IT Security CISA, CISSP & CISM Certification Training

652 Enrolled
$59.00$859.00
You save 93% -

180 Lessons (0h)

  • Certified Information Security Manager (CISM)
    Information Security Governance
    Risk Management
    Information Security Program
    Information Security Program Implementation
    Information Security Program Management
    Incident Management and Response
  • Certified Information Systems Auditor (CISA)
    Introduction
    Audit Process
    Auditing Standards
    Auditing Guidelines
    Cobit Model
    Audit Management
    Internal Control Classifications
    Planning
    Program
    Evidence
    Audit Control Evaluation
    C S A Control Self- Assessment
    IT Governance
    Outsourcing And Governance
    IT Security
    Governance And Security Policies
    Organizational Compliance
    Outsourcing And Globalization
    Outsourcing
    IT Performance
    System and Infrastructure
    Requirements
    Project Management Tools- Part1
    Project Management Tools- Part2
    Applications
    Agile Development
    Monitoring And Controlling
    Acquisition Process
    Testing Process
    Information Systems Maintenance Practices
    Data Conversion Tools
    Media Disposal process
    Post Implementation Review
    Periodic Review
    System Maintenance
    IT Service Delivery And Support
    How To Evalutate Service Level Management Practices
    Operations Management
    Databases
    Structured Query Language
    Monitoring Performance
    Source Code And Performance Monitoring
    Patch Management
    Incident Management
    Hardware Component Types
    Network Component Types
    I S Auditor Technical Overview
    Security Design
    Monitoring Systems
    Types of Attacks
    Cryptography
    Encryption
    Asymmetric Encryption
    Digital Certificate
    Different Kinds Of Attacks
    Access Control
    Identification And Authenication
    Physical Access Exposure
    Environmental Security
    Network Security Devices And Network Components
    Network Address Translation
    Virtual Private Networks
    Voice System Risks
    Intrusion Detection
    Firewalls
    Firewall Implementation
    Network Access Protection
    Honey Pot
    Risks To Portable And Wireless Devices
    Bluetooth
    OSI Networking
    Managing Data
    Business Continuity And Disaster Recovery
    Fault Tolerance
    Business Continuity And Disaster Recovery Regulations
  • CISSP
    Intro
    Least Incorrect Answer
    Ethics
    Accounts And Identity Management
    Authentication Services
    Categories And Types
    Penetration Testing And Auditing
    Systems M A C D A C R B A C
    Telecommunications
    Wired Physical Interfaces
    Physical Layer
    Layer
    Wireless
    Wireless Lan
    Layer34 And Firewalls
    Firewalls
    Protocols
    Transport Layer
    Layers5 And6
    Presentation Layer
    Layer7
    Authentication
    Printing
    Messaging
    Security Protocol
    Application Attacks
    Honeypots
    Telecommunications
    Voice Over I P
    Attacks
    VOIP Controls
    Layers of Protection
    Penetration Testing
    Vectors of Test
    Scope
    Technical Penetration Testing
    Pen Testing Methodology
    Application Security
    Connectivity Interfaces And Applications
    Malware
    Attack Types
    Malformed Input
    Payload
    Web Risks
    Insecure Direct Object Reference
    Security Misconfiguration
    How To Pass The Exam
    Overview
    Risk Management
    Patch Management
    Levels Of Patch Management
    Software Development Life Cycle
    Security
    Cryptography
    Symmetric Vs Asymmetric
    Managing Key Sizes
    Initialization Vector
    Asymmetric
    Crytology Law
    Message Integrity Controls
    Apply Integrity Controls
    Digital Signature Overview
    Types of Encryption
    Digital Signatures
    Key Agreement
    Hierarchical Trust Model
    PGP And Digital Signatures
    Spam Vs PKI
    Cryptography and Stenography
    Investigating For Steganography
    Code Breaking
    Common Cryptanalytical Attacks
    Types of Attacks
    Common Criteria And Trusted Computing Base
    Frameworks
    Hardware
    Software OS Design
    Data Classification
    Data Backup and Control
    Privilege Entry Control
    I D S And IPS
    Business Continuity Planning
    Policy And Program Management
    Business Impact Analysis
    Strategy Options
    Incident Management Plans
    Activity Response Plans
    Test Plan
    Embedding Business Continuity Plan
    Law Domain
    Incident Handling
    Legal Systems
    Strategy Options
    Intellectual Property
    Fire and Power
    Perimeter Barrier Lock Sensor Guard
    Physical Security Planning
    Conclusion

Jumpstart or Grow Your Career Fighting Cyber Crime with These 3 Essential Security Certifications

VC
Vizual Coaching Academy

Vizualcoaching is an institution of passionate and talented educationists who support over 300,000 students around the world. It’s recognized as a brand that focuses on innovation, learning technology, and psychology along with a powerful ability to fulfill the educational requirements of its awarding bodies and its students. For more details on this course and instructor, click here.

Description

Master the advanced techniques required to protect network resources from external threats with the IT Cyber Security bundle. Built around industry best-practice guidelines, the IT Cyber Security bundle consists of three in-depth courses. Each course has been designed to address real world challenges, so that the technologies and techniques covered can be applied to any situation.
  • Develop a comprehensive understanding of internal & external security provisioning in 3 courses
  • Study the information systems audit process
  • Understand the principles of access control
  • Establish & maintain an information security governance framework
  • Learn via a series of instructor-led videos & self-study manuals
  • Discuss topics w/ other students in the networking facilities
  • Improved your job prospects once you sit for qualifications

Specs

Details & Requirements

  • Length of time users can access this course: 1 year
  • Access options: web streaming, mobile streaming
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Windows, Mac, iPhone, iPad, Android

Terms

  • Instant digital redemption
  • Once redeemed, course acces can take up to 48 hours
Your cart is empty. Continue Shopping!
Processing order...