Certified Information System Security Professional (CISSP)

Request a Quote for this class

About this Course

If you plan to build a career in information security – one of today’s most visible professions –the Certified Information Systems Security Professional (CISSP®) credential should be your next career goal. A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more. CISSP was the first credential in the field of information to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.

Why become a CISSP

Benefits of the CISSP for You

  • Demonstrates a working knowledge of information security
  • Confirms commitment to profession
  • Offers a career differentiator, with enhanced credibility and marketability
  • Affords you exclusive benefits as an (ISC)2 member, including valuable resources such as peer networking and idea exchange
  • Indicates that certified information security professionals earn a worldwide average of 25% more than their non-certified counterparts, according to the Global Information Security Workforce Study
  • Fulfills government and organization requirements for information security certification mandates

Benefits of the CISSP for Your Employer

  • Positions candidates on a level playing field as (ISC)2 certifications are recognized internationally
  • Provides increased credibility for your organization when working with vendors and contractors
  • Empowers employees with a universal language, circumventing ambiguity with industry-accepted terms and practices
  • Validates commitment and years of experience gained in the industry
  • Requires Continuing Professional Education (CPE) credits to ensure that personnel keep their skills current
  • Satisfies certification mandate requirements for service providers or subcontractors

Audience Profile

  •  Security Consultant o Security Analyst
  •  Security Manager o Security Systems Engineer
  •  IT Director/Manager o Chief Information Security Officer
  •  Security Auditor o Director of Security
  •  Security Architect o Network Architect

Course Outline

Lesson 1: Controlling Access to Information Systems

  • Topic 1A: Control Data Access
  • Topic 1B: Control System Access
  • Topic 1C: Determine an Access Control Administration Method
  • Topic 1D: Perform a Penetration Test

Lesson 2: Networking Systems and Telecommunications

  • Topic 2A: Design Data Networks
  • Topic 2B: Provide Remote Access to a Data Network
  • Topic 2C: Secure a Data Network
  • Topic 2D: Manage a Data Network

Lesson 3: Defining Security Management

  • Topic 3A: Determine Security Management Goals
  • Topic 3B: Classify Information
  • Topic 3C: Develop a Security Program
  • Topic 3D: Manage Risk

Lesson 4: Creating Applications Security

  • Topic 4A: Perform Software Configuration Management
  • Topic 4B: Implement Software Controls
  • Topic 4C: Secure Database Systems

Lesson 5: Performing Cryptography

  • Topic 5A: Apply a Basic Cipher
  • Topic 5B: Select a Symmetric Key Cryptography Method
  • Topic 5C: Select an Asymmetric Key Cryptography Method
  • Topic 5D: Determine Email Security
  • Topic 5E: Determine Internet Security

Lesson 6: Securing System Architecture

  • Topic 6A: Evaluate Security Models
  • Topic 6B: Choose a Security Mode
  • Topic 6C: Provide System Assurance

Lesson 7: Executing Operations Security

  • Topic 7A: Control Operations Security
  • Topic 7B: Audit and Monitor Systems
  • Topic 7C: Handle Threats and Violations

Lesson 8: Performing Business Continuity Planning

  • Topic 8A: Sustain Business Processes
  • Topic 8B: Perform Business Impact Analysis
  • Topic 8C: Define Disaster Recovery Strategies
  • Topic 8D: Test the Disaster Recovery Plan

Lesson 9: Applying Physical Security

  • Topic 9A: Control Physical Access
  • Topic 9B: Monitor Physical Access
  • Topic 9C: Establish Physical Security Methods
  • Topic 9D: Design Secure Facilities

Lesson 10: Applying Law, Investigations, and Ethics

  • Topic 10A: Interpret Computer Crime Laws and Regulations
  • Topic 10B: Apply the Evidence Life Cycle
  • Topic 10C: Perform an Investigation
  • Topic 10D: Identify Codes of Conduct

Appendix A: CISSP Certification Exam Objectives

Appendix B: SSCP Certification Exam Objectives