CISSP Certified Information Systems Security Professional

Level
Total time

CISSP Certified Information Systems Security Professional

Perpetual Solutions
Logo Perpetual Solutions
Provider rating: starstarstarstarstar 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.

Description

Prerequisites:

Delegates should have experience of at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant certifications, e.g., MCSE).
Delegates must ensure that they have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
Current requirements for the CISSP examination are to be found at ISC2.org.

Course Description:

Aimed at seasoned security professionals, this course surveys the entire information security landscape and the technologies involved.

The course addresses the ten knowledge domains that comprise the Common Body of Knowledge (CBK) for information systems security profes…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: CISSP, MCSE, Business Information Systems, Security, and Cisco.

Prerequisites:

Delegates should have experience of at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant certifications, e.g., MCSE).
Delegates must ensure that they have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
Current requirements for the CISSP examination are to be found at ISC2.org.

Course Description:

Aimed at seasoned security professionals, this course surveys the entire information security landscape and the technologies involved.

The course addresses the ten knowledge domains that comprise the Common Body of Knowledge (CBK) for information systems security professionals and prepares delegates for CISSP certification. The course offers a job-related approach to the security process, demonstrating the immediate application of concepts and techniques described in the CBK and providing a basic introduction to security management, architecture and engineering.

The course comprises ten sessions that map directly to the (CBK)®, each one is theory based with instructor led discussions, there are no hands on labs. The work completed in the classroom should be complimented by extra reading, references to internet resources will be provided by the instructor.

This course includes the following modules:

Access to Information Systems

  • Control Data Access
  • Control System Access
  • Determine an Access Control Administration Method
  • Perform a Penetration Test

Networking Systems and Telecommunications

  • Design Data Networks
  • Provide Remote Access to a Data Network
  • Secure a Data Network
  • Manage a Data Network

Security Management

  • Determine Security Management Goals
  • Classify Information
  • Develop a Security Program
  • Manage Risk

Applications Security

  • Perform Software Configuration Management
  • Implement Software Controls
  • Secure Database Systems

Cryptography

  • Apply a Basic Cipher
  • Select a Symmetric Key Cryptography Method
  • Select an Asymmetric Key Cryptography Method
  • Determine Email Security
  • Determine Internet Security

Securing System Architecture

  • Evaluate Security Models
  • Choose a Security Mode
  • Provide System Assurance

Operations Security

  • Control Operations Security
  • Audit and Monitor Systems
  • Handle Threats and Violations

Business Continuity Planning

  • Sustain Business Processes
  • Perform Business Impact Analysis
  • Define Disaster Recovery Strategies
  • Test the Disaster Recovery Plan

Physical Security

  • Control Physical Access
  • Monitor Physical Access
  • Establish Physical Security Methods
  • Design Secure Facilities

Law, Investigations, and Ethics

  • Interpret Computer Crime Laws and Regulations
  • Apply the Evidence Life Cycle
  • Perform an Investigation
  • Identify Codes of Conduct

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.