Security Professional (CISSP)


Security Professional (CISSP), Singapore SKillsFuture elarning online course

Course Description

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
Backed by (ISC)², the globally recognized, nonprofit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.


Course Objectives

1. Security and Risk Management
2. Asset Security
3. Security Engineering
4. Communication and Network Security
5. Identity and Access Management
6. Security Assessment and Testing
7. Security Operations
8. Software Development Security


Related Courses

  • IBM Blockchain As A Service

    IBM Blockchain As A Service

    SGD $29.00

    Course Description

    The IBM Blockchain Platform is a cloud-based platform which provides tools for you to easily develop, operate, and grow your permissioned enterprise blockchain applications. This training will provide an overview of the platform features and capabilities so you can quickly get up to speed. The training also provides use cases with demos and optional labs that focused on business network setup and chaincode deployments with Composer.

    Read more...

  • Google Cloud Professional Cloud Developer

    Google Cloud Professional Cloud Developer

    SGD $29.00

    Course Description

    "A Professional Cloud Developer builds scalable and highly available applications using Google recommended practices and tools that leverage fully managed services. This individual has experience with next generation databases, runtime environments and developer tools. They also have proficiency with at least one general purpose programming language and are skilled with using Stackdriver to produce meaningful metrics and logs to debug and trace code. Course is meant to be a Crash Course for taking the Google Cloud Professional Cloud Developer Exam. It would be expected or at a minimum to have experience with Google Cloud and be a developer. Course has compressed the study objectives listed by Google Cloud and we have taken the beta exam. The exam is very challenging and will challenge the ""average"" developer.

    Read more...

  • Intro to Blockchain Technology, Blockchain Security  and R3 Corda

    Intro to Blockchain Technology, Blockchain Security and R3 Corda

    SGD $29.00

    Course Description

    This course will help you identify and differentiate between security threats and attacks on a Blockchain network. Blockchain security methods, best practices, risk mitigation, and all known (to date) cyber-attack vectors on the Blockchain will be covered. You will also learn how to perform a Blockchain network security risk analysis and glean a complete understanding of Blockchain's inherent security features and risks. You will learn the key aspects around Blockchain and Bitcoin, including: What is a blockchain? What is Bitcoin? What are smart contracts? What is a cryptocurrency? What are digital tokens? How blockchain and Bitcoin are related and why it is so important to know the relationship. Some common misconceptions about blockchain and Bitcoin. R3 Corda Blockchain is an enterprise blockchain distributed ledger. A blockchain is a tamper-evident, shared digital ledger that records transactions in a public or private peer-to-peer network. Distributed to all member nodes in the network, the ledger permanently records, in a sequential chain of cryptographic hash-linked blocks, the history of asset exchanges that take place between the peers in the network. This course has been designed for technical architects, pre sales architects, developers and project managers who must make technical decisions about distributed architectures and development platform  

    Read more...


Content

Security and Risk Management

+

Applying Security Governance Principles through Compliance Part 1

Applying Security Governance Principles through Compliance Part 2

Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines Part 1

Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines Part 2

Personal Security and Risk Management Concepts Part 1

Personal Security and Risk Management Concepts Part 2

Understand and Apply Risk Management Concepts Part 1

Understand and Apply Risk Management Concepts Part 2

Understand and Apply Risk Management Concepts Part 3

Establish and Manage Information Security Education, Training, and Awareness

Asset Security

+

Asset Security Part 1

Asset Security Part 2

Asset Security Part 3

Asset Security Part 4

Asset Security Part 5

Security Engineering

+

Security Engineering Part 1

Security Engineering Part 2

Security Engineering Part 3

Security Engineering Part 4

Security Engineering Part 5

Security Engineering Part 6

Security Engineering Part 7

Security Engineering Part 8

Security Engineering Part 9

Communication and Network Security

+

Communication and Network Security Part 1

Communication and Network Security Part 2

Communication and Network Security Part 3

Communication and Network Security Part 4

Communication and Network Security Part 5

Communication and Network Security Part 6

Communication and Network Security Part 7

Communication and Network Security Part 8

Communication and Network Security Part 9

Communication and Network Security Part 10

Identity and Access Management

+

Control Physical and Logical Access to Assets

Manage Identification and Authentication of People and Devices Part 1

Manage Identification and Authentication of People and Devices Part 2

Manage Identification and Authentication of People and Devices Part 3

Manage Identification and Authentication of People and Devices Part 4

Security Assessment and Testing

+

Security Assessment and Testing and Performing Vulnerability Assessments Part 1

Performing Vulnerability Assessments Part 2

Performing Vulnerability Assessments Part 3

Implementing Security Management Processes

VTP Configuration

+

Security Operations Part 1

Security Operations Part 2

Security Operations Part 3

Software Development Security

+

Software Development Security Part 1

Software Development Security Part 2

Software Development Security Part 3

Software Development Security Part 4

Software Development Security Part 5

SkillsFuture Credit Eligible
SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.