Skip to main Content

E-learning: CISSP Online Self-Paced Training, Exam and Peace of Mind Bundle - 180 days. (CISSP-BDL-POM-180)

  • Precio: eur1,750.00
  • Código: CISSP-BDL-POM-180
  • Días de acceso: 180 días

Descripción

Top

Official ISC2 Online Self-Paced CISSP Training is a groundbreaking way to prep for certification that uses artificial intelligence to customize your learning journey. It pinpoints areas that require additional focus and guides you through your exam prep in a way that’s truly personalized.

Study smarter, not harder, with these key advantages:

  • Personalized instruction – Content, pace and difficulty adapt to your individual knowledge, learning speed and confidence level.
  • Enhanced engagement – Immediate feedback and dynamic content enable you to learn at an appropriate level.
  • Time savings – Training time is optimized by focusing on areas that require the most review.
  • Improved learning outcomes – The platform identifies areas requiring further review and provides targeted support to maximize your understanding of the content.

Certified Information Systems Security Professional (CISSP) training leverages the power of artificial intelligence, guiding students through a self-paced learning experience adapted to their unique needs. It covers the knowledge and skills for designing, developing, and managing the overall security posture of an organization.

What is included:

  • Self-paced online adaptive learning journey
  • Data-driven analytics dashboard for real-time feedback on learner progress
  • Robust search functionality to narrow topics
  • Pre- and post-course assessments
  • Knowledge checks and end-of-domain quizzes
  • Official ISC2 CISSP eTextbook
  • Interactive content
  • Domain-by-domain study sheets with key points
  • Email content support
  • Online interactive flash cards
  • Glossary of Terms
  • 24/7/365 chat technical support

Please note an exam voucher is included as part of this course

To be eligible for Peace of Mind Protection, you must not have attempted the certification exam within the last 12 months, and you must purchase the exam with Peace of Mind Protection from ISC2. If you have attempted the certification exam within the past 12 months, this offer is not applicable.

You must sit for both exams within 180 days of Peace of Mind Protection purchase.

Please note there is a 30-day waiting period after your first exam before you can take the second attempt.

Más Información

Top

To earn a Validation of Completion, learners must:

  • Complete and pass each domain with a score of 60% or higher (includes all knowledge checks and the end-of-domain assessment).
  • Complete the Learner Acknowledgement, verifying you are enrolled and authorized to take the final assessment.
  • Complete and pass the final assessment with a score of 60% or higher.
  • Complete the course evaluation survey.

Validity

A Validation of Completion is awarded to learners who meet the requisites and successfully complete their final assessment. While it may be used to prepare for professional certification, the Validation of Completion does not demonstrate competency, establish expertise or imply licensing or accreditation in any field. To earn the CISSP certification, you must pass the exam and meet the experience requirements.

Objetivos

Top

After completing this course you should be able to:

  • Apply the fundamental concepts and methods related to the fields of information technology and security.
  • Align the overall organizational operational goals with security functions and implementations.
  • Determine how to protect assets of the organization as they go through their life cycle.
  • Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
  • Apply the security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
  • Explain the importance of cryptography and the security services it can provide in today's digital and information age.
  • Evaluate the physical security elements relative to information security needs.
  • Evaluate the elements that comprise communication and network security relative to information security needs.
  • Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
  • Determine the appropriate access control models to meet business security requirements.
  • Apply the physical and logical access controls to meet information security needs.
  • Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
  • Apply the appropriate security controls and countermeasures to optimize an organization's operational function and capacity.
  • Assess the information systems risks to an organization's operational endeavors.
  • Determine the appropriate controls to mitigate specific threats and vulnerabilities.
  • Apply the information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems' life cycles.

Contenido

Top

Domain 1: Security and Risk Management

Domain 2: Asset Security

Domain 3: Security Architecture and Engineering

Domain 4: Communication and Network Security

Domain 5: Identity and Access Management

Domain 6: Security Assessment and Testing

Domain 7: Security Operations

Domain 8: Software Development Security

Prerrequisitos

Top

This training course is intended for professionals who have at least five years of cumulative, paid work experience in two or more of the eight domains of the (ISC)²® CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers. Individuals may be currently in roles such as:

  • Security Consultant;
  • Security Manager;
  • IT Director/Manager Security Auditor;
  • Security Architect;
  • Security Analyst;
  • Security Systems Engineer;
  • Chief Information Security Officer:
  • Security Director: Security Architect.