Get $1 credit for every $25 spent!

Information Security Certification Training Bundle

Ending In:
Add to Cart - $41
Add to Cart ($41)
$349
88% off
wishlist
(61)

What's Included

Product Details

Access
Lifetime
Content
9.50 hours
Lessons
68

Certified Information Systems Security Professional

Immerse Yourself in Practice Materials for the CISSP, One of the Top Security Certifications on Earth

By Mohadmed Atef | in Online Courses

The CISSP is an internationally recognized certification that demonstrates an IT professional's technical and managerial competence to protect organizations from increasingly sophisticated attacks. It's an ideal certification for anyone who wants to work in IT as it satisfies all government and professional security certification mandates and leaps out on a resume. In this course, you'll receive in-depth instruction in all things CISSP, so you can be fully prepared when you decide it's time to take the exam.

  • Access 68 lectures & 9.5 hours of content 24/7
  • Discuss penetration testing & information systems access control
  • Explore common security architecture frameworks
  • Understand different network types & topologies
  • Learn about cryptography, physical security, & operations security
  • Discuss the legal regulations & liability behind systems security
Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Introduction
    • Course Objective (12:13)
    • Course Roadmap (4:11)
    • CISSP 3rd vs CISSP 4th (3:43)
  • Information Systems Access Control
    • Important Websites and Course Material (7:02)
    • Introduction (6:45)
    • Authorization (38:38)
    • Authentication (18:46)
    • Single Sign On SSO (13:06)
    • Cnetral Administration (RADUIS) (4:12)
    • Access Control Attack (17:11)
    • Intrusion Detection Systems (6:53)
    • Penetration Testing (15:36)
    • Acces Control Important area for the exam (4:10)
    • Access Control Questions (7:58)
  • Security Architecture and Design
    • Common Security Architecture Frameworks (12:22)
    • Trusted Computing Base (9:17)
    • Security Models (17:03)
    • TCB Vulnerabilities (9:43)
    • Security Mode Types (3:41)
    • TCSEC (5:46)
    • Information Systems Security Standards (6:09)
    • Security Architecture Questions (3:13)
  • Network and Telecommunications Security
    • The OSI Model (17:22)
    • TCP/IP Model (2:45)
    • Network Architecture Components (17:04)
    • Firewall (10:38)
    • Network Types and Topolgies (8:37)
    • Remote Access Technology (18:30)
    • Wireless Network (7:15)
    • Network Attacks (8:58)
    • Remote Access Security Mechanisms (2:12)
    • RAID (6:55)
    • Backup (5:55)
    • Network Questions (1:16)
  • Information Security Classification and Program Development
    • Classification Schemes (4:34)
    • Security Document Types (3:21)
    • Security Awareness and Training (4:22)
  • Risk Management and Ethics
    • What is a Risk ? (11:59)
    • Asset Evaluation (18:28)
    • Ethics Issues in a Computing Environment (5:29)
  • Cryptography
    • Cryptography (16:26)
    • Alternative Ciphers (7:51)
    • Symmetric Encryption (12:39)
    • Asymmetric Encryption (13:47)
    • Hashing (6:05)
  • Physical Security
    • What Is Physical Security? (7:39)
    • Physical Access Barriers (9:44)
    • Power Issues (3:10)
    • Fire (5:28)
  • Operations Security
    • Operations Security (4:04)
    • Operations Security Control Methods (10:24)
  • Business Continuity and Disaster Recovery Planning
    • Business Continuity Plans (14:32)
    • Business Impact Analysis (10:09)
    • MTD/RTO/RPO (11:39)
    • Disaster Recovery Plans (3:29)
    • Alternate Sites (8:05)
  • Legal, Regulations, Compliance, and Investigations
    • Types of Law (6:49)
    • Liability (3:52)
  • Application Security
    • The System Life Cycle (6:40)
    • Software Escrow (3:06)
    • Software Development Methods (6:37)
    • The Change Control Process (3:01)
    • Security Consideration (1:49)
    • What is SQL Injection ? (14:05)
    • SQL Injection attack (7:53)
    • Software Control (2:45)
  • Difference between Third Edition and Fourth Editiom
    • Difference between Third Edition and Fourth Editiom (3:13)
  • Are you ready for the exam?
    • Are you ready for the exam ? (4:58)

View Full Curriculum


Access
Lifetime
Content
6.5 hours
Lessons
53

Certified Information Security Manager

Use Real Life Scenarios to Prepare for A Globally Recognized Certificate

By Mohadmed Atef | in Online Courses

The CISM certification is an internationally recognized credential developed for information security managers and other security professionals aimed to certify individuals in managing, designing, overseeing, and assessing an enterprise's information security. This comprehensive course will cover the four information security domains covered in this exam with in-depth, real life scenarios, giving you a complete grasp of how to ace the test.

  • Access 53 lectures & 6.5 hours of content 24/7
  • Explore information security governance
  • Understand risk management & compliance w/ legal & ethical standards
  • Establish & maintain an information security program
  • Learn about incident management & how to form a response
Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Introduction
    • Introduction (9:39)
    • Course Outline (8:01)
    • Course Structure (5:44)
    • Course Material and Exam Practice Question
  • Background
    • Background needed (4:40)
    • GRC (10:35)
    • Senior Managment and GRC (7:23)
    • Senior Managment and Risk (6:38)
    • Organization Structure (5:23)
  • Domain 1 : Information Security Governance
    • Introduction to Information Security Governances (13:33)
    • Business Goals and Objective (4:53)
    • Security Program Overview (5:48)
    • CIA Triad (5:40)
    • Information Security Components (4:00)
    • Information Security Governace Output (2:48)
    • Define Roles and Responsibilities (3:49)
    • GRC (1:18)
    • Governace of Third party (1:28)
    • Information Security Governance Overview (4:09)
    • Establish, monitor, evaluate and report metrics (5:50)
  • Domain 2 : Information Risk Management and Compliance
    • What is Risk ? (11:59)
    • Asset Evaluation (18:28)
    • Information Asset Register (7:58)
    • Classification Schemes (4:34)
    • Risk Register (3:20)
    • Alignment of Risk Assessment and BIA (4:03)
    • Business Impact Analysis - BIA (10:09)
    • Ethics Issues in a Computing Environment (5:29)
    • Control Types (2:56)
    • Control Catagory (3:51)
    • Evaluate information security controls (3:53)
  • Domain 3 : Information Security Program Development and Management
    • Establish and maintain the information security program (5:18)
    • Information Security Program Element (3:03)
    • Access Control (6:45)
    • Authorization (19:19)
    • Authentication (18:46)
    • Intrusion Detection Systems (6:53)
    • Network Architecture Components (17:04)
    • Firewall (10:38)
    • Cryptography (16:26)
    • Symetric Encryptian (12:38)
    • Asymetric Encryptian (13:47)
    • Hashing (6:05)
  • Domain 4 : Information Security Incident Management
    • Information Security Incident Managment (10:06)
    • Incident Repsonse Team (6:50)
    • Incident Report (4:11)
    • BCP- DRP (1:24)
    • Business Continuity Plans (14:32)
    • Business Impact Analysis (10:09)
    • MTD-RTO-RPO (11:39)
    • Disaster Recovery Plans (3:29)
    • Alternative Sites (8:05)
  • Get Ready for the Exam
    • Get Ready for the Exam (5:08)

View Full Curriculum


Access
Lifetime
Content
6.5 hours
Lessons
70

Certified Information System Auditor

Cover the Five Domains Information System Auditors Need to Know & Ace the CISA Exam

By Mohadmed Atef | in Online Courses

CISA is the certificate that recognizes a security professional's ability to audit enterprise information security and competently deliver solutions. This internationally acknowledged certificate is required for many information security jobs, and this course will empower you with all the knowledge you need to pass the exam.

  • Access 70 lectures & 6.5 hours of content 24/7
  • Learn about the process of auditing information systems
  • Explore governance & management of IT
  • Discuss information systems acquisition, development, & implementation
  • Understand how to run information systems operations, maintenance, & support
  • Implement information protection measures
Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Introduction
    • Introduction (11:14)
    • What is CISA Certification ? (8:16)
    • Course flow (4:15)
    • Course Material and Exam Pratice Question
    • Case Study (5:24)
    • ISO 27001 (8:38)
    • Important Defination (2:31)
    • IS Auditor (8:11)
    • ITAF Standard (7:46)
    • Types of External Audits (4:08)
    • Compensating Controls (3:47)
  • Background
    • Background needed (4:40)
    • GRC- Governance, Risk, Compliance (10:35)
    • Senior Management and GRC (7:23)
    • Senior Management and Risk (6:38)
    • Organization Structure (5:23)
  • Domain 1: The Process of Auditing Information Systems
    • The process of Audit IS (9:13)
    • IS Audit Report and Presentation samples (4:54)
    • Information Asset Register (6:08)
    • Audit Risk Assessment (12:26)
    • Audit Planing and management (7:20)
    • Document Control (3:18)
    • Scenario 1 (44:08)
    • Business process (7:12)
    • Law and regulation (2:16)
    • Evidence (5:52)
    • Sampling (3:53)
    • Reporting and Communication (7:08)
  • Domain 2: Governance and Management of IT
    • Governance and Management of IT (14:30)
    • IT Governance (3:02)
    • Information System Strategy (4:49)
    • IT Organization (2:51)
    • Maintenance of Policies and Procedures (5:00)
    • Policy and Procedures Resources (5:24)
    • Legal Compliance (8:34)
    • Quality Management system (1:55)
    • Mutarity Models (3:18)
    • CMMI - Capability Maturity Model Integrated (1:34)
    • Process optmization (3:52)
    • IT Investment Practices (5:30)
    • IT Supplier Selection (5:11)
    • Make or Buy decision (18:08)
    • Business Continuity Plan (14:32)
    • Business Impact Analysis (10:09)
  • Domain 3: Information Systems Acquisition, Development and Implementation
    • Information Systems Acquisition, Development and Implementation (9:24)
    • Project Governance (2:28)
    • Important PM Defination (2:31)
    • Types of Organization (6:40)
    • Project Managment (4:54)
    • Architecture (5:32)
    • Procurment Managment (1:05)
    • Plan Procurment Managment (18:08)
    • Requirment Managment (4:22)
    • Change Managment (3:22)
  • Domain 4: Information Systems Operations, Maintenance and Support
    • Information Systems Operations, Maintenance and Support (6:47)
    • Service Level Management (5:05)
    • Hardware Software and Knowledge statment (7:28)
    • Licences Managment (3:11)
    • Capacity Managment (2:45)
    • Incident Mamagment (5:31)
    • Incident Report Form (5:29)
    • Backup (5:55)
    • Disaster Recovery Plan - DRP (3:29)
    • Alternative Sites (8:05)
  • Domain 5: Protection of Information Assets
    • Protection of Information Assets (7:09)
    • Access Control (19:19)
    • Network Security (17:04)
    • Cryptography (16:26)
    • Physical Access barrier (9:44)
    • Operation Security (4:04)

View Full Curriculum



Terms

  • Instant digital redemption

15-Day Satisfaction Guarantee

We want you to be happy with every course you purchase! If you're unsatisfied for any reason, we will issue a store credit refund within 15 days of purchase.