Information Security Certification Training Bundle

5 Reviews
You save 88% -

What's Included

Certified Information Systems Security Professional
  • Certification included
  • Experience level required: All levels
  • Access 68 lectures & 9.5 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

68 Lessons (9.5h)

  • Introduction
    Course Objective12:13
    Course Roadmap4:11
    CISSP 3rd vs CISSP 4th3:43
  • Information Systems Access Control
    Important Websites and Course Material7:02
    Single Sign On SSO13:06
    Cnetral Administration (RADUIS)4:12
    Access Control Attack17:11
    Intrusion Detection Systems6:53
    Penetration Testing15:36
    Acces Control Important area for the exam4:10
    Access Control Questions7:58
  • Security Architecture and Design
    Common Security Architecture Frameworks12:22
    Trusted Computing Base9:17
    Security Models17:03
    TCB Vulnerabilities9:43
    Security Mode Types3:41
    Information Systems Security Standards6:09
    Security Architecture Questions3:13
  • Network and Telecommunications Security
    The OSI Model17:22
    TCP/IP Model2:45
    Network Architecture Components17:04
    Network Types and Topolgies8:37
    Remote Access Technology18:30
    Wireless Network7:15
    Network Attacks8:58
    Remote Access Security Mechanisms2:12
    Network Questions1:16
  • Information Security Classification and Program Development
    Classification Schemes4:34
    Security Document Types3:21
    Security Awareness and Training4:22
  • Risk Management and Ethics
    What is a Risk ?11:59
    Asset Evaluation18:28
    Ethics Issues in a Computing Environment5:29
  • Cryptography
    Alternative Ciphers7:51
    Symmetric Encryption12:39
    Asymmetric Encryption13:47
  • Physical Security
    What Is Physical Security?7:39
    Physical Access Barriers9:44
    Power Issues3:10
  • Operations Security
    Operations Security4:04
    Operations Security Control Methods10:24
  • Business Continuity and Disaster Recovery Planning
    Business Continuity Plans14:32
    Business Impact Analysis10:09
    Disaster Recovery Plans3:29
    Alternate Sites8:05
  • Legal, Regulations, Compliance, and Investigations
    Types of Law6:49
  • Application Security
    The System Life Cycle6:40
    Software Escrow3:06
    Software Development Methods6:37
    The Change Control Process3:01
    Security Consideration1:49
    What is SQL Injection ?14:05
    SQL Injection attack7:53
    Software Control2:45
  • Difference between Third Edition and Fourth Editiom
    Difference between Third Edition and Fourth Editiom3:13
  • Are you ready for the exam?
    Are you ready for the exam ?4:58

Certified Information Systems Security Professional

Mohadmed Atef

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374


The CISSP is an internationally recognized certification that demonstrates an IT professional's technical and managerial competence to protect organizations from increasingly sophisticated attacks. It's an ideal certification for anyone who wants to work in IT as it satisfies all government and professional security certification mandates and leaps out on a resume. In this course, you'll receive in-depth instruction in all things CISSP, so you can be fully prepared when you decide it's time to take the exam.

  • Access 68 lectures & 9.5 hours of content 24/7
  • Discuss penetration testing & information systems access control
  • Explore common security architecture frameworks
  • Understand different network types & topologies
  • Learn about cryptography, physical security, & operations security
  • Discuss the legal regulations & liability behind systems security


Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels


  • Internet required


  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
Your cart is empty. Continue Shopping!
Processing order...