OVERVIEW

Certified Information Systems Security Professional (CISSP) Certification was designed to recognize mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The certification is managed by the International Information Systems Security Certification Consortium (ISC)², to recognize individuals who have distinguished themselves as experienced, knowledgeable, and proficient information security practitioners. Certification can enhance a professional’s career and provide added credibility. CISSP is an approved certification for certain job classifications identified within DoD Directive 8570.

This test preparation course covers the 8 domains of the CISSP CBK relevant to the corresponding professional certification exam:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security
OBJECTIVE

Upon successful completion of this course, students will be able to:

  • Describe the legal and compliance standards for security and risk management of a facility or system
  • Implement secure communication and network protocols
  • Implement physical security protocols
  • Assess physical security protocols to existing sites and site design
  • Design and implement digital asset security
  • Implement control and authorization methodologies of people, devices and services
  • Implement security and assessment examinations
  • Log and monitor a facility or system as part of the scope of business
  • Apply security concepts to software design and utilization
AUDIENCE

For IT security professionals with at least four years of work experience in the information security field.

PREREQUISITES

Our CompTIA Security+ Certification Preparation course, certification, or equivalent experience is recommended.

CERTIFICATION EXAMS

The course is specifically designed to maximize the prospect of passing the rigorous examination. Coverage includes all relevant exam topics, prioritization of areas where study should be focused, test taking strategies, and practice exam questions.

The CISSP Certification examination consists of 250 multiple-choice questions. Candidates have up to 6 hours to complete the examination. For complete details on the certification requirements, visit (ISC)²’s CISSP Certification page.

PRICE

$2,195.00

SCHEDULE/SESSIONS

TBD

Ready to enroll?

Apply Today
COURSE OUTLINE

Lesson 1: Information Systems Access Control
Topic 1A: Data Access Principles
Topic 1B: System Access and Authentication
Topic 1C: Penetration Tests

Lesson 2: Security Architecture and Design
Topic 2A: Security Models
Topic 2B: Security Modes
Topic 2C: System Assurance

Lesson 3: Network and Telecommunications Security
Topic 3A: Data Network Design
Topic 3B: Remote Data Access
Topic 3C: Data Network Security
Topic 3D: Data Network Management

Lesson 4: Information Security Management Goals
 Topic 4A: Organizational Security
Topic 4B: The Application of Security Concepts

Lesson 5: Information Security Classification and Program Development
Topic 5A: Information Classification
Topic 5B: Security Program Development

Lesson 6: Risk Management and Ethics
Topic 6A: Risk Management
Topic 6B: Ethics

Lesson 7: Application Security
 Topic 7A: Software Configuration Management
Topic 7B: Software Controls
Topic 7C: Database System Security

Lesson 8: Cryptography
 Topic 8A: Ciphers and Cryptography
Topic 8B: Symmetric-Key Cryptography
Topic 8C: Asymmetric-Key Cryptography
Topic 8D: Hashing and Message Digests
Topic 8E: Email, Internet, and Wireless Security
Topic 8F: Cryptographic Weaknesses

Lesson 9: Physical Security
 Topic 9A: Physical Access Control
Topic 9B: Physical Access Monitoring
Topic 9C: Physical Security Methods
Topic 9D: Facilities Security

Lesson 10: Operations Security
 Topic 10A: Operations Security Control
Topic 10B: Operations Security Auditing and Monitoring
Topic 10C: Operational Threats and Violations

Lesson 11: Business Continuity and Disaster Recovery Planning
 Topic 11A: Business Continuity Plan Fundamentals
Topic 11B: Business Continuity Plan Implementation
Topic 11C: Disaster Recovery Plan Fundamentals
Topic 11D: Disaster Recovery Plan Implementation

Lesson 12: Legal, Regulations, Compliance, and Investigations
Topic 12A: Computer Crime Laws and Regulations
Topic 12B: Computer Crime Incident Response