Filter Keyword to...

Category: IT Professionals

Results Per Page :
Within the data center, servers are needed to run the applications and services that users need to access and these servers will retrieve the required information from storage. In this course, you will be...
[READ MORE]
Within the data center, servers are needed to run the applications and services that users need to access and these servers will retrieve the required information from storage. In this course, you will be introduced to the Cisco UCS product line of servers. In addition, you will discover how B-Series servers are provisioned. This course is one of a series in the Skillsoft learning path that covers the objectives for the Cisco exam Understanding Cisco Cloud Fundamentals exam (210-451 CLDFND). This exam counts toward the CCNA Cloud certification.
Within the data center, servers are needed to run the applications and services that users need to access and these servers will retrieve the required information from storage. In this course, you will be introduced to the Cisco UCS product line of servers. In addition, you will discover how B-Series servers are provisioned. This course is one of a series in the Skillsoft learning path that covers the objectives for the Cisco exam Understanding Cisco Cloud Fundamentals exam (210-451 CLDFND). This exam counts toward the CCNA Cloud certification.
[READ LESS]
Produced by: SkillSoft
If you need to connect an IP to IP gateway, IT professionals will need to inderstand how to set up the CUBE. In this course, you will examine the IP to IP gateway configuration that may be used for a service...
[READ MORE]
If you need to connect an IP to IP gateway, IT professionals will need to inderstand how to set up the CUBE. In this course, you will examine the IP to IP gateway configuration that may be used for a service provider connection as well as the media resources end points have access to.
If you need to connect an IP to IP gateway, IT professionals will need to inderstand how to set up the CUBE. In this course, you will examine the IP to IP gateway configuration that may be used for a service provider connection as well as the media resources end points have access to.
[READ LESS]
Produced by: SkillSoft
Mastering globalized call routing for an international distribution and configuring PSTN backup paths are crucial to a successful implementation in a multisite environment. This section covers the foundation...
[READ MORE]
Mastering globalized call routing for an international distribution and configuring PSTN backup paths are crucial to a successful implementation in a multisite environment. This section covers the foundation for globalized call routing and PSTN backup.
Mastering globalized call routing for an international distribution and configuring PSTN backup paths are crucial to a successful implementation in a multisite environment. This section covers the foundation for globalized call routing and PSTN backup.
[READ LESS]
Produced by: SkillSoft
This course begins to uncover all the solutions to challenges in a multisite environment. In this section, you will learn about solutions to multisite issues involving PSTN backup, QoS, Bandwidth, Mobility,...
[READ MORE]
This course begins to uncover all the solutions to challenges in a multisite environment. In this section, you will learn about solutions to multisite issues involving PSTN backup, QoS, Bandwidth, Mobility, Dial plans, and NAT security.
This course begins to uncover all the solutions to challenges in a multisite environment. In this section, you will learn about solutions to multisite issues involving PSTN backup, QoS, Bandwidth, Mobility, Dial plans, and NAT security.
[READ LESS]
Produced by: SkillSoft
In a multisite topology, the 99.999 uptime is a challenge to keep up with but if you have redundancy configured for MGCP fallback and SRST you will be well on your way to achieving that goal. In this section,...
[READ MORE]
In a multisite topology, the 99.999 uptime is a challenge to keep up with but if you have redundancy configured for MGCP fallback and SRST you will be well on your way to achieving that goal. In this section, you will learn about the URI dialing and redundancy options in a multisite deployment. The redundancy for MGCP is MGCP fallback and for your phones SRST is the fallback mechanism to ensure connectivity at your remote sites.
In a multisite topology, the 99.999 uptime is a challenge to keep up with but if you have redundancy configured for MGCP fallback and SRST you will be well on your way to achieving that goal. In this section, you will learn about the URI dialing and redundancy options in a multisite deployment. The redundancy for MGCP is MGCP fallback and for your phones SRST is the fallback mechanism to ensure connectivity at your remote sites.
[READ LESS]
Produced by: SkillSoft
Information risk management and compliance is a pivotal part of the role of an information security manager. This course will provide an overview of information risk management and compliance, as well as...
[READ MORE]
Information risk management and compliance is a pivotal part of the role of an information security manager. This course will provide an overview of information risk management and compliance, as well as examine the elements that come into play when creating an information risk management plan and the frameworks and methodologies that are used. This course also examines risk assessment, with special attention to methods of risk identification, risk analysis, compliance, and the calculations used for risk impact analysis. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Information risk management and compliance is a pivotal part of the role of an information security manager. This course will provide an overview of information risk management and compliance, as well as examine the elements that come into play when creating an information risk management plan and the frameworks and methodologies that are used. This course also examines risk assessment, with special attention to methods of risk identification, risk analysis, compliance, and the calculations used for risk impact analysis. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Analysis, mitigation, and monitoring play an extremely important role in information risk management and compliance. This course examines how to properly classify and valuate information assets, perform a...
[READ MORE]
Analysis, mitigation, and monitoring play an extremely important role in information risk management and compliance. This course examines how to properly classify and valuate information assets, perform a business impact analysis, and the principles of disaster recovery. You will learn about the options available to deal with risk, effective controls, and ways to ensure your risk management program is integrated into your organization's other life-cycle processes. You will also examine the many responsibilities of an Information Security Manager related to risk monitoring and reporting. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Analysis, mitigation, and monitoring play an extremely important role in information risk management and compliance. This course examines how to properly classify and valuate information assets, perform a business impact analysis, and the principles of disaster recovery. You will learn about the options available to deal with risk, effective controls, and ways to ensure your risk management program is integrated into your organization's other life-cycle processes. You will also examine the many responsibilities of an Information Security Manager related to risk monitoring and reporting. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Information Security Governance is a major part of the job role of an Information Security Manager. The goal of information security governance is to establish and maintain a framework to provide assurance...
[READ MORE]
Information Security Governance is a major part of the job role of an Information Security Manager. The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations. This course looks at the role of information security governance in an organization, the need for senior management support for all policies and procedures that are put in place, the actual role the information security manager, and the core principles and metrics that are used at part of this process. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Information Security Governance is a major part of the job role of an Information Security Manager. The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations. This course looks at the role of information security governance in an organization, the need for senior management support for all policies and procedures that are put in place, the actual role the information security manager, and the core principles and metrics that are used at part of this process. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Many companies realize that their information security is not in the state that it should be. As an information security manager, it will be your role to guide your organization to where information-related...
[READ MORE]
Many companies realize that their information security is not in the state that it should be. As an information security manager, it will be your role to guide your organization to where information-related risks are controlled and sound information security processes are being followed by each and every employee. In order to move a company from a current state, to a desired state, there are many steps that must be taken. This course examines what an information security strategy is, frameworks and models you can use to build your strategy, who the strategy participants are, and constraints that may stand in your way. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Many companies realize that their information security is not in the state that it should be. As an information security manager, it will be your role to guide your organization to where information-related risks are controlled and sound information security processes are being followed by each and every employee. In order to move a company from a current state, to a desired state, there are many steps that must be taken. This course examines what an information security strategy is, frameworks and models you can use to build your strategy, who the strategy participants are, and constraints that may stand in your way. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
In order for information security governance to succeed, there must be an action plan put into place to lay the groundwork for success. This course examines the assets, departments, resources, and people that...
[READ MORE]
In order for information security governance to succeed, there must be an action plan put into place to lay the groundwork for success. This course examines the assets, departments, resources, and people that play a role in bringing an action plan to life. This course will also examine the components and constraints of an action plan, along with providing a sample information security strategy to bring it all together. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
In order for information security governance to succeed, there must be an action plan put into place to lay the groundwork for success. This course examines the assets, departments, resources, and people that play a role in bringing an action plan to life. This course will also examine the components and constraints of an action plan, along with providing a sample information security strategy to bring it all together. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Managing incidents, and the response that is put forward by an organization falls directly under the duties of a CISM. Organizations must have a plan in place, and must know the steps they will take to deal...
[READ MORE]
Managing incidents, and the response that is put forward by an organization falls directly under the duties of a CISM. Organizations must have a plan in place, and must know the steps they will take to deal with incidents when they occur. This course examines what incident management is, how responses are prepared, and concepts and technologies that are used when dealing with incidents. This course also looks at the principles, importance of, and outcomes of incident management and how the information security manager, with the approval of senior management, prepares the people and the resources of the organization to deal with incidents when they occur. Finally, this course explains the steps for conducting a business impact analysis as technique used in effective incident management. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Managing incidents, and the response that is put forward by an organization falls directly under the duties of a CISM. Organizations must have a plan in place, and must know the steps they will take to deal with incidents when they occur. This course examines what incident management is, how responses are prepared, and concepts and technologies that are used when dealing with incidents. This course also looks at the principles, importance of, and outcomes of incident management and how the information security manager, with the approval of senior management, prepares the people and the resources of the organization to deal with incidents when they occur. Finally, this course explains the steps for conducting a business impact analysis as technique used in effective incident management. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Preparing incident response and recovery plans is a very important part of a CISM's role. This course examines how to identify the current state of incident response capability, identifies the elements of...
[READ MORE]
Preparing incident response and recovery plans is a very important part of a CISM's role. This course examines how to identify the current state of incident response capability, identifies the elements of incident response and recovery plans, and discusses principles for effectively managing the plans. This course also examines the importance of testing, documentation, and how to physically prepare recovery sites and related offsite resources. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Preparing incident response and recovery plans is a very important part of a CISM's role. This course examines how to identify the current state of incident response capability, identifies the elements of incident response and recovery plans, and discusses principles for effectively managing the plans. This course also examines the importance of testing, documentation, and how to physically prepare recovery sites and related offsite resources. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
An information security program is the foundation of an information security manager's daily work. This course examines the purpose and fundamentals of IS program development and management, along with the...
[READ MORE]
An information security program is the foundation of an information security manager's daily work. This course examines the purpose and fundamentals of IS program development and management, along with the objectives, concepts, and tasks that make up an IS program. This course also examines the scope and charter of an IS program, and how the IS Manager must understand the scope of the program, and things such as chain of command, corporate culture, existing functions, current state of security, and industry standards for information security. It outlines the steps for developing an IS program and how an information security program supports the objectives of information security governance. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
An information security program is the foundation of an information security manager's daily work. This course examines the purpose and fundamentals of IS program development and management, along with the objectives, concepts, and tasks that make up an IS program. This course also examines the scope and charter of an IS program, and how the IS Manager must understand the scope of the program, and things such as chain of command, corporate culture, existing functions, current state of security, and industry standards for information security. It outlines the steps for developing an IS program and how an information security program supports the objectives of information security governance. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
An information security framework represents the entire IS management structure. This course examines governance frameworks such as COBIT and industry standards like ISO/IEC 27001. This course also examines...
[READ MORE]
An information security framework represents the entire IS management structure. This course examines governance frameworks such as COBIT and industry standards like ISO/IEC 27001. This course also examines the components of a security framework: operational components, management components, administrative components, and education and informational components. The course then explains how an IS program road map is defined, and the elements that make up the road map. Finally, the course describes the security architectures and how they are implemented. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
An information security framework represents the entire IS management structure. This course examines governance frameworks such as COBIT and industry standards like ISO/IEC 27001. This course also examines the components of a security framework: operational components, management components, administrative components, and education and informational components. The course then explains how an IS program road map is defined, and the elements that make up the road map. Finally, the course describes the security architectures and how they are implemented. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Information security managers are responsible for all administrative activities related to the development and management of an information security program. Those activities include such things as assigning...
[READ MORE]
Information security managers are responsible for all administrative activities related to the development and management of an information security program. Those activities include such things as assigning and training security personnel, overseeing the creation and distribution of policies and other documentation, and monitoring the effectiveness of the security program itself. This course examines the many activities that an information security manager is responsible for and the skills required to perform them. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Information security managers are responsible for all administrative activities related to the development and management of an information security program. Those activities include such things as assigning and training security personnel, overseeing the creation and distribution of policies and other documentation, and monitoring the effectiveness of the security program itself. This course examines the many activities that an information security manager is responsible for and the skills required to perform them. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Information security programs typically have numerous operational responsibilities and provide a variety of security services. While programs vary from organization to organization, there are operations and...
[READ MORE]
Information security programs typically have numerous operational responsibilities and provide a variety of security services. While programs vary from organization to organization, there are operations and services that are typically found in all well conceived security programs. This course examines the activities and responsibilities of an information security manager related to operations and services within an organization. The course will examine different organizational units such as IT, HR, and Legal that are affected by security programs, and how their needs are integrated into the program. This course also examines how audits and compliance enforcement are performed. Finally, this course examines how technology - both legacy and new technologies such as cloud computing - are managed in modern security programs. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Information security programs typically have numerous operational responsibilities and provide a variety of security services. While programs vary from organization to organization, there are operations and services that are typically found in all well conceived security programs. This course examines the activities and responsibilities of an information security manager related to operations and services within an organization. The course will examine different organizational units such as IT, HR, and Legal that are affected by security programs, and how their needs are integrated into the program. This course also examines how audits and compliance enforcement are performed. Finally, this course examines how technology - both legacy and new technologies such as cloud computing - are managed in modern security programs. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Security programs require strong controls and countermeasures to ensure that security activities are carried out and measures exist to deal with issues that may arise while a security program is being...
[READ MORE]
Security programs require strong controls and countermeasures to ensure that security activities are carried out and measures exist to deal with issues that may arise while a security program is being implemented. This course examines control categories, control design considerations, and the control methods and recommendations that a security manager should implement. This course will also discuss the metrics and monitoring practices that should be used put in place as part of a security program. Finally, this course will examine common information security program challenges. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
Security programs require strong controls and countermeasures to ensure that security activities are carried out and measures exist to deal with issues that may arise while a security program is being implemented. This course examines control categories, control design considerations, and the control methods and recommendations that a security manager should implement. This course will also discuss the metrics and monitoring practices that should be used put in place as part of a security program. Finally, this course will examine common information security program challenges. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2014 ISACA Candidate Information Guide.
[READ LESS]
Produced by: SkillSoft
Access Control Systems & Methodology is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course...
[READ MORE]
Access Control Systems & Methodology is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon teaches you about control techniques and implementation, identification and authentication processes and commonly employed types of attacks. At the conclusion of this course, you'll be familiar with the issues and concepts required to pass the CISSP exam.
Access Control Systems & Methodology is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon teaches you about control techniques and implementation, identification and authentication processes and commonly employed types of attacks. At the conclusion of this course, you'll be familiar with the issues and concepts required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Applications Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey,...
[READ MORE]
Applications Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over software development, databases, data storage, and common attacks that must be protected against. At the conclusion of this course, you will be familiar with the issues and concepts of the Applications Security domain required to pass the CISSP exam.
Applications Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over software development, databases, data storage, and common attacks that must be protected against. At the conclusion of this course, you will be familiar with the issues and concepts of the Applications Security domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Business Continuity & Disaster Recovery Planning is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification...
[READ MORE]
Business Continuity & Disaster Recovery Planning is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers preliminary activities including defining project scope and conducting Business Impact Analysis (BIA), as well as the planning process, plan implementation and testing. At the conclusion of this course, you'll be familiar with issues and concepts of this domain required to pass the CISSP exam.
Business Continuity & Disaster Recovery Planning is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers preliminary activities including defining project scope and conducting Business Impact Analysis (BIA), as well as the planning process, plan implementation and testing. At the conclusion of this course, you'll be familiar with issues and concepts of this domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Cryptography is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert...
[READ MORE]
Cryptography is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers the history, methodologies and practices of cryptography, as well as common security protocols employing cryptography. At the conclusion of this course, you will be familiar with the issues and concepts of the Cryptography domain required to pass the CISSP exam.
Cryptography is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers the history, methodologies and practices of cryptography, as well as common security protocols employing cryptography. At the conclusion of this course, you will be familiar with the issues and concepts of the Cryptography domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Information Security & Risk Management is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course...
[READ MORE]
Information Security & Risk Management is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers the CIA triangle, security risk assessment, policy and other CBK elements of the Security Management Practices domain. At the conclusion of this course, you will be familiar with the issues and concepts of the Information Security & Risk Management domain required to pass the CISSP exam.
Information Security & Risk Management is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers the CIA triangle, security risk assessment, policy and other CBK elements of the Security Management Practices domain. At the conclusion of this course, you will be familiar with the issues and concepts of the Information Security & Risk Management domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Law, Regulation, Compliance, & Investigations is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep...
[READ MORE]
Law, Regulation, Compliance, & Investigations is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon helps you become familiar with principles of computer law and crime, incident handling, evidence, investigation and ethics. At the conclusion of this course, you will be familiar with the issues and concepts of the Law, Regulation, Compliance, & Investigations domain required to pass the CISSP exam.
Law, Regulation, Compliance, & Investigations is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon helps you become familiar with principles of computer law and crime, incident handling, evidence, investigation and ethics. At the conclusion of this course, you will be familiar with the issues and concepts of the Law, Regulation, Compliance, & Investigations domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Operations Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey,...
[READ MORE]
Operations Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over security administration, intrusion detection, auditing, threats and countermeasures. At the conclusion of this course, you will be familiar with the issues and concepts of the Operations Security domain required to pass the CISSP exam.
Operations Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over security administration, intrusion detection, auditing, threats and countermeasures. At the conclusion of this course, you will be familiar with the issues and concepts of the Operations Security domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Physical (Environmental) Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from...
[READ MORE]
Physical (Environmental) Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon reviews common threats, security controls, facility requirements and environmental issues. At the conclusion of this course, you will be familiar with the issues and concepts of the Physical Security domain required to pass the CISSP exam.
Physical (Environmental) Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon reviews common threats, security controls, facility requirements and environmental issues. At the conclusion of this course, you will be familiar with the issues and concepts of the Physical Security domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey