Tutpig.com

CISSP – Security and Risk Management – Domain 1

Free Flash Cards & Practice Exam Included. To Master IT, Learn IT from the Masters! Over 90% pass rate.

Certcop (A division of Secbay Inc.)

What you’ll learn

Course Content

Requirements

Certcop (A division of Secbay Inc.)

Secbay and its partners have provided successful training to many top-edge companies worldwide. They have successfully delivered instructor-led classroom as well as virtual-live training and certification for many industry leaders such as DoD, DHS, US Army, US Navy, US Airforce, Unisys, ICE, BAH, Booz Allen Hamilton, Freddie Mac, Guidewell Source, Disney, Navarro, Apple, Amazon, Deloitte, Seagate and many more.

 

Overview

Earning the CISSP validates your ability to plan, execute, and manage a best-in-class cybersecurity program. With a CISSP, you certify your knowledge and become an (ISC)2 member, gaining access to a wealth of special resources, instructional tools, and peer-to-peer networking possibilities.

The CISSP curriculum divides the subject into domains, which are different types of information security subjects. [11] The CISSP test is based on the Common Body of Knowledge, as defined by (ISC)2 (or CBK). (ISC)2 states that “The CISSP CBK is a taxonomy — a list of subjects that information security professionals all around the globe should be aware of. The CISSP CBK creates a standard framework of information security words and principles, allowing information security experts throughout the world to discuss, debate, and resolve issues in the field with a shared understanding.”

 

Program Objectives:

  1. Certcop Introduction
  2. Introduction to CISSP
  3. Understand, adhere to and promote professional ethics
  4. Understand and apply security concepts
  5. Evaluate and apply security governance principles
  6. Determine compliance and other requirements
  7. Understand legal and regulatory issues that pertain to information security in a holistic context
  8. Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
  9. Develop, document, and implement security policy, standards, procedures, and guidelines
  10. Identify, analyze, and prioritize Business Continuity (BC) requirements
  11. Contribute to and enforce personnel security policies and procedures
  12. Understand and apply risk management concepts
  13. Understand and apply threat modeling concepts and methodologies
  14. Apply Supply Chain Risk Management (SCRM) concepts
  15. Establish and maintain a security awareness, education, and training program
  16. Downloadable Free Flash Cards
  17. Free Practice Questions (Coming Soon for the same price)