وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CISSP : Domain 1 : Security and Risk Management – Learn 2024

سرفصل های دوره

Comprehensive cybersecurity certification covering risk management, access control, cryptography, and incident response.


1. Introduction
  • 1. Introduction Course Overview
  • 2. Domain 1 Introduction Security and Risk Management

  • 2. Security Concepts
  • 1. Introduction Security Concepts
  • 2. The CIA Triad
  • 3. The Five Pillars of Security
  • 4. Confidentiality Terms
  • 5. Integration Terms
  • 6. Availability Terms
  • 7. Authenticity Terms
  • 8. Non-repudiation Terms
  • 9. Common Security Terms
  • 10. Security Concepts Best Practices for Application
  • 11. Lab Discussing Security Concepts.html
  • 12. Template Security Concepts Documentation Template.html

  • 3. Security Governance Principles
  • 1. Introduction Security Governance Principles
  • 2. Security Governance
  • 3. Governance Requirements
  • 4. Due Care and Due Diligence
  • 5. Security Goal Categories
  • 6. IT Governance Committee
  • 7. Organizational Governance Structure
  • 8. The Organizational Cultures Impact on Security
  • 9. Roles and Responsibilities
  • 10. CISO (Chief Information Security Officer) Role
  • 11. CISO (Chief Information Security Officer) Responsibilities
  • 12. Organizational Processes
  • 13. Communications
  • 14. Security Reporting Options
  • 15. Summary Security Governance Principles
  • 16. Lab Discussing Security Governance Principles.html
  • 17. Template Security Governance Principles.html

  • 4. Compliance
  • 1. Introduction Compliance
  • 2. Compliance
  • 3. CISSP Legislative and Regulatory Compliance
  • 4. Privacy Issues and Personally Identifiable Information (PII)
  • 5. U.S. Information Privacy Law
  • 6. International Privacy Law
  • 7. EU GDPR
  • 8. Computer Crime
  • 9. U.S. Computer Crime Law
  • 10. Data Breach
  • 11. Intellectual Property Law and Licensing
  • 12. License Types
  • 13. Trans-Border Data Flow (TBDF)
  • 14. CISSP Import and Export Controls
  • 15. Industry Standards
  • 16. Summary Supporting Compliance
  • 17. Lab Discussing Compliance.html
  • 18. Template CISSP Compliance Documentation Template.html

  • 5. Professional Ethics
  • 1. Introduction Professional Ethics
  • 2. The Purpose of Ethics
  • 3. The Organizational Ethics
  • 4. Regulatory Requirements for Ethics Programs
  • 5. Ethics Issues in a Computing Environment
  • 6. Common Computer Ethics Fallacies
  • 7. Internet Architecture Board Ethics (IAB)
  • 8. Ethical Minefields for Security Professionals
  • 9. Code of Ethics
  • 10. Summary Upholding Professional Ethics in Security
  • 11. Lab Discussing Professional Ethics in Security.html
  • 12. Template CISSP Professional Ethics Documentation.html

  • 6. Security Documentation
  • 1. Introduction Security Documentation
  • 2. The Value of Security Documentation and Types
  • 3. Security Policy Objectives and Types
  • 4. The Relationship Between Security Document Types
  • 5. Summary Drafting Security Documentation
  • 6. Lab Discussing Security Documentation.html
  • 7. Template Security Documentation.html

  • 7. Risk Management
  • 1. Introduction Risk Management
  • 2. What is Risk
  • 3. Risk Management
  • 4. Integrating Governance, Compliance, and Risk Management
  • 5. Results of Improper Risk Management
  • 6. The Risk Analysis Process
  • 7. Asset Identification and Valuation
  • 8. Vulnerability Areas
  • 9. Identify Threats
  • 10. Risk Assessment Methodology
  • 11. Risk Assessment Determination Factors
  • 12. Qualitative and Quantitative Assessments
  • 13. Risk Prioritization
  • 14. Risk Management Frameworks
  • 15. Risk Maturity Model (RMM)
  • 16. Summary Implementing Risk Management
  • 17. Lab Discussing Risk Management.html
  • 18. Template Risk Management Documentation Template.html

  • 8. Threat Modeling
  • 1. Introduction Threat Modeling
  • 2. Threat Modeling Process
  • 3. Threat Models
  • 4. Threat Types
  • 5. Virus Types
  • 6. Malware Types
  • 7. Reduction Analysis
  • 8. Threat Agents
  • 9. Diagramming Attacks
  • 10. Rating Threat Impact (DREAD) aka. DREAD Model
  • 11. Summary Implementing Threat Modeling
  • 12. Lab Discussing Threat Modeling.html
  • 13. Template Threat Modeling Documentation.html

  • 9. Risk Response
  • 1. Introduction Risk Response
  • 2. Threat Remediation
  • 3. Responses to Risks
  • 4. Risk Treatment
  • 5. Control Selection Criteria (Framework and Types)
  • 6. Control Functions and Implementation
  • 7. Residual Risk
  • 8. Monitoring and Measuring
  • 9. Continuous Improvement
  • 10. Summary Risk Response
  • 11. Lab Discussing Risk Response.html
  • 12. Template Risk Response Documentation.html

  • 10. Business Continuity Plan Fundamentals
  • 1. Introduction Business Continuity Plan Fundamentals
  • 2. BCP (Business Continuity Planning) and Content
  • 3. Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
  • 4. Business Continuity Plan (BCP) Project Management
  • 5. Advisory Committee-BCP Team
  • 6. BCP Program Coordinators
  • 7. BCP Team Responsibilities
  • 8. Project Initiation and Scope
  • 9. NIST SP 800-34
  • 10. Business Organization Analysis
  • 11. BIA (Business Impact Analysis)
  • 12. External Dependencies
  • 13. Critical Business Processes
  • 14. Impact of Financial Loss
  • 15. MTD ( Maximum Tolerable Downtime)
  • 16. Reduced Operational
  • 17. Business Plan Evaluation
  • 18. Business Plan Testing
  • 19. Business Plan Maintenance
  • 20. BCP Implementation During a Disaster
  • 21. Summary Applying BCP Fundamentals
  • 22. Lab Discussing Business Continuity Plan Fundamentals.html
  • 23. Template Business Continuity Plan Fundamentals.html

  • 11. Acquisition Strategy and Practice
  • 1. Introduction Acquisition Strategy and Practice
  • 2. Supply Chain Risks
  • 3. Supply Chain Risk Management
  • 4. Acquisition Security Requirements
  • 5. Acquisition Strategy
  • 6. Hardware, Software and Service Acquisition
  • 7. Security Questions to Ask Before Acquisition
  • 8. Service Level Agreement (SLA)
  • 9. Business Documents
  • 10. Outsourcing
  • 11. Third-Party Assessment
  • 12. Chain of Trust
  • 13. PUF (Physical Unclonable Function)
  • 14. SBOM (Software Bill of Materials)
  • 15. Summary Acquisition Strategy and Practice
  • 16. Lab Discussing Acquisition Strategy and Practice.html
  • 17. Template Acquisition Strategy and Practice.html

  • 12. Personnel Security Policies
  • 1. Introduction Personnel Security Policies
  • 2. Personnel Security
  • 3. Job
  • 4. Onboarding and Transfers
  • 5. Employment Agreements and Policies
  • 6. Termination
  • 7. Contractors
  • 8. Summary Drafting Personnel Security Policies
  • 9. Lab Discussing Personnel Security Policies.html

  • 13. Security Awareness and Training
  • 1. Introduction Security Awareness and Training
  • 2. Security Awareness
  • 3. Training Security and Methodology
  • 4. Appropriate Levels
  • 5. Training
  • 6. Security Fatigue and Champion
  • 7. Gamification
  • 8. Summary Developing Security Awareness and Training

  • 14. Conclusion
  • 1. Summary Domain 1
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 39535
    حجم: 3331 مگابایت
    مدت زمان: 518 دقیقه
    تاریخ انتشار: ۲۲ مرداد ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید