Information Security Officer:
- Security Director: Security Architect.