CISSP Certification Online Course
CISSP Certification Online Courses in Kenya
2KO offers an online CISSP course in Kenya for students who are unable to attend full time CISSP training. 2KO Kenya's CISSP (Certified Information Systems Security Professional) online course covers certification topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the ten domains of information system security knowledge. 2KO delivers cutting-edge IT products in the consulting and business services space, as well as offering top-rated training for various IT vendors. Our internationally recognised courses can be offered either as hands-on full time classes, or as online learning.
Price in Kenyan Shilling - as at 21 August | KES 4,550 |
About
CISSP
The vendor-neutral CISSP
certification is the ideal credential for those with proven
deep technical and managerial competence, skills,
experience, and credibility to design, engineer, implement,
and manage their overall information security program to
protect organizations from growing sophisticated attacks.
Backed by (ISC), the globally recognized, not-for-profit
organization dedicated to advancing the information security
field, the CISSP was the first credential in the field of
information security to meet the stringent requirements of
ISO/IEC Standard 17024. Not only is the CISSP an objective
measure of excellence, but also a globally recognized
standard of achievement.
Download the course outline
2KO
Kenya's CISSP training course maps directly to the exam
objectives and offers numerous features such as exam tips,
case studies, and practice exams.
Certified Information Systems Security Professional CISSP
Access Control
General Concepts
Authentication
Principles
Types and Categories
Reference Monitor
Techniques
Models
Passwords
Smart Cards
Biometrics
Access Control Systems
Administration
Residuals
Accountability
Summary
Telecommunications and Network Security
OSI Reference Model
ISO/OSI Layers and Characteristics
Topologies
LAN Access Methods
Wireless
System and Security Management
Internet Protocols and Security
Firewall Terms and Types
Web Security
Common Attacks
Remote Access Security
Summary
Information Security Governance and Risk Management
Key Concepts
Definitions
Key Concepts
Risk Management
Risk Assessment
Useful Formulas
3rd Party Governance
Information Classification
Roles and Responsibilities
Written Guidance
Policies and Standards
Employment Policies
Employee Education Programs
Change Management
Summary
Software Architecture and Design
Problems
Databases
Query Language
Object Oriented
Applications Beyond the Database
Definitions
Application System Development
Controls
Compiled vs. Interpreted
Vulnerabilities
Botnets
Summary
Cryptography
Definitions
Cryptanalysis Terms
Symmetric Encryption
Asymmetric Encryption
Hybrid Encryption
Public Key Infrastructures
Hash Functions
Digital Signatures
Protocol Based
Pretty Good Privacy
Cracking Techniques
Summary
Security Architecture and Design
Abstract Levels
Computer Hardware
Operating Systems
Processors
Types of Storage
Information Security Architecture
Open and Closed Systems
Access Controls
Architectural Foundation
Modes of Operation
Certification and Accreditation
Evaluation Criteria
Security Models
Summary
Operations Security
Threats in an Operating Environment
Control Categories
Accountability
Trusted Recovery
Management and Administrative Control
Due Care and Diligence
Hardware and Software Controls
Email and Fax
Privilege
Physical Access
Monitoring Techniques
Problem Management
Threats and Vulnerabilities
Defense in Depth
Summary
Business Continuity and Disaster Recovery
The Basics
Reasons for BCP
Key Concepts
Definitions
Business Continuity Life Cycle
Project Initiation
Business Impact Analysis
Assessing Risk
Recovery Strategies
Off-Site Requirements
Data Redundancy
System Backups
Plan Development
Testing and Maintenance
Stages in an Incident
Summary
Legal Requirements and Investigations
Ethics
Code of Ethics
Laws
Intellectual Property
Proprietary Rights
Liability
Computer Crime
Computer Crime Laws
Computer Investigation
Investigation Steps
Computer Forensics
Evidence Admissibility
Summary
Physical and Environmental Security
Physical Security
Crime Prevention
Site Design and Configuration
Boundary Protection
Computing Facility Requirements
Fire Prevention
Fire Suppression
Fire Classes
Media Protection
Access Controls
Physical Security
Summary
Course Summary