Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP)

Category: 
Course Hours: 
180
Price: 
$900.00
Course Type: 
Mentor Supported
You may also like: 
  • Description
  • Objectives
  • Outline
  • Materials
  • Certification
  • System Requirements
  • Watch a Demo

The Certified Information Systems Security Professional (CISSP) course is designed to ensure that someone handling computer security for a company or client has mastered a standardized body of knowledge. Certified Information Systems Security Professional (CISSP) has developed as the key certification for security professionals in government and industry. Corporations are seeking certified, experienced information security professionals to safeguard their information and assets. The CISSP® is considered the global standard that proves an individual's proficiency in several security disciplines. Security professionals consider the Certified Information Systems Security Professional (CISSP) to be the most desired certification to achieve.

 Prerequisite(s): None

 

By the end of this course, you will be able to:

  • Recall the steps for protecting assets and ensuring proper security measures
  • Identify risk management concepts, security engineering and how to protect against threats
  • Recognize business continuity planning and disaster recovery planning
  • List key aspects of security management and practices
  • Identify key concepts of telecommunications and networking security

Certified Information Systems Security Professional (CISSP) Module 1
Security Concepts

  • Apply Security Concepts
  • Security Governance Principles
  • Security Function
  • Security Policy, Standards, Procedures and Guidelines
  • Supply Chain Management
  • Personnel Security and Risk Management
  • Social Engineering
  • Security Awareness

Certified Information Systems Security Professional (CISSP) Module 2
Business Planning and Laws

  • Business Continuity
  • Project Scope and Planning
  • Business Impact Analysis
  • Continuity Planning
  • Categories of Laws
  • State Privacy Laws
  • Compliance
  • Contracting and Procurement

Certified Information Systems Security Professional (CISSP) Module 3
Security of Assets and Cryptography 

  • Classifying Information and Assets
  • Data Protection Methods
  • Security Baselines
  • Cryptographic Foundations
  • Cryptographic Life Cycle
  • Asymmetric Cryptography
  • Hash Functions
  • Asymmetric Key Management
  • Cryptographic Attacks

Certified Information Systems Security Professional (CISSP) Module 4
Security Models and Requirements 

  • Secure Design Principles
  • Security Models
  • Vulnerabilities, Threats and Countermeasures
  • Data Localization
  • Client and Server Based Systems
  • Internet of Things
  • Virtualized Systems
  • Physical Security Requirements

Certified Information Systems Security Professional (CISSP) Module 5
Network Architecture and Attacks

  • OSI Model
  • TCP/IP Model
  • Application Layer Protocols
  • Internet Protocol (IP) Networking
  • Segmentation
  • Content Distribution Networks (CDNs)
  • Secure Communications and Network Attacks
  • Load Balancing
  • Switching and Virtual LANs

Certified Information Systems Security Professional (CISSP) Module 6
Identity and Access

  • Controlling Access to Assets
  • AAA Model
  • Managing Identity and Access Provisioning Life Cycle
  • Access Control Models
  • Zero-Trust Access Policy Enforcement
  • Access Control Attacks

Certified Information Systems Security Professional (CISSP) Module 7
Security Assessment and Operations

  • Security Assessment and Testing Program
  • Vulnerability Assessments
  • Testing Software
  • Managing Security Operations
  • Managed Services in the Cloud
  • Perform Configuration Management (CM)
  • Manage Patches and Reduce Vulnerabilities

Certified Information Systems Security Professional (CISSP) Module 8
Incidents and Disaster Recovery Planning

  • Conducting Incident Management
  • Logging and Monitoring
  • Automating Incident Response
  • Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development

Certified Information Systems Security Professional (CISSP) Module 9
Software Security and Application Attacks

  • Investigations
  • Ethics
  • Systems Development Controls
  • Storage Threats
  • Knowledge-Based Systems
  • Malware Protection
  • Application Attacks
  • Exploiting Authorization and Web Application Vulnerabilities
  • Secure Coding Practices

**Outlines are subject to change, as courses and materials are updated.**

Ed4Career is committed to being both environmentally conscious and making it easier for you to study! We’re making your education mobile! All of our textbooks are now provided as eTextbooks. You can access them on your laptop, tablet, or mobile device and can study anytime, anywhere.

The move away from physical books to eTextbooks means you get the latest, most up-to-date version available. This also makes your training more accessible, so you can study anywhere you have your phone or tablet. The best part is that all materials are included in your training cost so there are NO extra fees for books!

Upon successful completion of this course, students will be prepared, in part, to sit for the ISC2 Certified Information Systems Security Professional (CISSP) certification exam. Must fulfill additional requirements per ISC2. 

**Certification exams are not included in the cost of the course.**

Internet Connection

  • Broadband or High-Speed - DSL, Cable, and Wireless Connections

*Dial-Up internet connections will result in a diminished online experience. Classroom pages may load slowly and viewing large audio and video files may not be possible.

Hardware Requirements

  • Processor - 2GHz Processor or Higher
  • Memory - 1 GB RAM Minimum Recommended

 

PC Software Requirements

  • Operating Systems - Windows 7 or higher
  • Microsoft Office 2013 or higher. Also, you could use a general Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
  • Internet Browsers - Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
  • The Kindle Reader App or VitalSource Bookshelf App are needed for many of our courses (No special equipment needed. This can be downloaded for FREE onto your computer.)
  • PowerPoint Viewer (if you do not have PowerPoint)
  • Adobe PDF Reader
  • QuickTime, Windows Media Player &/or Real Player

 

MAC Software Requirements

  • Operating Systems - Mac OS x 10 or higher with Windows
  • Mac office programs or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
  • Internet Browsers- Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
  • The Kindle Reader App or VitalSource Bookshelf App are needed for many of our courses (No special equipment needed. This can be downloaded for FREE onto your computer.)
  • PowerPoint Viewer (if you do not have PowerPoint)
  • Adobe PDF Reader
  • Apple QuickTime Media Player