Certified Information Security Consultant (CISC)
A comprehensive cybersecurity course with 236 videos and 120+ lab sessions setting you on the path to becoming a highly-paid, practising consultant.
The CISC certification program was created with the primary objective of enabling aspiring cybersecurity consultants to build a long-term and rewarding career in the most exciting field today. This extensive course provides the perfect impetus to your career trajectory by covering every fundamental you need to know in the vast pool of cybersecurity knowledge, from network security, cyber security, governance to risk and compliance and much more. With 236 sessions of theory and 120+ sessions of hands-on practice, this course is unlike any other for those interested in gaining a detailed understanding of multiple disciplines in the complex and ever-evolving arena of cybersecurity.
Benefits of choosing this course
Benefits of choosing the CISC course
The only course which teaches all the core concepts that an aspiring cybersecurity consultant needs to know.
Builds a solid foundation in conceptual & practical knowledge.
Makes you interview-ready as you pursue a career in the highly desirable & well-paying field of cybersecurity.
- Key Learning Objectives
- Downloads
- About
-
Key Learning Objectives
-
After completing the CISC course, students will be able to:
- Articulate the basics of networking technologies and fundamentals, discuss the importance of IP addresses in computer networking and explain the OSI model, TCP/IP model and the basics of protocols like IP, TCP & ICMP.
- Offer a detailed explanation of Subnetting along with the concept of network prefix and Variable Length Subnet Mask (VLSM), IPv6 Subnetting and what is Supernetting.
- Properly understand the features of Wireshark, how to customise Wireshark, display filters used in Wireshark, capture filters, and how to capture TCP 3-Handshake in Wireshark.
- Explain what is Windows NT architecture and Windows 7 architecture in detail.
- Work with Linux and Unix operating systems.
- Articulate the importance of Reconnaissance in launching a network-based attack. .
- Comprehend how to bypass firewall rules and to gain entry into the target network by using packet crafting as there are four lab sessions on this particular topic to make you understand the concept in detail.
- Enhance their knowledge of WiFi security and Wifi frames, including Management frames, Control frames, Data frames.
- Understand and explain the basic concepts of Database security as well as the relevance and importance of key database commands including DML, SQL, DCL statements.
- Develop sound knowledge of the key concepts of Command injection, BruteForce, SQL injection, Error Based injection, Session Management, A4XXE, XSS, Broken Access Control and Security Misconfiguration.
- Explain in their own words what Internet Information Services-IIS and IIS security is and what the best practices for server security are.
- Better grasp Web Application Security concepts including OWASP Top 10, Risk-Based Security Testing, Threat Modeling and Source Code Analysis.
- Gear up to detect SQL Injection Vulnerabilities and Identify Cross-Site Scripting (XSS) Vulnerabilities.
- Understand the basics of Android security and Android OS Exploitation, iOS and the iOS security architecture along with its core features.
- Articulate the importance of Reconnaissance in launching a network-based attackBe prepared to work on digital forensics, mobile forensics, network forensics, different types of cyber crimes, chain of custody, legal issues, latest forensics tools and techniques. .
- Comprehend various techniques used in malware analysis, static analysis and dynamic analysis.
- Explain what Information Security Management System or ISMS is and articulate all the requirements of ISO-27001.
- Enhance their understanding of PCI-DSS and how this security standard supports organisations that are into online businesses and allow their customers to pay online.
-
Direct Downloads
Directly download the full Learning Objectives of the course here
Templates. Worksheets & Mind-maps
When you enrol in this course you will have access to several worksheets & templates that you can use immediately. Take a look at the course curriculum, below, to see whats included in this course.
The image immediately below is a gallery view of some of the templates and collateral available to students.
Continuing Professional Development
CPD points can be claimed for this course at the rate of 1 point per hour of training for this NCSC-certified and CIISec-approved course (8 points for one-day public course and 15 points for the two-day internal workshop - for when organisations host this course internally).
CIPR Student-Only Incident Response Plan Template
As a student you get access to unique content including our highly acclaimed Cyber Incident Response Plan Template. If you want, you can download the FREE version of the Incident Response Plan template here.
-
About
Example Curriculum
- M1.1 Introduction to Information Security
- M.1.2 Introduction to CISC-CIA Triad (8:56)
- M1.1.2 Types of Hackers (2:33)
- M1.1.3 Essential Terms (6:52)
- M.1.1.4 Penetration Testing Vs Ethical Hacking (2:30)
- M.1.1.5 Different Types of Testing (5:04)
- M.1.1.6 Careers in Information Security (4:16)
- M.1.1.7 Legislation and Regulations (11:49)
- M.1.2 Network Fundamentals
- M.1.2.1 Introduction to Network Fundamentals (3:16)
- M.1.2.2 Components of Data Communication (2:07)
- M.1.2.3 Network Topology and Network Cables (17:43)
- M.1.2.4 Computer Network Architecture (4:46)
- M.1.2.5 Internet and Protocol (8:49)
- M.1.2.6 OSI Model (18:47)
- M.1.2.7 TCP IP Model (6:45)
- M.1.2.8 Transmission Control Protocol (TCP) (12:18)
- M.1.2.9 User Datagram Protocol (UDP) (12:18)
- M.1.2.10 Understanding ICMP (5:09)
- M.1.2.10.A Understanding ICMP Ping Message (Lab) (1:38)
- M1.2.11 IP Fragmentation and Reassembly (3:53)
- M.1.2.12 IPv4 (15:16)
- M.1.2.13 IPv6 (13:46)
- M.1.3.1 Introduction to Subnetting and Supernetting (8:07)
- M.1.3.2 Routing (6:49)
- M.1.3.3 Router Security and Network Address Translation (7:10)
- M.1.3.4 Switching and Port Security (5:45)
- M.1.3.4.A Router and Switch Configuration using CPT (Lab) (7:20)
- M.1.3.5 Virtual Local Area Network (VLAN) (5:14)
- M.1.3.6 Virtual Private Network (VPN) (12:10)
- M.1.3.7 Access Control Lists (4:40)
- M.1.3.8 Firewall and IP tables (12:10)
- M.1.3.9 IDS and IPS (7:01)
- M.1.3.10 Packet Capture and Wireshark (10:33)
- M.1.3.10.A Wireshark (Lab) (4:20)
- M.1.3.10.B Understanding TCP IPV4 Headers Using Wireshark (Lab) (9:02)
- M.1.3.10.C Understanding TCP IPV4 Headers Using Wireshark (Lab) (4:52)
- M.1.3.10.D Understanding UDP Header Using Wireshark (Lab) (2:33)
- M.1.3 Advanced Networking (PDF)
- M.1.4.1 Windows NT Architecture and Windows 10 Architecture (24:53)
- M.1.4.2 File System (7:11)
- M.1.4.3 File Permissions (4:01)
- M.1.4.4 Memory Management (3:15)
- M.1.4.5 SAM File and System Files (5:38)
- M.1.4.6 Password Hashing (5:50)
- M.1.4.7 Process and Threads (3:36)
- M.1.4.8 Windows Registry (3:23)
- M.1.4.8.A Windows Registry (Lab) (4:19)
- M.1.4.9 Windows Commands (4:37)
- M.1.4.9.A Windows Basic Commands (Lab) (7:54)
- M.1.4.10 Windows Server 2016 Architecture (9:15)
- M.1.4.11 Active Directory (21:48)
- M.1.4.12 Kerberos (6:17)
- M.1.4.13 Security Identifier (SID) (2:44)
- M.1.4 Windows Fundamentals (PDF)
- M.1.5.1 Introduction to Unix and Linux (10:46)
- M.1.5.2 File System (13:31)
- M.1.5.3 Linux Commands (7:04)
- M.1.5.4 File Permissions (9:14)
- M.1.5.4.A Kali and Various Linux Commands (Lab) (8:37)
- M.1.5.4.B Kali and Various Linux Commands (Lab) (2:24)
- M.1.5.5 Kali Linux Introduction (1:44)
- M.1.5 Linux Fundamentals (PDF)
- M.2.1.1 Reconnaissance (12:23)
- M.2.1.1.A Reconnaissance (Lab) (4:09)
- M.2.1.1.B Reconnaissance (Lab) (1:52)
- M.2.1.1.C Reconnaissance (Lab) (1:30)
- M.2.1.1.D Reconnaissance (Lab) (0:43)
- M.2.1.2 Packet Crafting (3:30)
- M.2.1.2.A Packet Crafting (Lab) (2:04)
- M.2.1.2.B Packet Crafting (Lab) (3:40)
- M.2.1.2.C Packet Crafting (Lab) (2:00)
- M.2.1.2.D Packet Crafting (Lab) (1:00)
- M.2.1.3 Network Mapper Nmap (12:16)
- M.2.1.3.A Network Mapper, Nmap (Lab) (4:42)
- M.2.1.3.B Network Mapper, Nmap (Lab) (4:03)
- M.2.1.3.C Network Mapper, Nmap (Lab) (0:55)
- M.2.1.3.D Network Mapper, Nmap (Lab) (2:34)
- M.2.1.4 Testing a firewall (4:05)
- M.2.1.5 Hacking Servers (5:19)
- M.2.1.6 Netcat and Ncat (4:01)
- M.2.1.6.A Netcat and Ncat (Lab) (2:00)
- M.2.1.6.B Netcat and Ncat (Lab) (1:44)
- M.2.1.7 Testing Common services and protocols (2:20)
- M.2.1.7.A Testing Common services and protocols (Lab) (1:50)
- M.2.1.7.B Testing Common services and protocols (Lab) (5:50)
- M.2.1.8 DNS (4:30)
- M.2.1.8.A DNS (Lab) (1:14)
- M.2.1.9 SNMP (5:06)
- M.2.1.10 VPN (7:03)
- M.2.1.10.A VPN (Lab) (2:30)
- M.2.1.11 Hacking Passwords (7:49)
- M.2.1.11.A Hacking Passwords Using Hydra (Lab) (1:55)
- M.2.1.11.B Hacking Passwords Using John the Ripper (Lab) (1:10)
- M.2.1.11.C Hacking Passwords Using Crunch (Lab) (2:02)
- M.2.1.11.D Hacking Passwords Using Mimikatz (Lab) (3:10)
- M.2.1.12 Nessus (1:59)
- M.2.1.12.A Nessus (Lab) (4:58)
- M.2.1.12.B Nessus (Lab) (1:15)
- M.2.1.13 Buffer Overflow (1:12)
- M.2.1.14 Metasploit Framework (10:36)
- M.2.1.14.A Metasploit Framework (Lab) (1:25)
- M.2.1.15 Introduction to PowerShell (1:41)
- M.2.1.16 MITM ARP Poisoning (4:02)
- M.2.1.16.A MITMARP Poisoning (Lab) (2:15)
- M.2.1.17 SYN Flood (1:42)
- M.2.1.17.A Smurf Attack (Lab) (0:44)
- M.2.1.17.B Fraggle Attack (Lab) (0:42)
- M.2.1.18 Network Architecture Review (4:01)
- M.2.1.18.A Network Architecture Review (Lab) (1:50)
- M.2.1 Network Security (PDF)
- M.2.2.1 Introduction to Network Security & Terminologies (11:57)
- M.2.2.2 Wi-Fi Frames (5:25)
- M.2.2.3 Wireless Hacking Methodology (2:27)
- M.2.2.4 Authentication Methods and Types of WLAN Attacks (2:52)
- M.2.2.5 WEP (4:40)
- M.2.2.6 WPA/WPA-2 (4:38)
- M.2.2.7 Differences in WEP, WPA and WPA-2 (7:18)
- M.2.2.8 Bypassing WPA2 using Aircrack-ng (4:29)
- M.2.2.8.A Aircrack-ng Setup (Lab) (1:12)
- M.2.2.8.B WPA2 Bypass Aircrack-ng (Lab) (2:43)
- M.2.2.9 Evil Twin (1:30)
- M.2.2.9.A Evil Twin (Lab) (3:15)
- M.2.2.10 WPA3 and Wi-Fi Guideline (2:01)
- M.2.2 Wi-Fi Sec (PDF)
- M.3.1.1 Introduction to Database and Database Security (2:31)
- M.3.1.2 Database Fundamentals (3:29)
- M.3.1.3 Database Management Systems (DBMS) (2:56)
- M.3.1.4 Understanding SQL Statements (1:25)
- M.3.1.4.A Understanding DDL Statements (Lab) (0:52)
- M.3.1.5 Understanding DML Statements (0:57)
- M.3.1.5.A Understanding DML Statements (Lab) (0:25)
- M.3.1.6 Understanding DCL Statements (1:26)
- M.3.1.6.A Understanding DCL Statements (Lab) (1:57)
- M.3.1.7 Stored Procedures (1:01)
- M.3.1.7.A Stored Procedures (Lab) (0:52)
- M.3.1.8 Views (1:11)
- M.3.1.8.A Views (Lab) (0:26)
- M.3.1.9 Introduction to Oracle (9:16)
- M.3.1.10 Securing Oracle Parameters (0:22)
- M.3.1.10.A Securing Oracle Parameters (Lab) (0:20)
- M.3.1.10.B Securing Oracle Parameters (Lab) (0:10)
- M.3.1.10.C Securing Oracle Parameters (Lab) (0:14)
- M.3.1.10.D Securing Oracle Parameters (Lab) (0:12)
- M.3.1.10.E Securing Oracle Parameters (Lab) (0:11)
- M.3.1.10.F Securing Oracle Parameters (Lab) (0:11)
- M.3.1.11 User and Profiles (0:55)
- M.3.1.11.A User and Profiles (Lab) (0:55)
- M.3.1.12 Roles and Privileges (4:01)
- M.3.1.12.A Roles and Privileges (Lab) (0:45)
- M.3.1.12.B Roles and Privileges (Lab) (0:20)
- M.3.1.13 Oracle SID (0:13)
- M.3.1.14 Using Tools (1:28)
- M.3.1.15 Big Data (1:15)
- M.3.1.16 Introduction to MongoDB (3:07)
- M.3.1.16.A Introduction to MongoDB (Lab) (1:32)
- M.3.1.17 Hadoop (2:13)
- M.3.1 Database Security (PDF)
- M.3.2.1 Introduction to Windows Security (9:04)
- M.3.2.2 Security Policies (14:26)
- M.3.2.2.A Security Policies (Lab) (4:12)
- M.3.2.3 Event Log (2:08)
- M.3.2.3.A Event Log (Lab) (3:05)
- M.3.2.4 Windows General Security Best Practices (10:43)
- M.3.2.4.A Windows General Security Best Practices (Lab) (4:35)
- M.3.2.4.B Windows General Security Best Practices (Lab) (3:37)
- M.3.2.5 Windows Operating System Hardening (27:35)
- M.3.2 Windows Security (PDF)
- M.4.2.1 Introduction to OWASP TOP 10 (3:25)
- M.4.2.2.A.1 Injection and Error-based Injection (9:10)
- M.4.2.2.A Injection and Error-based Injection (Lab) (6:14)
- M.4.2.3 Authentication Bypass using SQL Injection (1:39)
- M.4.2.3.A Authentication Bypass using SQL Injection (Lab) (3:20)
- M.4.2.4 Blind Injection using SQLMap (5:05)
- M.4.2.4.A Blind Injection using SQLMap (Lab) (2:45)
- M.4.2.5 SQL Injection Mitigations (10:25)
- M.4.2.6 Command Injection (7:02)
- M.4.2.6.A Command Injection (Lab) (2:08)
- M.4.2.7.A2 Broken Authentication (5:52)
- M.4.2.7.A Brute Force (Lab) (2:52)
- M.4.2.7.B Brute Force (Lab) (3:22)
- M.4.2.8 Session Management (8:39)
- M.4.2.8.A Session Management (Lab) (2:23)
- M.4.2.9.A3 Sensitive Data Exposure (3:53)
- M.4.2.9.A.A3 Sensitive Data Exposure (Lab) (1:45)
- M.4.2.10.A3 Insufficient Transport Layer Security (6:27)
- M.4.2.10.A.A3 Insufficient Transport Layer Security (Lab) (1:11)
- M.4.2.11 A4 XXE (9:30)
- M.4.2.11.A.A4 XXE (Lab) (2:10)
- M.4.2.12.A5 Broken Access Control IDOR (5:45)
- M.4.2.12.A.A5 Broken Access Control IDOR (Lab) (1:08)
- M.4.2.13.A5 Broken Access Control MFLAC (6:05)
- M.4.2.13.A.A5 Broken Access Control MFLAC (Lab) (0:51)
- M.4.2.13.B.A5 Broken Access Control MFLAC (Lab) (1:00)
- M.4.2.13.C.A5 Broken Access Control MFLAC (Lab) (2:36)
- M.4.2.14.A6 Security Misconfiguration (6:41)
- M.4.2.14.A.A6 Security Misconfiguration (Lab) (1:55)
- M.4.2.14.B.A6 Security Misconfiguration (Lab) (1:00)
- M.4.2.14.C.A6 Security Misconfiguration (Lab) (1:35)
- M.4.2.15.A7 Cross Site Scripting (XSS) (18:42)
- M.4.2.15.A.A7 Cross Site Scripting (XSS) (Lab) (3:24)
- M.4.2.16.A8 Insecure Deserialization (4:55)
- M.4.2.17.A9 Using Components with Known Vulnerabilities (5:10)
- M.4.2.17.A.A9 Using Components with Known Vulnerabilities (Lab) (2:03)
- M.4.2.18.A10 Insufficient Logging and Monitoring (4:30)
- M.4.2 Web Application Security OWASP10 (PDF)
- M.4.3.1 Browser-based Vulnerabilities (2:57)
- M.4.3.2 Clickjacking (3:01)
- M.4.3.2.A Clickjacking (Lab) (2:16)
- M.4.3.3 POODLE (3:56)
- M.4.3.4 WebDav (3:58)
- M.4.3.5 WASC (3:37)
- M.4.3.6 Security Frameworks (15:05)
- M.4.3.7 SDLC (22:04)
- M.4.3.8 WAF (7:53)
- M.4.3.9 Case Study Penetrating a Bank (3:26)
- M.4.3.10 Content Spoofing (3:24)
- M.4.3.11 Fingerprinting (1:53)
- M.4.3.12 Advanced Recon (0:51)
- M.4.3 Web Application Security WAF (PDF)
- M.5.1.1 Introduction to Mobile Applications and Android (4:55)
- M.5.1.2 Android Application Basics (1:03)
- M.5.1.3 Android Application Components (4:34)
- M.5.1.4 Setting Up Android Testing Environment (1:00)
- M.5.1.5 ADB and its Commands (1:45)
- M.5.1.5.A ADB and its Commands (Lab) (1:38)
- M.5.1.5.B ADB and its Commands (Lab) (1:30)
- M.5.1.5.C ADB and its Commands (Lab) (1:40)
- M.5.1.5.D ADB and its Commands (Lab) (1:50)
- M.5.1.6 Application Signing in Android (2:39)
- M.5.1.6.A Application Signing in Android (Lab) (1:56)
- M.5.1.7 APK File Basics (1:47)
- M.5.1.7.A APK File Basics (Lab) (1:20)
- M.5.1.7.B APK File Basics (Lab) (2:37)
- M.5.1.8 Mobile OWASP Top 10 Improper Platform Usage (0:31)
- M.5.1.8.A Mobile OWASP Top 10 Improper Platform Usage (Lab) (3:35)
- M.5.1.9 Mobile OWASP Top 10 Insecure Data Storage (0:37)
- M.5.1.9.A Mobile OWASP Top 10 Insecure Data Storage (Lab) (2:28)
- M.5.1.10 Mobile OWASP Top 10 Insecure Communication (0:17)
- M.5.1.10.A Mobile OWASP Top 10 Insecure Communication (Lab) (1:56)
- M.5.1.11 Mobile OWASP Top 10 Insecure Authentication (0:18)
- M.5.1.11.A Mobile OWASP Top 10 Insecure Authentication (Lab) (1:44)
- M.5.1.12 Mobile OWASP Top 10 Insufficient Cryptography (0:22)
- M.5.1.12.A Mobile OWASP Top 10 Insufficient Cryptography (Lab) (4:31)
- M.5.1.13 Mobile OWASP Top 10 Insecure Authorization (0:19)
- M.5.1.13.A Mobile OWASP Top 10 Insecure Authorization (Lab) (1:28)
- M.5.1.14 Mobile OWASP Top 10 Poor Code Quality (0:18)
- M.5.1.14.A Mobile OWASP Top 10 Poor Code Quality (Lab) (1:43)
- M.5.1.15 Mobile OWASP Top 10 Code Tampering and Reverse Engineering (5:16)
- M.5.1.15.A Mobile OWASP Top 10 Code Tampering and Reverse Engineering (Lab) (1:09)
- M.5.1.16 Mobile OWASP Top 10 Extraneous Functionality (0:23)
- M.5.1.16.A Mobile OWASP Top 10 Extraneous Functionality (Lab) (1:43)
- M.5.1.17 Mobile Application Security Testing (8:20)
- M.5.1.17.A Mobile Application Security Testing (Lab) (3:03)
- M.5.1.17.B Mobile Application Security Testing (Lab) (2:04)
- M.5.1.17.C Mobile Application Security Testing (Lab) (4:20)
- M.5.1.18 Other Vulnerabilities - Client Side Injections (1:04)
- M.5.1.18.A Other Vulnerabilities - Client Side Injections (Lab) (2:36)
- M.5.1.19 Other Vulnerabilities - Logging Based Vulnerabilities (0:54)
- M.5.1.20 Other Vulnerabilities Bypassing SSL Pinning (1:45)
- M.5.1.20.A Other Vulnerabilities Bypassing SSL Pinning (Lab) (3:10)
- M.5.1.21 Other Vulnerabilities Leaking Content Provider (1:07)
- M.5.1.21.A Other Vulnerabilities Leaking Content Provider (Lab) (4:30)
- M.5.1.22 Exploiting Android with Metasploit Framework (0:35)
- M.5.1 Mobile Android (PDF)
- M.5.2.1 Introduction to iOS (4:55)
- M.5.2.2 iOS Application Basics (1:16)
- M.5.2.3 iOS Jailbreaking and its types (0:46)
- M.5.2.4 Setting up a Testing Environment for iOS (1:20)
- M.5.2.5 iOS Data Storage (1:47)
- M.5.2.5.A iOS Data Storage (Lab) (2:52)
- M.5.2.6 Tools and Techniques for iOS Application Testing (1:45)
- M.5.2.6.A Tools and Techniques for iOS Application Testing (Lab) (7:00)
- M.5.2 Mobile iOS (PDF)
- M.6.1.1 Introduction to Digital Forensics (2:00)
- M.6.1.2 Case Studies (2:24)
- M.6.1.3 CERT, CERT-IN and Cyber Cells (2:45)
- M.6.1.4 Legal Issues (3:43)
- M.6.1.5 Chain of Custody (0:41)
- M.6.1.6 Types of Cyber Crime (9:43)
- M.6.1.7 The Basic Forensic Process and the 6 As of Forensics (9:51)
- M.6.1.8 Forensics Tools and Techniques (3:00)
- M.6.1 Introduction to Forensics (PDF)
- M.6.2.1 Understanding the Hard Disk (36:27)
- M.6.2.2 Disk Imaging (14:15)
- M.6.2.2.A Disk Imaging (Lab) (1:50)
- M.6.2.2.B Understanding the Hard Disk (Lab) (4:38)
- M.6.2.3 Password Cracking (4:49)
- M.6.2.4 Physical Protection of Evidence (1:31)
- M.6.2.5 Log Analysis (2:57)
- M.6.2 Disk Based and Log Analysis (PDF)
- M.6.4.1 Email Forensics (8:28)
- M.6.4.1.A Email Forensics (Lab) (2:45)
- M.6.4.2 USB Forensics (3:30)
- M.6.4.2.A USB Forensics (Lab) (1:46)
- M.6.4.3 Memory Forensics (6:23)
- M.6.4.4 Analyzing Stuxnet with Volatility (8:36)
- M.6.4.4.A Analyzing Stuxnet with Volatility (Lab) (3:58)
- M.6.4.4.B Analyzing Stuxnet with Volatility (Lab) (0:45)
- M.6.4 Email USB and Memory Forensics (PDF)
- M.7.1.1 Agenda (1:33)
- M.7.1.2 Introduction to ISMS (1:55)
- M.7.1.3 Need for an ISMS and its Benefits (2:32)
- M.7.1.4 ISO 27001 (6:46)
- M.7.1.5 Understanding Controls (3:46)
- M.7.1.6 Introduction to ISO 27001:2013 standard (2:38)
- M.7.1.7 Understanding the structure of the standard (3:13)
- M.7.1.8 ISO 27001:2013 Domains (2:55)
- M.7.1.9 Overview of ISMS implementation (6:02)
- M.7.1.10 Risk Assessment Treatment (4:35)
- M.7.1.11 Documentation Review (4:13)
- M.7.1.12 ISMS Training (5:06)
- M.7.1.13 ISMS Documentation (4:22)
- M.7.1.14 Audit (7:47)
- M.7.1.15 Case Studies (5:19)
- M.7.1 ISMS (PDF)
- M.7.2.1 Agenda (2:07)
- M.7.2.2 Introduction to BCM (5:43)
- M.7.2.3 Business Continuity Planning (3:49)
- M.7.2.4 Issues in BCM (1:52)
- M.7.2.5 Risk Control Options (3:50)
- M.7.2.6 Disaster Recovery Plan (5:20)
- M.7.2.7 Maintenance of BCM Plan (3:32)
- M.7.2.8 Business Impact Analysis (5:59)
- M.7.2.9 Backup Sites (8:24)
- M.7.2.10 Backup Considerations and Backup Types (11:18)
- M.7.2.11 ISO 22301 and ISO 22301 Requirements (11:36)
- M.7.2.12 Mandatory Documents of ISO 22301 and Benefits (2:34)
- M.7.2 BCM (PDF)
- M.7.3.1 Agenda (2:28)
- M.7.3.2 Introduction to PCI DSS (2:50)
- M.7.3.3 Common terms related to PCI DSS (1:12)
- M.7.3.4 Entities Involved in Payment Card Transactions (2:10)
- M.7.3.5 Data on Payment Card and Technologies (23:14)
- M.7.3.6 Consequences of Compromised Payment Card Data (1:02)
- M.7.3.7 Need and Application of PCI DSS (2:59)
- M.7.3.8 Steps for Adhering to PCI DSS (0:51)
- M.7.3.9 Compliance Requirements for PCI DSS (18:52)
- M.7.3.10 Levels of PCI Compliance (2:02)
- M.7.3.11 Do’s and Don’ts for Payment Card Security (6:02)
- M.7.3.12 SAQ and QSA (5:09)
- M.7.3.13 PA-DSS and its Requirements (16:46)
- M.7.3.14 Pin Transaction Security (PTS) (1:36)
- M.7.3.15 Payment Card Data Breaches and Myths (4:53)
- M.7.3 PCIDSS (PDF)
Sign up and Start Today
Pay-in-full in your local currency (where available)
We take all major forms of payment and we use secure checkout.
Featured Courses
Our most popular courses and offers.
Cybersecurity consultancy is one of the most lucrative & fast-growing fields in the world. Virtual cybersecurity specialists can help organisations achieve cyber maturity, risk, governance and compliance goals in a cost-effective & flexible way.