Siirry suoraan sisältöön

CISSP: Certified Information System Security Professional (8 op)

Toteutuksen tunnus: C-10065-TT00CR29-3046

Toteutuksen perustiedot


Ilmoittautumisaika
05.08.2024 - 31.12.2025
Ilmoittautuminen toteutukselle on käynnissä.
Ajoitus
05.08.2024 - 31.12.2026
Toteutus on käynnissä.
Opintopistemäärä
8 op
Lähiosuus
8 op
Toteutustapa
Monimuoto-opetus
Korkeakoulu
Metropolia Ammattikorkeakoulu, Karaportti 2
Opetuskielet
englanti
Paikat
0 - 5000
Opintojakso
C-10065-TT00CR29
Toteutukselle C-10065-TT00CR29-3046 ei löytynyt varauksia!

Arviointiasteikko

Hyväksytty/Hylätty

Sisällön jaksotus

Riippuu opiskelijasta itsestään.

Tavoitteet

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®: • Security and Risk Management • Asset Security • Security Engineering • Communications and Network Security • Identity and Access Management • Security Assessment and Testing • Security Operations • Software Development Security This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Sisältö

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK. Course Content Module 1: Security and Risk Management Module 1.1: Security Governance Principles Module 1.2: Compliance Module 1.3: Professional Ethics Module 1.4: Security Documentation Module 1.5: Risk Management Module 1.6: Threat Modeling Module 1.7: Business Continuity Plan Fundamentals Module 1.8: Acquisition Strategy and Practice Module 1.9: Personnel Security Policies Module 1.10: Security Awareness and Training Module 2: Asset Security Module 2.1: Asset Classification Module 2.2: Privacy Protection Module 2.3: Asset Retention Module 2.4: Data Security Controls Module 2.5: Secure Data Handling Module 3: Security Engineering Module 3.1: Security in the Engineering Lifecycle Module 3.2: System Component Security Module 3.3: Security Models Module 3.4: Controls and Countermeasures in Enterprise Security Module 3.5: Information System Security Capabilities Module 3.6: Design and Architecture Vulnerability Mitigation Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Module 3.8: Cryptography Concepts Module 3.9: Cryptography Techniques Module 3.10: Site and Facility Design for Physical Security Module 3.11: Physical Security Implementation in Sites and Facilities Module 4: Communications and Network Security Module 4.1: Network Protocol Security Module 4.2: Network Components Security Module 4.3: Communication Channel Security Module 4.4: Network Attack Mitigation Module 5: Identity and Access Management Module 5.1: Physical and Logical Access Control Module 5.2: Identification, Authentication, and Authorization Module 5.3: Identity as a Service Module 5.4: Authorization Mechanisms Module 5.5: Access Control Attack Mitigation Module 6: Security Assessment and Testing Module 6.1: System Security Control Testing Module 6.2: Software Security Control Testing Module 6.3: Security Process Data Collection Module 6.4: Audits Module 7: Security Operations Module 7.1: Security Operations Concepts Module 7.2: Physical Security Module 7.3: Personnel Security Module 7.4: Logging and Monitoring Module 7.5: Preventative Measures Module 7.6: Resource Provisioning and Protection Module 7.7: Patch and Vulnerability Management Module 7.8: Change Management Module 7.9: Incident Response Module 7.10: Investigations Module 7.11: Disaster Recovery Planning Module 7.12: Disaster Recovery Strategies Module 7.13: Disaster Recovery Implementation Module 8: Software Development Security Module 8.1: Security Principles in the System Lifecycle Module 8.2: Security Principles in the Software Development Lifecycle Module 8.3: Database Security in Software Development Module 8.4: Security Controls in the Development Environment Module 8.5: Software Security Effectiveness Assessment

Aika ja paikka

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Oppimateriaalit

Löytyy oppimisympäristöstä.

Opetusmenetelmät

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Harjoittelu- ja työelämäyhteistyö

N/A

Tenttien ajankohdat ja uusintamahdollisuudet

Tiedot löytyvät kurssin oppimisympäristöstä.

Pedagogiset toimintatavat ja kestävä kehitys

N/A

Toteutuksen valinnaiset suoritustavat

N/A

Opiskelijan ajankäyttö ja kuormitus

Riippuu opiskelijasta itsestään.

Arviointimenetelmät ja arvioinnin perusteet

Pass after all of lectures with article reviews has been done and the Final Exam has been passed.

Siirry alkuun