Confidently follow learning paths that help you develop the right skills in the right order to achieve your goals.
This series provides an overview of the technical knowledge needed to design, engineer, and manage the overall security posture of an organization. This series can be used to prepare for the (ISC)²® CISSP® (Certified Information Systems Security Professional) examination, with coverage of the eight domains of the CISSP Common Body of Knowledge (CISSP CBK®) updated on April 15, 2015.Get Started
Security Operations, Security Mangagement, Risk Management, Security Engineering, Network Security, Security Assessment, Secure Software Development, Security Manager, IT Director, Security Auditor, Security Architect
CISSP® candidates are required to have a minimum of five years of full time work experience in at least two of the eight CISSP® domains. One year of experience is waived with a four year college degree or a credential from the (ISC)²® approved credential list.
Through this series, you will expand your knowledge of how to design, engineer, implement, and manage an information security program through exposure to the eight domains of the CISSP CBK.
If you are looking to begin your journey towards the highly respected CISSP credential, then you have come to the right place! This course covers a broad range of topics listed in ISC2's Certified Information System Security Professional (CISSP) Common Body of Knowledge (CBK) - Security and Risk Management domain. In this course, you will learn the foundations of security and risk management, including topics such as cyber crime, legal and regulatory concerns, threat modeling, and much, much more. When you are finished with this course, you will have a good security and risk management foundation that will provide you with the context and knowledge needed to be successful in the information security profession.
Earn your CISSP! Dive deep into the Asset Security domain of the CISSP, including information and asset classification, data and system ownership, protecting privacy, appropriate retention, data security controls, and handling requirements.
Deep dive into the Security Engineering domain of the Certified Information Systems Security Professional (CISSP®) certification, including Secure Design Principles and Processes, Fundamental Concepts of Security Models, Security Evaluation Models, Security Capabilities of Information Systems, Vulnerabilities in Security Architecture and Technology Components, Cryptography, and Site and Facility Secure Design
If you want to learn practical communications and network security skills while preparing for your CISSP®, this course will show you how! Deep dive into the Communications and Network Security domain of the Certified Information Systems Security Professional (CISSP®) certification. You'll gain knowledge and skills in the areas of secure network architecture and design as well as supervisory control and data acquisition (SCADA). Next, you'll go over network protocols and securing their components. Finally, you'll learn more about communication channels and network attacks. By the end of this course, you will be more prepared for the CISSP exam and you'll also be more knowledgeable when it comes to communications and network security.
Access controls lie at the very heart of an information security program. After all, information security is all about access control - who can get on our systems, networks, and our buildings and what can they do when they gain access? In this course, CISSP® - Identity and Access Management, you'll learn about the concepts and theory of identity and access management. Next, you'll learn about mandatory and discretionary access control along with types of controls and related risk. Finally, you'll learn about access control attacks. By the end of this course, you'll have an understanding of identity and access management and be able to approach these areas in the CISSP® examination with confidence.
Your controls have been selected and implemented, users have been educated, and everything seems to be in order. Even if this is the case, odds are that there are still unidentified risks in your environment. If you want to be certain that your controls are working as intended, you will need to perform risk assessments and penetration testing. The 6th domain of the CISSP CBK addresses this concern with topics such as information assurance, testing strategies including penetration testing, log reviews, and third party assessment. In this course, CISSP®: Security Assessment and Testing, you build upon the skills learned in previous CISSP domain and learn to put them all to use when validating the effectiveness of your controls. First, you'll learn about security assessment and test strategies. Next, you'll learn about security controls validation, security and related data collection, as well as analyzing test results. Finally, the course will wrap up by covering third-party risk assessments. By the end this course, you should be familiar with a broad spectrum of topics that are covered within the sixth domain of the CISSP.
This course, CISSP® - Security Operations, covers the wide breadth of topics within the Security Operations domain of the CISSP. This includes activities such as evidence collection and handling, investigative techniques and types, monitoring and logging activities such as intrusion detection and prevention, event management, and egress monitoring. In addition to this, there will also be a focus on securing the provisioning of resources, understanding foundational security operational concepts such the information lifecycle, and job rotation. The course also covers topics such as resource protection, incident management, operation of preventative measures such as firewalls, implementing a patch management program, understanding how to implement change management, and learning about recovery strategies. By the end this course, you should be familiar with a broad spectrum of topics that are covered within the Security Operations domain of the CISSP. This course will provide you with the background information that you will need when addressing questions related to Security Operations.
This course provides coverage of the Software Development Security (Understanding, Applying, and Enforcing Software Security) domain from the April 2015 ISC2 CISSP® exam objectives. You will be made familiar with the importance of building security into the development process and learn about system life cycle security, the basics of software development, the different types of threats that applications face, and some countermeasure examples. This course is focused on the 8th of 8 domains in the CISSP® exam, and as such there will basic to intermediate coverage of many different concepts that CISSP® candidates will be expected to have some understanding of. The goal of the course will be to ensure the learner has a basic understanding of the concepts, why they are important, and when they should be used.
Copyright © 2004 - 2017 Pluralsight LLC. All rights reserved.