Certified Information Systems Security Professional (CISSP)
|BUY INDIVIDUALLY||BUY AS SUBSCRIPTION|
When you subscribe, you get:
Master subscription plan gives you access to this course PLUS:
Now Only $2,999.00 Regular Price $3,499.00
Now Only $2,999.00 Regular Price $3,499.00/ Year
About this course:
The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the information security market. CISSP validates an information security professional’s deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization.
In this course, you gain the foundational knowledge to fully prepare for the (ISC)2® Certified Information Systems Security Professional (CISSP®) exam, including a comprehensive understanding of the CISSP CBK 8 domains also covers the broad spectrum of topics and ensure its relevancy across all disciplines in the field of information security.
CISSP CBK 8 domains:
• Security and Risk Management • Asset Security • Security Engineering • Communications and Network Security • Identity and Access Management • Security Assessment and Testing • Security Operations • Software Development Security
The average salary for a CISSP Certified IT Security Specialist is $126,770 per year.
The CISSP exam is rigorous, covering eight security domains essential for the protection of information systems, corporations and national infrastructures. Understanding that security is an enterprise wide problem, these domains provide the candidate with a broad understanding of the technical, managerial and human factors that must coordinate effectively to keep information and systems secure. These domains include:
The Eight Domains of the CISSP CBK (Common Body of Knowledge)
- Security and Risk Management
- Asset Security
- Security Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
The CISSP is ideal for those working in roles such as:
- Security Consultant
- Security Analyst
- Security Manager
- Security Auditor
- Security Architect
- IT Director/Manager
- Director of Security
- Network Architect
- Security Systems Engineer
- Chief Information Security Officer
- Candidates must have a minimum of 5 years cumulative paid full-time work experience in 2 or more of the 8 domains of the CISSP CBK. Earning a 4-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy 1 year of the required experience. Education credit will only satisfy 1 year of experience.
- A candidate that doesn’t have the required experience to become a CISSP may become an Associate of (ISC)² by successfully passing the CISSP examination. The Associate of (ISC)² will then have 6 years to earn the 5 years required experience
Suggested prerequisites courses:
Virtual Instructed-Led Outline
1. Security Management Practices
- Types of Security Controls
- Components of a Security Program
- Security Policies, Standards, Procedures, and Guidelines
- Risk Management and Analysis
- Information Classification
- Employee Management Issues
- Threats, Vulnerabilities and Corresponding Administrative Controls
2. Access Control Systems and Methodology
- Identification, Authentication, and Authorization Techniques and Technologies
- Biometrics, Smart Cards, and Memory Cards
- Single Sign-On Technologies and Their Risks
- Discretionary versus Mandatory Access Control Models
- Rule-based and Role-based Access Control
- Object Reuse Issues and Social Engineering
- Emissions Security Risks and Solutions
- Specific Attacks and Countermeasures
- Historical Uses of Cryptography
- Block and Stream Ciphers
- Explanation and Uses of Symmetric Key Algorithms
- Explanation and Uses of Asymmetric Key Algorithms
- Public Key Infrastructure Components
- Data Integrity Algorithms and Technologies
- IPSec, SSL, SSH, and PGP
- Secure Electronic Transactions
- Key Management
- Attacks on Cryptosystems
4. Physical Security
- Facility Location and Construction Issues
- Physical Vulnerabilities and Threats
- Doors, Windows, and Secure Room Concerns
- Hardware Metrics and Backup Options
- Electrical Power Issues and Solutions
- Fire Detection and Suppression
- Fencing, Lighting, and Perimeter Protection
- Physical Intrusion Detection Systems
5. Enterprise Security Architecture
- Critical Components of Every Computer
- Processes and Threads
- The OSI Model
- Operating System Protection Mechanisms
- Ring Architecture and Trusted Components
- Virtual Machines, Layering, and Virtual Memory
- Access Control Models
- Orange Book, ITSEC, and Common Criteria
- Certification and Accreditation
- Covert Channels and Types of Attacks
- Buffer Overflows and Data Validation Attacks
6. Law, Investigation, and Ethics
- Different Ethics Sets
- Computer Criminal Profiles
- Types of Crimes
- Liability and Due Care Topics
- Privacy Laws and Concerns
- Complications of Computer Crime Investigation
- Types of Evidence and How to Collect It
- Legal Systems
7. Telecommunications, Networks, and Internet Security
- TCP\IP Suite
- LAN, MAN, and WAN Topologies and Technologies
- Cable Types and Issues
- Broadband versus Baseband Technologies
- Ethernet and Token Ring
- Network Devices
- Firewall Types and Architectures
- Dial-up and VPN Protocols
- DNS and NAT Network Services
- FDDI and SONET
- X.25, Frame Relay, and ATM
- Wireless LANs and Security Issues
- Cell Phone Fraud
- Types of Attacks
8. Business Continuity Planning
- Roles and Responsibilities
- Liability and Due Care Issues
- Business Impact Analysis
- Identification of Different Types of Threats
- Development Process of BCP
- Backup Options and Technologies
- Types of Offsite Facilities
- Implementation and Testing of BCP
9. Applications & Systems Development
- Software Development Models
- Prototyping and CASE Tools
- Object-Oriented Programming
- Middleware Technologies
- ActiveX, Java, OLE, and ODBC
- Database Models
- Relational Database Components
- CGI, Cookies, and Artificial Intelligence
- Different Types of Malware
10. Operations Security
- Operations Department Responsibilities
- Personnel and Roles
- Media Library and Resource Protection
- Types of Intrusion Detection Systems
- Vulnerability and Penetration Testing
- Facsimile Security
- RAID, Redundant Servers, and Clustering?
|Learning Style||Virtual Classroom|
|Course Duration||5 Days|
Frequently Asked Questions About Virtual Instructor-Led Courses
I can't connect to my class, what are my options?
The link to the class is available upon logging in to your dashboard. If you are unable to see it, please contact our support team at 1-855-800-8240 and they will be happy to provide you the direct link via email or the dial in number.
I can't make it to attend to class. Can I reschedule?
Yes, you can reschedule your class. Please contact your Sales representative and they will arrange this for you. If you forgot his/her name, feel free to contact our support team at firstname.lastname@example.org or 1-855-800-8240.
Will I get my certificate upon completion?
Yes. Upon completion of the course, it will be available on your course as a Trophy Icon for you to download. If you do not see this, you will need to contact email@example.com with the following details so they can email you the certificate: Class Name, Class Date, Account Rep, and Your Email.
I cannot connect to my lab. Help!
Your Lab is accessible on the bottom part of your course. You will see a button that says "LAB". Just click it to launch the lab. Please note that some classes don’t need/require a LAB. You can verify with our support team by calling them at 1-855-800-8240 or by email at firstname.lastname@example.org. You can also check with your Instructor or the Associate Instructor if your class includes one.
What is my access code for Skillpipe?
A. Not all of the classes have or require Skillpipe. If your class includes one, please check your email as you should have received one from email@example.com. In case you do not find it in your inbox, please check the Spam / Junk folder. For any further assistance, you can call the support at 1-855-800-8240 or contact them via email at firstname.lastname@example.org.
I don't have audio. I can't hear the instructor.
Make sure you are using a compatible headset for your laptop or computer. If you don’t have a headset, you can use the built-in speaker of your laptop. Otherwise, you can use the dial in option by calling the dial in number provided in the class joining email. You may also contact support team for the dial in numbers associated for your training at 1-855-800-8240 or contact them via email at email@example.com.
How can I reach student support?
Support can be reach via phone at 1855-800-8240; via email at firstname.lastname@example.org or via chat support through the chat button on our website. Please note that support office hours will be from 8am-5pm CST Monday to Friday. Any concerns after office hours will be attended the following business day.
Get A Team Quote or Got Questions?
- Personalize learning based on competencies, goals & tools
- Expert Mentoring
- Hands on Labs & Assignments
- AI Curated Digital Book Content
- Adaptive Learning Paths
- Analytics & Benchmarking
- High certification Pass Rates – Over 200,000 people certified and more than 95% of our learners pass their certification on the first attempt