Oreilly - Information Systems Certification and Accreditation Professional (ISCAP)
by Integrity Training | Publisher: Stone River eLearning | Release Date: June 2018 | ISBN: 300000006A0230
The Information Systems Certification and Accreditation Professional (ISCAP) training course is based on the concepts around certifying, reviewing and accrediting an information system. This vendor-neutral certification course is designed to provide in-depth guide to establishing a certifiable and accredited information system in any organization. The course is based on the official certification exam contents and enables the students to appear in the exam. The course covers all the standards to implement the processes used to evaluate risk and institute security baselines and requirements. The Information Systems Certification and Accreditation Professional (ISCAP) course covers everything you need to know about becoming an Information Systems Certification and Accreditation Professional. Students are able to learn about the risk management framework, software development life cycle, categorizing information systems, selecting security controls, implementing security controls, assessing security controls, authorizing information systems, and monitoring security controls. NOTE Mile2 is: ACCREDITED by the NSA CNSS 4011-4016 MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
- Module 01 - Introduction to the Risk Management Framework
- Introduction to the Risk Management Framework Part1 00:18:53
- Introduction to the Risk Management Framework Part2 00:13:51
- Introduction to the Risk Management Framework Part3 00:17:38
- Introduction to the Risk Management Framework Part4 00:18:38
- Module 02 - The Software Development Life Cycle
- The Software Development Life Cycle Part1 00:11:48
- The Software Development Life Cycle Part2 00:14:12
- Module 03 - Categorize Information System
- Categorize Information System Part1 00:12:22
- Categorize Information System Part2 00:11:50
- Module 04 - Select Security Controls
- Select Security Controls 00:11:50
- Module 05 - Implement Security Controls
- Implement Security Controls 00:10:17
- Module 06 - Assess Security Controls
- Accessing the Company's Network Through Your Assigned Computer Part1 00:10:26
- Accessing the Company's Network Through Your Assigned Computer Part2 00:12:27
- Module 07 - Authorize Information System
- Authorize Information System Part1 00:11:16
- Authorize Information System Part2 00:16:01
- Module 08 - Monitor Security Controls
- Monitor Security Controls Part1 00:13:02
- Monitor Security Controls Part2 00:13:33
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.