وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CISSP : Domain 1 : Security and Risk Management – Learn 2024

سرفصل های دوره

Comprehensive cybersecurity certification covering risk management, access control, cryptography, and incident response.


1. Introduction
  • 1. Introduction Course Overview
  • 2. Domain 1 Introduction Security and Risk Management

  • 2. Security Concepts
  • 1. Introduction Security Concepts
  • 2. The CIA Triad
  • 3. The Five Pillars of Security
  • 4. Confidentiality Terms
  • 5. Integration Terms
  • 6. Availability Terms
  • 7. Authenticity Terms
  • 8. Non-repudiation Terms
  • 9. Common Security Terms
  • 10. Security Concepts Best Practices for Application
  • 11. Lab Discussing Security Concepts.html
  • 12. Template Security Concepts Documentation Template.html

  • 3. Security Governance Principles
  • 1. Introduction Security Governance Principles
  • 2. Security Governance
  • 3. Governance Requirements
  • 4. Due Care and Due Diligence
  • 5. Security Goal Categories
  • 6. IT Governance Committee
  • 7. Organizational Governance Structure
  • 8. The Organizational Cultures Impact on Security
  • 9. Roles and Responsibilities
  • 10. CISO (Chief Information Security Officer) Role
  • 11. CISO (Chief Information Security Officer) Responsibilities
  • 12. Organizational Processes
  • 13. Communications
  • 14. Security Reporting Options
  • 15. Summary Security Governance Principles
  • 16. Lab Discussing Security Governance Principles.html
  • 17. Template Security Governance Principles.html

  • 4. Compliance
  • 1. Introduction Compliance
  • 2. Compliance
  • 3. CISSP Legislative and Regulatory Compliance
  • 4. Privacy Issues and Personally Identifiable Information (PII)
  • 5. U.S. Information Privacy Law
  • 6. International Privacy Law
  • 7. EU GDPR
  • 8. Computer Crime
  • 9. U.S. Computer Crime Law
  • 10. Data Breach
  • 11. Intellectual Property Law and Licensing
  • 12. License Types
  • 13. Trans-Border Data Flow (TBDF)
  • 14. CISSP Import and Export Controls
  • 15. Industry Standards
  • 16. Summary Supporting Compliance
  • 17. Lab Discussing Compliance.html
  • 18. Template CISSP Compliance Documentation Template.html

  • 5. Professional Ethics
  • 1. Introduction Professional Ethics
  • 2. The Purpose of Ethics
  • 3. The Organizational Ethics
  • 4. Regulatory Requirements for Ethics Programs
  • 5. Ethics Issues in a Computing Environment
  • 6. Common Computer Ethics Fallacies
  • 7. Internet Architecture Board Ethics (IAB)
  • 8. Ethical Minefields for Security Professionals
  • 9. Code of Ethics
  • 10. Summary Upholding Professional Ethics in Security
  • 11. Lab Discussing Professional Ethics in Security.html
  • 12. Template CISSP Professional Ethics Documentation.html

  • 6. Security Documentation
  • 1. Introduction Security Documentation
  • 2. The Value of Security Documentation and Types
  • 3. Security Policy Objectives and Types
  • 4. The Relationship Between Security Document Types
  • 5. Summary Drafting Security Documentation
  • 6. Lab Discussing Security Documentation.html
  • 7. Template Security Documentation.html

  • 7. Risk Management
  • 1. Introduction Risk Management
  • 2. What is Risk
  • 3. Risk Management
  • 4. Integrating Governance, Compliance, and Risk Management
  • 5. Results of Improper Risk Management
  • 6. The Risk Analysis Process
  • 7. Asset Identification and Valuation
  • 8. Vulnerability Areas
  • 9. Identify Threats
  • 10. Risk Assessment Methodology
  • 11. Risk Assessment Determination Factors
  • 12. Qualitative and Quantitative Assessments
  • 13. Risk Prioritization
  • 14. Risk Management Frameworks
  • 15. Risk Maturity Model (RMM)
  • 16. Summary Implementing Risk Management
  • 17. Lab Discussing Risk Management.html
  • 18. Template Risk Management Documentation Template.html

  • 8. Threat Modeling
  • 1. Introduction Threat Modeling
  • 2. Threat Modeling Process
  • 3. Threat Models
  • 4. Threat Types
  • 5. Virus Types
  • 6. Malware Types
  • 7. Reduction Analysis
  • 8. Threat Agents
  • 9. Diagramming Attacks
  • 10. Rating Threat Impact (DREAD) aka. DREAD Model
  • 11. Summary Implementing Threat Modeling
  • 12. Lab Discussing Threat Modeling.html
  • 13. Template Threat Modeling Documentation.html

  • 9. Risk Response
  • 1. Introduction Risk Response
  • 2. Threat Remediation
  • 3. Responses to Risks
  • 4. Risk Treatment
  • 5. Control Selection Criteria (Framework and Types)
  • 6. Control Functions and Implementation
  • 7. Residual Risk
  • 8. Monitoring and Measuring
  • 9. Continuous Improvement
  • 10. Summary Risk Response
  • 11. Lab Discussing Risk Response.html
  • 12. Template Risk Response Documentation.html

  • 10. Business Continuity Plan Fundamentals
  • 1. Introduction Business Continuity Plan Fundamentals
  • 2. BCP (Business Continuity Planning) and Content
  • 3. Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
  • 4. Business Continuity Plan (BCP) Project Management
  • 5. Advisory Committee-BCP Team
  • 6. BCP Program Coordinators
  • 7. BCP Team Responsibilities
  • 8. Project Initiation and Scope
  • 9. NIST SP 800-34
  • 10. Business Organization Analysis
  • 11. BIA (Business Impact Analysis)
  • 12. External Dependencies
  • 13. Critical Business Processes
  • 14. Impact of Financial Loss
  • 15. MTD ( Maximum Tolerable Downtime)
  • 16. Reduced Operational
  • 17. Business Plan Evaluation
  • 18. Business Plan Testing
  • 19. Business Plan Maintenance
  • 20. BCP Implementation During a Disaster
  • 21. Summary Applying BCP Fundamentals
  • 22. Lab Discussing Business Continuity Plan Fundamentals.html
  • 23. Template Business Continuity Plan Fundamentals.html

  • 11. Acquisition Strategy and Practice
  • 1. Introduction Acquisition Strategy and Practice
  • 2. Supply Chain Risks
  • 3. Supply Chain Risk Management
  • 4. Acquisition Security Requirements
  • 5. Acquisition Strategy
  • 6. Hardware, Software and Service Acquisition
  • 7. Security Questions to Ask Before Acquisition
  • 8. Service Level Agreement (SLA)
  • 9. Business Documents
  • 10. Outsourcing
  • 11. Third-Party Assessment
  • 12. Chain of Trust
  • 13. PUF (Physical Unclonable Function)
  • 14. SBOM (Software Bill of Materials)
  • 15. Summary Acquisition Strategy and Practice
  • 16. Lab Discussing Acquisition Strategy and Practice.html
  • 17. Template Acquisition Strategy and Practice.html

  • 12. Personnel Security Policies
  • 1. Introduction Personnel Security Policies
  • 2. Personnel Security
  • 3. Job
  • 4. Onboarding and Transfers
  • 5. Employment Agreements and Policies
  • 6. Termination
  • 7. Contractors
  • 8. Summary Drafting Personnel Security Policies
  • 9. Lab Discussing Personnel Security Policies.html

  • 13. Security Awareness and Training
  • 1. Introduction Security Awareness and Training
  • 2. Security Awareness
  • 3. Training Security and Methodology
  • 4. Appropriate Levels
  • 5. Training
  • 6. Security Fatigue and Champion
  • 7. Gamification
  • 8. Summary Developing Security Awareness and Training

  • 14. Conclusion
  • 1. Summary Domain 1
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 39535
    حجم: 3331 مگابایت
    مدت زمان: 518 دقیقه
    تاریخ انتشار: 22 مرداد 1403
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید