CISSP Certified Information Systems Security Professional
Starting dates and places
Description
Prerequisites:
Delegates should have experience of at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant certifications, e.g., MCSE).Delegates must ensure that they have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
Current requirements for the CISSP examination are to be found at ISC2.org.
Course Description:
Aimed at seasoned security professionals, this course surveys the entire information security landscape and the technologies involved.
The course addresses the ten knowledge domains that comprise the Common Body of Knowledge (CBK) for information systems security profes…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Prerequisites:
Delegates should have experience of at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant certifications, e.g., MCSE).Delegates must ensure that they have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
Current requirements for the CISSP examination are to be found at ISC2.org.
Course Description:
Aimed at seasoned security professionals, this course surveys the entire information security landscape and the technologies involved.
The course addresses the ten knowledge domains that comprise the Common Body of Knowledge (CBK) for information systems security professionals and prepares delegates for CISSP certification. The course offers a job-related approach to the security process, demonstrating the immediate application of concepts and techniques described in the CBK and providing a basic introduction to security management, architecture and engineering.
The course comprises ten sessions that map directly to the (CBK)®, each one is theory based with instructor led discussions, there are no hands on labs. The work completed in the classroom should be complimented by extra reading, references to internet resources will be provided by the instructor.
This course includes the following modules:
Access to Information Systems
- Control Data Access
- Control System Access
- Determine an Access Control Administration Method
- Perform a Penetration Test
Networking Systems and Telecommunications
- Design Data Networks
- Provide Remote Access to a Data Network
- Secure a Data Network
- Manage a Data Network
Security Management
- Determine Security Management Goals
- Classify Information
- Develop a Security Program
- Manage Risk
Applications Security
- Perform Software Configuration Management
- Implement Software Controls
- Secure Database Systems
Cryptography
- Apply a Basic Cipher
- Select a Symmetric Key Cryptography Method
- Select an Asymmetric Key Cryptography Method
- Determine Email Security
- Determine Internet Security
Securing System Architecture
- Evaluate Security Models
- Choose a Security Mode
- Provide System Assurance
Operations Security
- Control Operations Security
- Audit and Monitor Systems
- Handle Threats and Violations
Business Continuity Planning
- Sustain Business Processes
- Perform Business Impact Analysis
- Define Disaster Recovery Strategies
- Test the Disaster Recovery Plan
Physical Security
- Control Physical Access
- Monitor Physical Access
- Establish Physical Security Methods
- Design Secure Facilities
Law, Investigations, and Ethics
- Interpret Computer Crime Laws and Regulations
- Apply the Evidence Life Cycle
- Perform an Investigation
- Identify Codes of Conduct
For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.