وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CISSP & CISM Exam Prep Course – Fast Track Training

سرفصل های دوره

Learn once and Certify Many - Be Ready to clear your upcoming CISSP, CISM & CRISC Exams


1. Understand What is the CISM and What is the CISSP
  • 1. CISM Course Introduction
  • 2. CISSP Course Introduction

  • 2. Understand Basic Security Concepts
  • 1. Security Objective
  • 2. Security Threats
  • 3. Security Vulnerabilities
  • 4. Adversaries
  • 5. Malware
  • 6. Cyber Attacks
  • 7. Cyber Kill Chain
  • 8. Application Attacks
  • 9. File-Less Malware
  • 10. Social Engineering
  • 11. Password Attacks
  • 12. Cybersecurity Standards and Frameworks

  • 3. Understand The Risk Management and Threat Modeling
  • 1. Risk Management Overview
  • 2. Types of Risk
  • 3. Risk identifcation and Analysis
  • 4. Specialized techniques in Risk Analysis
  • 5. Managing the Risk - Risk Response
  • 6. Risk Reporting and Monitoring
  • 7. Key Risk Indicators
  • 8. Risk Management Frameworks
  • 9. Threat Modeling Techniques

  • 4. Understand The Security Controls
  • 1. Security Controls Overview
  • 2. Example of Security Controls
  • 3. Control Objective and Compensating Controls
  • 4. Defense in Depth and Control References
  • 5. Selection and Implementation of Security Controls
  • 6. Security Controls Assessment

  • 5. Understand Governance and Governance Tools
  • 1. What is Governance and Management
  • 2. Organizational Structure
  • 3. Security Governance
  • 4. Security Program and Strategy
  • 5. Security Manager Roles
  • 6. Security Program Stakeholders
  • 7. Security Functions
  • 8. Governance Frameworks
  • 9. Policies
  • 10. Policy development
  • 11. Standards
  • 12. Procedures and Guidelines
  • 13. Documentation Review
  • 14. Security Program documentation

  • 6. Understand Legal Laws and Regulations and Privacy Requirements
  • 1. Legal Laws and Regulations

  • 7. Understand Security Program Roles and Stakeholders
  • 1. Security Program
  • 2. Security Functions
  • 3. Roles of Security Manager
  • 4. Roles in Data and Assets Protection
  • 5. due care and due dillegence

  • 8. Understand Incident Response and SOC
  • 1. Incident Management Overview
  • 2. Collecting digital Evidences and Forensic
  • 3. Incident Response Training
  • 4. Incident Response Plan Testing
  • 5. SOC Team
  • 6. SOC Tools

  • 9. Understand Business Continuity and Disaster Recovery Planning
  • 1. What is Disaster and BIA
  • 2. What is the DRP
  • 3. Business Continuity Introduction
  • 4. RPO & RTO
  • 5. AIW,SDO,MTO and Relation
  • 6. Linking RPO, RTO, AIW, SDO, MTO
  • 7. Recovery Strategies
  • 8. Reciprocal Agreement
  • 9. BCP Testing and Evaluation

  • 10. Understand Personnel Security and Human Risk
  • 1. Personnel Security
  • 2. Security Awareness Training
  • 3. SoD and Two Person Control
  • 4. Least Privilege and Need to Know

  • 11. Understand Physical Security and Related Risks
  • 1. Physical Security Overview
  • 2. Physical Access Control
  • 3. Badges and Smart Cards and PACs
  • 4. Motion Detectors and Security Cameras
  • 5. Security Cameras
  • 6. Work Area & Priemeter Security
  • 7. Securing Power Sources
  • 8. Env Controls
  • 9. Fire Suppression System

  • 12. Software Development and Security Concepts
  • 1. Software Development Overview

  • 13. Infrastructure and Database Basics
  • 1. Computing devices overview
  • 2. Computing devices components
  • 3. Application architecture and Network architecture

  • 14. Network Foundations and Network Security
  • 1. Introduction to Networks
  • 2. Network Topologies
  • 3. OSI and TCPIP
  • 4. Explaining Layers 1,2,3
  • 5. Explaining Layers 4,5,6,7
  • 6. Layer 2 Attacks
  • 7. Network Segmentation and VLANs
  • 8. NAC and dot1x and Port Security - SUB
  • 9. Wireless Security
  • 10. Firewall and IPS and DMZ and Screened Subnet
  • 11. IP Security Protocol (IPSEC)

  • 15. Domain 14 - Cryptography and Hashing
  • 1. PKI
  • 2. Digital Certificate
  • 3. Digital Signature
  • 4. Hashing

  • 16. Domain 15 - Security Models and Secure Design Concepts
  • 1. Security Design Principals
  • 2. Security through Obsecurity
  • 3. Security Models
  • 4. Brewer Nash and HRU
  • 5. TCSEC, ITSEC and Common Criteria

  • 17. Domain 16 - Security Assurance and Assessment and Auditing
  • 1. What is Information System Auditing
  • 2. Security Testing and Assessment

  • 18. Identity Access Management
  • 1. AAA Overview
  • 2. Manage Privileged Accounts
  • 3. SSO RSO
  • 4. MFA
  • 5. Authorization and Access Control Models

  • 19. Operations and IT Management Processes
  • 1. Change Management
  • 2. Type of Changes
  • 3. Data Backup
  • 4. Backup Types
  • 5. Storage Redundancy using RAID
  • 6. Database overview
  • 7. Database Security
  • 8. Database Resiliency
  • 9. Patch Management
  • 10. Configuration Management
  • 11. ATO Accrediation

  • 20. Understand Data Lifecycle and Data Security Measures
  • 1. Data life cycle
  • 2. Data Classification
  • 3. Data Security Controls
  • 4. Data Protection Concepts
  • 5. Data Destruction

  • 21. Domain 19 - Third Party Management
  • 1. Outsourcing and Third Party Management
  • 2. Supply chain Risk Management

  • 22. Domain 20 - Emerging Technologies
  • 1. Cloud Computing
  • 2. Microservices, VDI, Architectural Concepts
  • 3. Virtualization and SDDC
  • 4. SDN and SDWAN
  • 5. Containers and Functions
  • 6. CDN - Content Delivery Network

  • 23. Domain 21 - Management Tools
  • 1. RACI Matrix
  • 2. IT Balanced Scorecards
  • 3. Gap analysis Process
  • 4. Feasibility Analaysis and Business Case

  • 24. Code of Ethics
  • 1. ISACA Code of Ethics
  • 2. ISC2 Code of Ethics
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 28600
    حجم: 6924 مگابایت
    مدت زمان: 1199 دقیقه
    تاریخ انتشار: ۲۱ دی ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید