Catalog Search Results
Author
Series
Language
English
Description
Identity and Access Management is the 5th domain of the CISSP common body of knowledge. Some of the main topics we will cover in this course include: theory and concepts of identity in access management, discretionary and mandatory access control, types of controls and related risk and access control attacks.
Author
Series
Language
English
Description
Security Operations is the 8th domain of the CISSP's common body of knowledge. This course will cover the following' application security, systems development life cycle (SDLC), security impact of acquired software, software threats, programming language concepts and concerns, secure coding and security control concepts.
Author
Series
Language
English
Description
Security Assessment and Testing is the 6th domain of the CISSP's common body of knowledge. In this course we will cover the following: assessment and testing strategies, security control effectiveness testing. security process data collection, test result analysis, third-party assessment and Information Security Continuous Monitoring (ISCM),
Author
Language
English
Description
This course will examine each of the 5 phases of risk management i.e. 1) Introduction to Risk, 2) Risk Identification, 3) IT Risk assessment, 4) Risk Response and Mitigation, 5) Risk and Control Monitoring and Reporting, and will help you prepare for ISACA's CRISC or Certified in Risk and Information Systems Control examination.
Through this course, you will have the opportunity to gain a high-level understanding of the risk management process. This...
Author
Series
Language
English
Description
Security Engineering is the third domain of the Certified Information Systems Security Professional certification. In this course we will cover the following: secure design principle and processes, fundamental concepts of security modules, security evaluation models, security capabilities of information systems, vulnerabilities in security architecture and technology components, cryptography and site and secure facility design.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request