Packt

CISSP Certified Information Security Professional Exam Guide

Packt

CISSP Certified Information Security Professional Exam Guide

访问权限由 Coursera Learning Team 提供

深入了解一个主题并学习基础知识。
中级 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
中级 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Secure network communications and routing effectively.

  • Understand the distinctions between encryption and hashing.

  • Apply certificate and digital signature usage in security contexts.

要了解的详细信息

可分享的证书

添加到您的领英档案

作业

23 项作业

授课语言:英语(English)
最近已更新!

April 2026

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有23个模块

In this section, we explore the ISC2 Code of Ethics, the CIA triad, and aligning security governance with organizational goals to support ethical and effective decision-making.

涵盖的内容

2个视频3篇阅读材料1个作业

In this section, we explore contractual, legal, and industry requirements, analyze privacy principles, and differentiate investigation types to ensure data protection and legal compliance.

涵盖的内容

1个视频5篇阅读材料1个作业

In this section, we explore developing security policies, conducting business impact analysis, and implementing business continuity plans to ensure operational resilience and compliance.

涵盖的内容

1个视频6篇阅读材料1个作业

In this section, we explore risk management frameworks, threat identification, and SCRM and SETA strategies to mitigate risks and enhance organizational security through structured approaches.

涵盖的内容

1个视频7篇阅读材料1个作业

In this section, we explore identifying and classifying digital assets, establishing secure handling requirements, and allocating resources based on asset value for effective cybersecurity management.

涵盖的内容

1个视频2篇阅读材料1个作业

In this section, we explore data life cycle management, asset retention, and security controls to ensure compliance and effective digital asset governance throughout their existence.

涵盖的内容

1个视频4篇阅读材料1个作业

In this section, we explore secure design principles, analyze security models, and select controls based on system requirements using frameworks like STRIDE and Zero Trust.

涵盖的内容

1个视频5篇阅读材料1个作业

In this section, we examine system architecture vulnerabilities and cryptographic methods to secure data. Key concepts include encryption types, attack mitigation, and practical applications in IoT and cloud systems.

涵盖的内容

1个视频13篇阅读材料1个作业

In this section, we explore physical security principles for site design, facility controls, and HVAC measures to protect data and systems from unauthorized access and environmental threats.

涵盖的内容

1个视频4篇阅读材料1个作业

In this section, we explore secure network design using OSI and TCP/IP models, focusing on layer-based security analysis and real-world protocol implications.

涵盖的内容

1个视频4篇阅读材料1个作业

In this section, we explore securing network components and communication channels to ensure data confidentiality, integrity, and protection against vulnerabilities in network environments.

涵盖的内容

1个视频3篇阅读材料1个作业

In this section, we explore identity and access management, focusing on secure access control, federation, and user provisioning to balance data security and operational efficiency.

涵盖的内容

1个视频3篇阅读材料1个作业

In this section, we explore implementing authentication systems for third parties, analyzing authentication and access control mechanisms, and designing secure collaboration strategies using federated identity management and SSO.

涵盖的内容

1个视频5篇阅读材料1个作业

In this section, we explore designing and validating security assessment strategies, conducting control testing, and ensuring audit outcomes are accurate and actionable for continuous improvement.

涵盖的内容

1个视频6篇阅读材料1个作业

In this section, we explore collecting and analyzing security data to improve system resilience, focusing on audit processes, disaster recovery, and effective reporting techniques.

涵盖的内容

1个视频2篇阅读材料1个作业

In this section, we explore pre-incident planning for security operations, focusing on incident response, logging, monitoring, and configuration management to ensure operational resilience and effective threat response.

涵盖的内容

1个视频11篇阅读材料1个作业

In this section, we explore the incident response cycle, detective and preventive security measures, and patch and vulnerability management for practical security operations.

涵盖的内容

1个视频10篇阅读材料1个作业

In this section, we explore disaster recovery strategies, testing plans, and recovery site options to ensure IT system availability and resilience in real-world scenarios.

涵盖的内容

1个视频5篇阅读材料1个作业

In this section, we examine business continuity, personnel, and physical security, focusing on stakeholder collaboration, access controls, and safety protocols to enhance organizational resilience and disaster recovery planning.

涵盖的内容

1个视频4篇阅读材料1个作业

In this section, we explore secure software development methodologies, maturity models, and change management to ensure application security and functionality throughout the life cycle.

涵盖的内容

1个视频4篇阅读材料1个作业

In this section, we explore secure coding practices, SAST and DAST integration in CI/CD, and automation of security testing to reduce application vulnerabilities.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we examine software security effectiveness, evaluate risks of acquired software, and analyze common vulnerabilities to enhance digital system protection.

涵盖的内容

1个视频3篇阅读材料1个作业

In this section, we examine secure coding practices, source code vulnerabilities, and database security to build resilient systems and protect data integrity.

涵盖的内容

1个视频4篇阅读材料1个作业

位教师

Packt - Course Instructors
Packt
1,626 门课程472,392 名学生

提供方

Packt

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'

Jennifer J.

自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'

Larry W.

自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'

Chaitanya A.

''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'

从 Information Technology 浏览更多内容