Cyber Security CISSP Certified Information Systems Security Professional

CISSP Certified Information Systems Security Professional

Location:

Date of Class:

Instructor:

Last Day To Enroll:

3750.00 3,750.00
$3,750.00
PRICE PER USER
$
X
USERS


=
SUBTOTAL
$
  • Course Delivery: Virtual Classroom

Chat Live | Contact Us | Toll Free: (888) 360-8764

 

Description

Welcome to Certified Information Systems Security Professional (CISSP): Second Edition. With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will expand upon your knowledge by addressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals. The course offers a job-related approach to the security process, while providing the basic skills required to prepare for CISSP certification.

This course includes:

  • Official (ISC)2 Guide to the CISSP Common Body of Knowledge® (CBK) (electronic format)
  • Official (ISC)2 CISSP Training Handbook
  • CISSP Certification Exam Voucher


 

Course Objectives

Upon successful completion of this course, students will be able to:

  • Analyze information systems access control.
  • Analyze security architecture and design.
  • Analyze network security systems and telecommunications.
  • Analyze information security management goals.
  • Analyze information security classification and program development.
  • Analyze risk management criteria and ethical codes of conduct.
  • Analyze application security.
  • Analyze cryptography characteristics and elements.
  • Analyze physical security.
  • Analyze operations security.
  • Apply business continuity and disaster recovery plans.
  • Identify legal issues, regulations, compliance standards, and investigation practices relating to information systems security.

 

Topics Covered

Lesson 1: Information Systems Access Control
  • Topic 1A: Data Access Principles
  • Topic 1B: System Access and Authentication
  • Topic 1C: Penetration Tests

Lesson 2: Security Architecture and Design
  • Topic 2A: Security Models
  • Topic 2B: Security Modes
  • Topic 2C: System Assurance

Lesson 3: Network and Telecommunications Security
  • Topic 3A: Data Network Design
  • Topic 3B: Remote Data Access
  • Topic 3C: Data Network Security
  • Topic 3D: Data Network Management

Lesson 4: Information Security Management Goals
  • Topic 4A: Organizational Security
  • Topic 4B: The Application of Security Concepts

Lesson 5: Information Security Classification and Program Development
  • Topic 5A: Information Classification
  • Topic 5B: Security Program Development

Lesson 6: Risk Management and Ethics
  • Topic 6A: Risk Management
  • Topic 6B: Ethics

Lesson 7: Application Security
  • Topic 7A: Software Configuration Management
  • Topic 7B: Software Controls
  • Topic 7C: Database System Security

Lesson 8: Cryptography
  • Topic 8A: Ciphers and Cryptography
  • Topic 8B: Symmetric-Key Cryptography
  • Topic 8C: Asymmetric-Key Cryptography
  • Topic 8D: Hashing and Message Digests
  • Topic 8E: Email, Internet, and Wireless Security
  • Topic 8F: Cryptographic Weaknesses
  • Lesson 9: Physical Security
  • Topic 9A: Physical Access Control
  • Topic 9B: Physical Access Monitoring
  • Topic 9C: Physical Security Methods
  • Topic 9D: Facilities Security

Lesson 10: Operations Security
  • Topic 10A: Operations Security Control
  • Topic 10B: Operations Security Auditing and Monitoring
  • Topic 10C: Operational Threats and Violations

Lesson 11: Business Continuity and Disaster Recovery Planning
  • Topic 11A: Business Continuity Plan Fundamentals
  • Topic 11B: Business Continuity Plan Implementation
  • Topic 11C: Disaster Recovery Plan Fundamentals
  • Topic 11D: Disaster Recovery Plan Implementation

Lesson 12: Legal, Regulations, Compliance, and Investigations
  • Topic 12A: Computer Crime Laws and Regulations
  • Topic 12B: Computer Crime Incident Response

Appendix A: Mapping CISSP Course Content to the (ISC)2 CISSP Exam Objectives
 

Prerequisites

It is highly recommended that students have certifications in Network+ or Security+, or possess equivalent professional experience upon entering CISSP training. It will be beneficial if students have one or more of the following security-related or technology-related certifications or equivalent industry experience: MCSE, MCTS, MCITP, SCNP, CCNP, RHCE, LCE, CNE, SSCP, GIAC, CISA, or CISM.

 

Subject Matter Expert

Productivity Point Global is led by a team of individuals with world-class experience in professional development skills and leading edge technologies. These established professionals collaborate to drive PPG's business forward through entrepreneurial innovation, strategic partnerships, brand management and sales growth. Productivity Point Global, previously ExecuTrain of Florida, began in 2003 and evolved out of a desire to increase our outreach both nationally and internationally. Utilizing the highest standard in customer service combined with our subject matter experts and high-end training venues, PPG has carved a niche by consistently expanding our corporate and government client base, originally hosted in the southeastern region of the US. By consistently setting quality as the benchmark of our value system, PPG combines strategic partnerships and cutting edge technology with our determined efforts to branch out into other regions. PPG's combination of technology and professional skills training, IT outsourcing, and event hosting enables us to place a focused emphasis on the diversified business needs of our clients. For more info please visit: http://www.productivitypoint.com/

Got questions? Contact us below or call 877-881-2235

Why Choose 360training.com?

  • Fast and easy courses completion
  • Get an education faster than at traditional colleges!
  • 100% online - No classroom attendance required.
  • Unlimited 24x7 online customer support
  • Over 500,000+ certified nationwide.