skip to Main Content

CISSP: Certified Information System Security Professional

This course will expand your knowledge by covering the key elements of the eight areas that make up the Joint Knowledge Group (CBK®) for information systems security professionals. The course provides a framework for preparing for CISSP certification while offering a business-related approach to the security process.

Lesson 1: Security and Risk Management
Topic A: Security Concepts
Topic B: Security Governance Principles
Topic C: Compliance
Topic D: Professional Ethics
Topic E: Security Documentation
Topic F: Risk Management
Topic G: Threat Modeling
Topic H: Risk Response
Topic I: Business Continuity Plan Fundamentals
Topic J: Acquisition Strategy and Practice
Topic K: Personnel Security Policies
Topic L: Security Awareness and Training

Lesson 2: Asset Security
Topic A: Asset Classification
Topic B: Secure Data Handling
Topic C: Resource Provisioning and Protection
Topic D: Manage Data Lifecycle
Topic E: Asset Retention
Topic F: Data Security Controls

Lesson 3: Security Architecture and Engineering
Topic A: Security in the Engineering Lifecycle
Topic B: System Component Security
Topic C: Security Models
Topic D: Controls and Countermeasures in Enterprise Security
Topic E: Information System Security Capabilities
Topic F: Design and Architecture Vulnerability Mitigation
Topic G: Vulnerability Mitigation in Emerging Technologies
Topic H: Cryptography Concepts
Topic I: Cryptography Techniques
Topic J: Cryptanalytic Attacks
Topic K: Site and Facility Design for Physical Security
Topic L: Physical Security Implementation in Sites and Facilities

Lesson 4: Communication and Network Security
Topic A: Network Protocol Security
Topic B: Network Components Security
Topic C: Communication Channel Security
Topic D: Network Attack Mitigation

Lesson 5: Identity and Access Management
Topic A: Physical and Logical Access Control
Topic B: Identification and Authentication
Topic C: Identity as a Service
Topic D: Authorization Mechanisms
Topic E: Access Control Attack Mitigation

Lesson 6: Security Assessment and Testing
Topic A: System Security Control Testing
Topic B: Software Security Control Testing
Topic C: Security Process Data Collection
Topic D: Audits

Lesson 7: Security Operations
Topic A: Security Operations Concepts
Topic B: Change Management
Topic C: Physical Security
Topic D: Personnel Security
Topic E: Detective and Preventive Measures
Topic F: Patch and Vulnerability Management
Topic G: Logging and Monitoring
Topic H: Incident Response
Topic I: Investigations
Topic J: Disaster Recovery Planning
Topic K: Disaster Recovery Strategies
Topic L: Disaster Recovery Implementation

Lesson 8: Software Development Security
Topic A: Security Principles in the System Lifecycle
Topic B: Security Principles in the Software Development Lifecycle
Topic C: Security Controls in the Development Environment
Topic D: Database Security in Software Development
Topic E: Software Security Effectiveness Assessment

In this course, you will identify and strengthen key security issues in the eight areas of the (ISC)2 CISSP CBK and you will:

  • Analyze the components of the Security and Risk Management domain.
  • Analyze the components of the Asset Security domain.
  • Analyze the components of the Security Architecture and Engineering field.
  • Analyze the components of the Communications and Network Security domain.
  • Analyze the components of the Identity and Access Management domain.
  • Analyze the components of the Security Assessment and Testing domain.
  • Analyze the components of the Security Operations domain.
  • Analyze the components of the Software Development Security domain

The CISSP course is suitable for mid and senior-level IT and security managers who are working towards or have already achieved a position such as: 

  • CISO (chief information security officer) 
  • CSO (chief security officer) 
  • Senior security engineer 
  • Security consultant 
  • Security manager 
  • Security auditor 
  • Security director 
  • Security architect 
  • Network architect 
  • IT director/manager 
  • Security analyst 
  • Security systems engineer

While there are no mandatory requirements to attend this course, please be aware that all attendees are expected to have a basic understanding of the CISSP job practice knowledge domains.

 

 

    Contact us for more information!

    ARE YOU READY?

    If you need this course, you can fill out the form or contact us.

      Contact us for more information!

      Back To Top