CISSP: Certified Information System Security Professional Training

Answers to Popular Questions:

 
Yes, this class can be tailored to meet your specific training needs.
Yes, we provide CompTIA consulting services.
Yes, group discounts are provided.

Course Description

 
Welcome to Certified Information Systems Security Professional (CISSP) . With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of todays security professional. This course will expand upon your knowledge by addressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals. The course offers a job-related approach to the security process, while providing the basic skills required for preparing for the CISSP certification.
Course Length: 5 Days
Course Tuition: $2290 (US)

Prerequisites

Students should have certifications in A+, Network+, or Security+, or possess equivalent professional experience. Students may have one or more of the following certifications or equivalent experience: MCSE, SCNP, CCNP, RHCE, LCE, CNE, SSCP, SANS, or GIAC. Performance-Based Objectives Upon successful completion of this course, students will be able to: â?¢ Control access to information systems. â?¢ Network systems and telecommunications. â?¢ Define security management. â?¢ Create applications security. â?¢ Perform cryptography. â?¢ Secure system architecture. â?¢ Execute operations security. â?¢ Perform business continuity planning. â?¢ Apply physical security. â?¢ Apply law, investigations, and ethics.

Course Outline

 

Course Outline
Lesson 1: Controlling Access to Information Systems
Topic 1A: Control Data Access
Topic 1B: Control System Access
Topic 1C: Determine an Access Control Administration Method
Topic 1D: Perform a Penetration Test
Lesson 2: Networking Systems and Telecommunications
Topic 2A: Design Data Networks
Topic 2B: Provide Remote Access to a Data Network
Topic 2C: Secure a Data Network
Topic 2D: Manage a Data Network
Lesson 3: Defining Security Management
Topic 3A: Determine Security Management Goals
Topic 3B: Classify Information
Topic 3C: Develop a Security Program
Topic 3D: Manage Risk
Lesson 4: Creating Applications Security
Topic 4A: Perform Software Configuration Management
Topic 4B: Implement Software Controls
Topic 4C: Secure Database Systems
Lesson 5: Performing Cryptography
Topic 5A: Apply a Basic Cipher
Topic 5B: Select a Symmetric Key Cryptography Method
Topic 5C: Select an Asymmetric Key Cryptography Method
Topic 5D: Determine Email Security
Topic 5E: Determine Internet Security
Lesson 6: Securing System Architecture
Topic 6A: Evaluate Security Models
Topic 6B: Choose a Security Mode
Topic 6C: Provide System Assurance
Lesson 7: Executing Operations Security
Topic 7A: Control Operations Security
Topic 7B: Audit and Monitor Systems
Topic 7C: Handle Threats and Violations
Lesson 8: Performing Business Continuity Planning
Topic 8A: Sustain Business Processes
Topic 8B: Perform Business Impact Analysis
Topic 8C: Define Disaster Recovery Strategies
Topic 8D: Test the Disaster Recovery Plan
Lesson 9: Applying Physical Security
Topic 9A: Control Physical Access
Topic 9B: Monitor Physical Access
Topic 9C: Establish Physical Security Methods
Topic 9D: Design Secure Facilities
Lesson 10: Applying Law, Investigations, and Ethics
Topic 10A: Interpret Computer Crime Laws and Regulations
Topic 10B: Apply the Evidence Life Cycle
Topic 10C: Perform an Investigation
Topic 10D: Identify Codes of Conduct


Appendix A: CISSP Certification Exam Objectives
Appendix B: SSCP Certification Exam Objectives
 

Course Directory [training on all levels]

Upcoming Classes