Security Professional (CISSP)


Security Professional (CISSP), Singapore elarning online course

Course Description

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
Backed by (ISC)², the globally recognized, nonprofit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.


Course Objectives

1. Security and Risk Management
2. Asset Security
3. Security Engineering
4. Communication and Network Security
5. Identity and Access Management
6. Security Assessment and Testing
7. Security Operations
8. Software Development Security


Related Courses

  • 1st step to certification: Troubleshooting and Maintaining Cisco IP Networks (642-832 TSHOOT)

    1st step to certification: Troubleshooting and Maintaining Cisco IP Networks (642-832 TSHOOT)

    SGD $45.00

    Course Description

    The Cisco 642-832 exam is one of the three required exams for the Cisco CCNP Certification. Passing this exam in conjunction with the ROUTE and SWITCH exams will earn you the CCNP (Cisco Certified Network Professional) certification, which is an excellent validation that you are knowledgable about the most current Cisco software and best practices. This course will teach you the basics of troubleshooting and walk you through several scenarios to put these methods to the test. Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinationsThis course is SkillsFuture Credit Eligible.

    Read more...

  • Essential Online Course - Computer Hacking Forensic Investigator (CHFI)

    Essential Online Course - Computer Hacking Forensic Investigator (CHFI)

    SGD $299.00

    Course Description

    CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure. Be updated with the latest IT security! - Know the changes and updates in IT Security - Equip yourself with the right knowledge  - Defend your system and data from latest threats - Have the advantage of protecting your data

    Read more...

  • Core Solutions of Microsoft SharePoint Server 2013 (70-331)

    Core Solutions of Microsoft SharePoint Server 2013 (70-331)

    SGD $54.00

    Course Description

    The Microsoft 70-331 exam is one of the two SharePoint-specific exams required for the Microsoft Certified Solutions Expert: SharePoint Certification. This VTC course covers the necessary prerequisites for the exam and walks you through the process of setting up a SharePoint implementation from bare-metal to fully-functional SharePoint environment. Along the way you will not only learn Microsoft best practices, but also basic aspects of SharePoint administration. Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinationsThis course is SkillsFuture Credit Eligible.

    Read more...


Content

Security and Risk Management

+

Applying Security Governance Principles through Compliance Part 1

Applying Security Governance Principles through Compliance Part 2

Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines Part 1

Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines Part 2

Personal Security and Risk Management Concepts Part 1

Personal Security and Risk Management Concepts Part 2

Understand and Apply Risk Management Concepts Part 1

Understand and Apply Risk Management Concepts Part 2

Understand and Apply Risk Management Concepts Part 3

Establish and Manage Information Security Education, Training, and Awareness

Asset Security

+

Asset Security Part 1

Asset Security Part 2

Asset Security Part 3

Asset Security Part 4

Asset Security Part 5

Security Engineering

+

Security Engineering Part 1

Security Engineering Part 2

Security Engineering Part 3

Security Engineering Part 4

Security Engineering Part 5

Security Engineering Part 6

Security Engineering Part 7

Security Engineering Part 8

Security Engineering Part 9

Communication and Network Security

+

Communication and Network Security Part 1

Communication and Network Security Part 2

Communication and Network Security Part 3

Communication and Network Security Part 4

Communication and Network Security Part 5

Communication and Network Security Part 6

Communication and Network Security Part 7

Communication and Network Security Part 8

Communication and Network Security Part 9

Communication and Network Security Part 10

Identity and Access Management

+

Control Physical and Logical Access to Assets

Manage Identification and Authentication of People and Devices Part 1

Manage Identification and Authentication of People and Devices Part 2

Manage Identification and Authentication of People and Devices Part 3

Manage Identification and Authentication of People and Devices Part 4

Security Assessment and Testing

+

Security Assessment and Testing and Performing Vulnerability Assessments Part 1

Performing Vulnerability Assessments Part 2

Performing Vulnerability Assessments Part 3

Implementing Security Management Processes

VTP Configuration

+

Security Operations Part 1

Security Operations Part 2

Security Operations Part 3

Software Development Security

+

Software Development Security Part 1

Software Development Security Part 2

Software Development Security Part 3

Software Development Security Part 4

Software Development Security Part 5

SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.