وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Certified Information Systems Security Professional – CISSP

سرفصل های دوره

Become a certified information systems security professional and enjoy a bright future.


1. Introduction
  • 1. Introduction
  • 2. About This Training
  • 3. Course Outlines
  • 4. Course Flow
  • 5. Before You Start This Course

  • 2. Domain 1 Security and Risk Management
  • 1. Important Websites NIST
  • 2. Understand and Apply CIA
  • 3. Evaluate and Apply Security Governance Principles
  • 4. NIST 800-100
  • 5. Security Governance - Requirements
  • 6. The Organizational Culture
  • 7. Due Care and Due Diligence
  • 8. Exam Question
  • 9. Guidelines for Applying Security Governance Principles.html
  • 10. Determine Compliance Requirements
  • 11. Understand Legal and Regulatory Issues
  • 12. Exam Question
  • 13. Computer Crime
  • 14. Guidelines for Upholding Professional Ethics in Security.html
  • 15. Ethics
  • 16. Security Policy Framework
  • 17. Resources CIS
  • 18. Exam Tips
  • 19. The Relationship Between Security Documents Types
  • 20. Guidelines for Drafting Security Documentation.html
  • 21. Identify Business Continuity (BC) Requirements
  • 22. BCP Phases
  • 23. Business Impact Analysis - BIA
  • 24. NIST SP 800-34
  • 25. MTD-RTO-RPO
  • 26. MTTF-MTTR
  • 27. Business Continuity Controls
  • 28. High Availability and Fault Tolerance
  • 29. Exam Tips
  • 30. Guidelines for Applying Business Continuity Plan Fundamentals.html
  • 31. Contribute To and Enforce Personal Security
  • 32. Insider Threat Prevention
  • 33. Employees Privacy
  • 34. Social Media Security
  • 35. Understand and Apply Risk Management Concepts
  • 36. Qualitatively vs Quantitatively Assessment
  • 37. Risks Formula
  • 38. Risk Management Strategies
  • 39. Security Controls
  • 40. NIST 800-37
  • 41. Risk Register
  • 42. Exam Tips
  • 43. Guidelines for Implementing Risk Management.html
  • 44. Understand and Apply Threat
  • 45. STRIDE Model
  • 46. Threat Intelligence Sources
  • 47. Apply Risk-Based Management
  • 48. Vendor Management Life Cycle
  • 49. Establish and Maintain a Security Awareness
  • 50. Awareness Resources
  • 51. Some Important Policies

  • 3. Domain 2 Asset Security
  • 1. Identify Information and Assets
  • 2. Assets Classification and Labeling
  • 3. Military - Commercial Classification
  • 4. Sample of Classification Tool 1
  • 5. Sample of Classification Tool 2
  • 6. Data Lost Prevention
  • 7. Sample of DLP Tool
  • 8. Determine and Maintain Information and Asset Ownership
  • 9. Protect Privacy
  • 10. 2.3.1 Guidelines for Implementing Privacy Protection.html
  • 11. Ensure Appropriate Asset Retention
  • 12. Determine Data Security Controls
  • 13. Data Encryption

  • 4. Domain 3 Security Architecture and Engineering
  • 1. Introduction to Security Architecture
  • 2. Security Engineering Lifecycle
  • 3. NISP SP 14-27
  • 4. Trusted Computing Base _ TCB
  • 5. TCB Vulnerability
  • 6. Security Models
  • 7. TCSEC
  • 8. ITSEC
  • 9. Security Architecture Questions
  • 10. Enterprise Security Architecture
  • 11. Virtualization
  • 12. Fault Tolerance
  • 13. Server Fault Tolerance Techniques
  • 14. New Technology
  • 15. Cryptography
  • 16. Alternative Ciphers
  • 17. Symmetric Encryption
  • 18. Asymmetric Encryption
  • 19. Hash
  • 20. Physical Security
  • 21. Physical Access Barriers
  • 22. Power Issue
  • 23. Fire

  • 5. Domain 4 Communication and Network Security
  • 1. The OSI Model
  • 2. TCP-IP Model
  • 3. Network Architecture Components
  • 4. Firewall
  • 5. Network Types and Topologies
  • 6. Remote Access Technology
  • 7. Wireless Network
  • 8. Network Attacks
  • 9. Remote Access Security Mechanisms
  • 10. RAID
  • 11. Backup
  • 12. Network Questions

  • 6. Domain 5 Identity and Access Management (IAM)
  • 1. Access Control
  • 2. Authorization
  • 3. Authentication
  • 4. Single Sign on SSO
  • 5. Central Administration (RADUIS)
  • 6. Access Control Attack
  • 7. Intrusion Detection System (IDS)
  • 8. Access Control Important Exam Area
  • 9. Access Control Questions

  • 7. Domain 6 Security Assessment and Testing
  • 1. Introduction Security Assessment and Testing
  • 2. Test Output
  • 3. Vulnerability Assessment - Part 1
  • 4. Vulnerability Assessment - Part 2
  • 5. Nessus VA - Part 1
  • 6. Nessus VA - Part 2
  • 7. Nessus VA Report
  • 8. OWASP ZAP - VA
  • 9. Nexpose VA
  • 10. Penetration Testing
  • 11. Reconnaissance Demo - Maltego 2
  • 12. Scanning Demo - Zenmap
  • 13. Exploitation Demo - MetaSploit 2
  • 14. Event Log Review 2
  • 15. NIST 800-92
  • 16. SIEM Solution
  • 17. SIEM Solution Demo - Qradar
  • 18. Code Review
  • 19. Security KPI s

  • 8. Domain 7 Security Operations
  • 1. Introduction to Security Operation 2
  • 2. Security Operation 2

  • 9. Domain 8 Software Development Security
  • 1. The System Life Cycle
  • 2. Software Development Methods
  • 3. Change Control Process
  • 4. Security Consideration
  • 5. Software Control
  • 6. Introduction to SQL Injection 2
  • 7. What is SQL Injection
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 507
    حجم: 5536 مگابایت
    مدت زمان: 1015 دقیقه
    تاریخ انتشار: 22 دی 1401
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید