Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP)

Category: 
Course Hours: 
180
Price: 
$900.00
Course Type: 
Mentor Supported
You may also like: 
  • Description
  • Objectives
  • Outline
  • Materials
  • Certification
  • System Requirements
  • Watch a Demo

The Certified Information Systems Security Professional (CISSP) course is designed to ensure that someone handling computer security for a company or client has mastered a standardized body of knowledge. Certified Information Systems Security Professional (CISSP) has developed as the key certification for security professionals in government and industry. Corporations are seeking certified, experienced information security professionals to safeguard their information and assets. The CISSP® is considered the global standard that proves an individual's proficiency in several security disciplines. Security professionals consider the Certified Information Systems Security Professional (CISSP) to be the most desired certification to achieve.

 Prerequisite(s): None

 

By the end of this course, you will be able to:

  • Recall the steps for protecting assets and ensuring proper security measures
  • Identify risk management concepts, security engineering and how to protect against threats
  • Recognize business continuity planning and disaster recovery planning
  • List key aspects of security management and practices
  • Identify key concepts of telecommunications and networking security

Certified Information Systems Security Professional (CISSP) Module 1
Security and Risk Management

  • Professional Ethics
  • Security Concepts
  • Security Governance Principles
  • Compliance Requirements
  • Legal and Regulatory Issues
  • Investigation Types
  • Security Policy Standards, Procedures, and Guidelines
  • Business Continuity Requirements
  • Risk Management Concepts
  • Supply Chain Management Concepts

Certified Information Systems Security Professional (CISSP) Module 2
Asset Security

  • Identify and Classify Information and Assets
  • Establish Information and Asset Handling Requirements
  • Provision Resources Securely
  • Manage Data Lifecycle
  • Appropriate Asset Retention
  • Data Security and Compliance Requirements

Certified Information Systems Security Professional (CISSP) Module 3
Security Architecture and Engineering

  • Engineering Processes Using Secure Design Principles
  • Security Models
  • System Security Requirements
  • Information Systems
  • Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Cryptographic Solutions
  • Cryptanalytic Attacks
  • Design Site and Facility Security Controls

Certified Information Systems Security Professional (CISSP) Module 4
Communications and Network Security

  • Secure Design Principles in Network Architectures
  • Secure Network Components
  • Implement Secure Communication Channels According to Design

Certified Information Systems Security Professional (CISSP) Module 5
Identity and Access Management 

  • Physical and Logical Access to Assets
  • Identification and Authentication of People, Devices, and Services
  • Integrate Third-Party Identity Services
  • Implement and Management Authorization Mechanisms
  • Identity and Access Provisioning Lifecycle
  • Implement Authentication Systems

Certified Information Systems Security Professional (CISSP) Module 6
Security Assessment and Testing

  • Assessment and Test Strategies
  • Conduct Security Control Testing
  • Collect Security Process Data
  • Analyze Test Output and Generate Report
  • Conduct or Facilitate Security Audits

Certified Information Systems Security Professional (CISSP) Module 7
Security Operations

  • Investigations
  • Logging and Monitoring Activities
  • Securely Provision Resources
  • Incident Management
  • Detective and Preventative Measures
  • Vulnerability Management
  • Change Management
  • Recovery Strategies
  • Disaster Recovery Plans
  • Implement and Manage Physical Security

Certified Information Systems Security Professional (CISSP) Module 8
Software Development Security 

  • Software Development Security Life Cycle
  • Environment and Security Controls
  • Effectiveness of Software Security
  • Impact of Acquired Software
  • Secure Coding Standards and Guidelines

**Outlines are subject to change, as courses and materials are updated.**

Ed4Career is committed to being both environmentally conscious and making it easier for you to study! We’re making your education mobile! All of our textbooks are now provided as eTextbooks. You can access them on your laptop, tablet, or mobile device and can study anytime, anywhere.

The move away from physical books to eTextbooks means you get the latest, most up-to-date version available. This also makes your training more accessible, so you can study anywhere you have your phone or tablet. The best part is that all materials are included in your training cost so there are NO extra fees for books!

Upon successful completion of this course, students will be prepared to sit for the ISC2 Certified Information Systems Security Professional (CISSP) certification exam.

**Certification exams are not included in the cost of the course.**

Internet Connection

  • Broadband or High-Speed - DSL, Cable, and Wireless Connections

*Dial-Up internet connections will result in a diminished online experience. Classroom pages may load slowly and viewing large audio and video files may not be possible.

Hardware Requirements

  • Processor - 2GHz Processor or Higher
  • Memory - 1 GB RAM Minimum Recommended

 

PC Software Requirements

  • Operating Systems - Windows 7 or higher
  • Microsoft Office 2013 or higher. Also, you could use a general Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
  • Internet Browsers - Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
  • The Kindle Reader App or VitalSource Bookshelf App are needed for many of our courses (No special equipment needed. This can be downloaded for FREE onto your computer.)
  • PowerPoint Viewer (if you do not have PowerPoint)
  • Adobe PDF Reader
  • QuickTime, Windows Media Player &/or Real Player

 

MAC Software Requirements

  • Operating Systems - Mac OS x 10 or higher with Windows
  • Mac office programs or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
  • Internet Browsers- Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
  • The Kindle Reader App or VitalSource Bookshelf App are needed for many of our courses (No special equipment needed. This can be downloaded for FREE onto your computer.)
  • PowerPoint Viewer (if you do not have PowerPoint)
  • Adobe PDF Reader
  • Apple QuickTime Media Player