Diploma in Certified Information Systems Security Professional
- Offered byAlison
Diploma in Certified Information Systems Security Professional at Alison Overview
Duration | 20 hours |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Diploma in Certified Information Systems Security Professional at Alison Highlights
- Earn a diploma of completion from Alison
Diploma in Certified Information Systems Security Professional at Alison Course details
- Analyze how secure a system is
- Identify potential risks to the system
- Describe Identity and Access Management
- Explain the architecture of a security system
- Recognize the software development life cycle's impact on security
- React to a security breach with disaster recovery
- Perform a proper security audit both internally and externally
- This free online course will provide you with key information and knowledge about all the critical topics in security for the modern age
- Such topics include computing, mobile security, application development security, and risk management, as well as preparing for future security systems
- This free course will provide you with an understanding of everything you need to know about becoming a Certified Information Systems Security Professional, and help prepare you for the Certified Information Security Professionals exam
- In the first part of the course, you will go over professional ethics, security policy, standards and procedures, and you will also learn more about protecting assets and security controls
- By taking this course you will learn crucial information about security in the modern age and have all of the necessary knowledge to become an Information Systems Auditor
Diploma in Certified Information Systems Security Professional at Alison Curriculum
Security and Risk Management
Topic A: Confidentiality, Integrity, and Availability
Topic B: Security Governance
Topic C: Compliance Requirements
Topic D: Legal and Regulatory - Global
Topic E: Professional Ethics
Topic F: Security Policy, Standards, Procedures
Topic G: Business Continuity
Topic H: Personal Security Policies
Topic I: Apply Risk Management
Topic J: Threat Modeling
Topic K: Risk Management - Supply Chain
Topic L: Security Awareness and Training
Security and Risk Management - Assessment
Asset Management
Topic A: Identify and Classify
Topic B: Asset Ownership
Topic C: Protect Privacy
Topic D: Asset Retention
Topic E: Data Security Controls
Topic F: Information / Asset Handling
Asset Management - Assessment
Security Architecture and Engineering
Topic A: Engineering Processes and Secure Design
Topic B: Concepts of Security Models
Topic C: Controls Based on Security Requirements
Topic D: Security Capabilities of Information Systems
Topic E: Assess / Mitigate Vulnerabilities
Topic F: Assess / Mitigate Vulnerabilities (Web)
Topic G: Assess / Mitigate Vulnerabilities (Mobile)
Topic H: Assess / Mitigate Vulnerabilities (Embedded)
Topic I: Apply Cryptography
Topic J: Site / Facility Security Principles
Topic K: Site / Facility Security Controls
Security Architecture and Engineering - Assessment
Communication and Network Security
Topic A: Secure Design and Network Architecture
Topic B: Secure Network Components
Topic C: Secure Communication Design
Communication and Network Security - Assessment
Identity and Access Management
Topic A: Physical and Logical Access
Topic B: Manage Identification / Authentication
Topic C: Integrate Identity as a Third-Party Service
Topic D: Implement and Manage Authorization
Topic E: Manage Identity / Access Lifecycle
Identity and Access Management - Assessment
Security Assessment and Testing
Topic A: Assessment, Test, and Audit Strategies
Topic B: Security Control Testing
Topic C: Security Process Data
Topic D: Analyze Test Output / Generate Reports
Topic E: Conduct / Facilitate Security Audit
Security Assessment and Testing - Assessment