Security Professional (CISSP)


Security Professional (CISSP), Singapore SKillsFuture elarning online course

Course Description

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
Backed by (ISC)², the globally recognized, nonprofit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.


Course Objectives

1. Security and Risk Management
2. Asset Security
3. Security Engineering
4. Communication and Network Security
5. Identity and Access Management
6. Security Assessment and Testing
7. Security Operations
8. Software Development Security


Related Courses

  • Google Cloud Platform Data Storage Overview & Networking Fundamentals

    Google Cloud Platform Data Storage Overview & Networking Fundamentals

    SGD $20.00

    Course Description

    Google Cloud Platform which has you enterprise covered. GCP offers object storage for different needs and price points as well as managed MySQL and globally-scalable NoSQL databases. Our archival storage provides industry-leading pricing with the performance of disc. Different applications and workloads require different storage and database solutions. GCP offers a full suite of industry-leading storage services that are price performant and meet your needs for structured, unstructured, transactional, and relational data. This course will help you identify the solutions that fit your scenarios, whether they are mobile applications, hosting commercial software, data pipelines, or storing backups.   Google Cloud Platform enables developers to build, test and deploy applications on Google’s highly-scalable, secure, and reliable infrastructure. This course covers specifically Google Cloud Platform Networking services. This course will cover the features and functions of Google Cloud Platform Networking Services so that you will understand the GCP options available.. We will dive into GCP Networking fundamentals such as Software Defined Networking, Load Balancing, Autoscaling and Virtual Private Clouds. As an added bonus we also will dive into Identity and Access Management as well from a networking security perspective. After taking this class you should be able to understand what GCP Cloud services should enable your organization around networking services. Whether you’re a developer or architect this course will help understand the basic capabilities and some of the useful advanced features of GCP networking services and features.

    Read more...

  • Google Cloud Platform Assoc. Cloud Engineer Bootcamp

    Google Cloud Platform Assoc. Cloud Engineer Bootcamp

    SGD $29.00

    Course Description

    During the course I will provide insight into the GCP Cloud Engineer exam and walk thru main exercises around managing a GCP Cloud. We will be going thru demos, reviewing content and providing you the top 10 things to remember before taking the exam. An Associate Cloud Engineer deploys applications, monitors operations, and manages enterprise solutions. This individual is able to use Google Cloud Console and the command-line interface to perform common platform-based tasks to maintain one or more deployed solutions that leverage Google-managed or self-managed services on Google Cloud.

    Read more...

  • Hyperledger Fabric Blockchain Deep Dive

    Hyperledger Fabric Blockchain Deep Dive

    SGD $20.00

    Course Description

    This training is focused on preparing IT professionals in Hyperledger Fabric 1.1 foundations and providing uses cases with demos. It will introduce you to the need for Blockchain applications, use cases, and about Hyperledger Fabric, which is the open source framework for developing Blockchain applications and solutions with a modular architecture.

    Read more...


Content

Security and Risk Management

+

Applying Security Governance Principles through Compliance Part 1

Applying Security Governance Principles through Compliance Part 2

Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines Part 1

Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines Part 2

Personal Security and Risk Management Concepts Part 1

Personal Security and Risk Management Concepts Part 2

Understand and Apply Risk Management Concepts Part 1

Understand and Apply Risk Management Concepts Part 2

Understand and Apply Risk Management Concepts Part 3

Establish and Manage Information Security Education, Training, and Awareness

Asset Security

+

Asset Security Part 1

Asset Security Part 2

Asset Security Part 3

Asset Security Part 4

Asset Security Part 5

Security Engineering

+

Security Engineering Part 1

Security Engineering Part 2

Security Engineering Part 3

Security Engineering Part 4

Security Engineering Part 5

Security Engineering Part 6

Security Engineering Part 7

Security Engineering Part 8

Security Engineering Part 9

Communication and Network Security

+

Communication and Network Security Part 1

Communication and Network Security Part 2

Communication and Network Security Part 3

Communication and Network Security Part 4

Communication and Network Security Part 5

Communication and Network Security Part 6

Communication and Network Security Part 7

Communication and Network Security Part 8

Communication and Network Security Part 9

Communication and Network Security Part 10

Identity and Access Management

+

Control Physical and Logical Access to Assets

Manage Identification and Authentication of People and Devices Part 1

Manage Identification and Authentication of People and Devices Part 2

Manage Identification and Authentication of People and Devices Part 3

Manage Identification and Authentication of People and Devices Part 4

Security Assessment and Testing

+

Security Assessment and Testing and Performing Vulnerability Assessments Part 1

Performing Vulnerability Assessments Part 2

Performing Vulnerability Assessments Part 3

Implementing Security Management Processes

VTP Configuration

+

Security Operations Part 1

Security Operations Part 2

Security Operations Part 3

Software Development Security

+

Software Development Security Part 1

Software Development Security Part 2

Software Development Security Part 3

Software Development Security Part 4

Software Development Security Part 5

SkillsFuture Credit Eligible
SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.