College of Management and IT (CMIT)Certified Information Systems Security Professional

Certified Information Systems Security Professional

Area:
Nationwide
Price:
on request
Duration:
12 Months
Type:
Online Courses - Distance Learning
Start date: Continuous Intake

Course description

Course Details

Developed and maintained by the International Information Systems Security Certification Consortium (ISC) 2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The CISSP course provides you with the knowledge and skills to pass the CISSP certification, after which you’ll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives you the opportunity to demonstrate your competence with information security best practice.  CISSP® certification is a globally recognised standard of achievement that confirms an individual’s knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. It was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.

This course includes the following features:

Instructor-led demonstrations and visual presentations that you to develop your skills based on real world scenarios.

Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

Flash Cards and Education Games are also provided throughout the course.

Practice exams prepare you for your exams. These exams are on average 100 questions to ensure you are 100% prepared if you are taking a certification exam.

You can also interact and collaborate with other students through our forums, student contributions and announcement features.

 

Who should complete this course?

 Internal and External Auditors (Both IT and Financial)

 Compliance Officers

 Finance/CPA Professionals

 Information Security Professionals

 Risk Management Professionals

 IT Professionals and Management

 

Entry Requirements / Prerequisites

Candidates must have a minimum of five years of paid full-time work experience in two of the following ten domains:  (1) Access Control, (2) Telecommunications and Network Security, (3) Information Security Governance and Risk Management, (4) Software Development Security, (5) Cryptography, (6) Security Architecture and Design, (7) Operations Security, (8) Business Continuity and Disaster Recovery Planning, (9) Legal, Regulations, Investigations and Compliance, (10) Physical (Environmental) Security.

 

Topics Covered on this Course

Access Control

General Concepts

Authentication

Principles

Types and Categories

Reference Monitor

Techniques

Models

Passwords

Smart Cards

Biometrics

Access Control Systems

Administration

Residuals

Accountability

Summary

Telecommunications and Network Security

OSI Reference Model

ISO/OSI Layers and Characteristics

Topologies

LAN Access Methods

Wireless

System and Security Management

Internet Protocols and Security

Firewall Terms and Types

Web Security

Common Attacks

Remote Access Security

Summary

Information Security Governance and Risk Management

Key Concepts

Definitions

Key Concepts

Risk Management

Risk Assessment

Useful Formulas

3rd Party Governance

Information Classification

Roles and Responsibilities

Written Guidance

Policies and Standards

Employment Policies

Employee Education Programs

Change Management

Summary

Software Architecture and Design

Problems

Databases

Query Language

Object Oriented

Applications Beyond the Database

Definitions

Application System Development

Controls

Compiled vs. Interpreted

Vulnerabilities

Botnets

Summary

Cryptography

Definitions

Cryptanalysis Terms

Symmetric Encryption

Asymmetric Encryption

Hybrid Encryption

Public Key Infrastructures

Hash Functions

Digital Signatures

Protocol Based

Pretty Good Privacy

Cracking Techniques

Summary

Security Architecture and Design

Abstract Levels

Computer Hardware

Operating Systems

Processors

Types of Storage

Information Security Architecture

Open and Closed Systems

Access Controls

Architectural Foundation

Modes of Operation

Certification and Accreditation

Evaluation Criteria

Security Models

Summary

Operations Security

Threats in an Operating Environment

Control Categories

Accountability

Trusted Recovery

Management and Administrative Control

Due Care and Diligence

Hardware and Software Controls

Email and Fax

Privilege

Physical Access

Monitoring Techniques

Problem Management

Threats and Vulnerabilities

Defense in Depth

Summary

Business Continuity and Disaster Recovery

The Basics

Reasons for BCP

Key Concepts

Definitions

Business Continuity Life Cycle

Project Initiation

Business Impact Analysis

Assessing Risk

Recovery Strategies

Off-Site Requirements

Data Redundancy

System Backups

Plan Development

Testing and Maintenance

Stages in an Incident

Summary

Legal Requirements and Investigations

Ethics

Code of Ethics

Laws

Intellectual Property

Proprietary Rights

Liability

Computer Crime

Computer Crime Laws

Computer Investigation

Investigation Steps

Computer Forensics

Evidence Admissibility

Summary

Physical and Environmental Security

Physical Security

Crime Prevention

Site Design and Configuration

Boundary Protection

Computing Facility Requirements

Fire Prevention

Fire Suppression

Fire Classes

Media Protection

Access Controls

Physical Security

Summary

 

Assessment

You may optionally take exams to receive CISSP certification. This is assessed through multiple choice exams. Exam fees are not included in the course price.

 

Technical Requirements

Broadband internet connection.

Browser – we recommend Chrome or Safari for Tablet or Apple Mac; and Firefox or Internet Explorer for PC hardware.

Operating System – PC (Windows XP, Vista, 7 or 8), Mac or Android.

 

Accreditation

Following completion of the online assessment you will receive a Certificate in Systems Security from College of Management and IT (CMIT).

You may optionally take exams to receive CISSP certification. This is assessed through computer-based multiple choice exam (ISC)²  CISSP . Exam fees are not included in the course price.

 


Course Enquiry

* I have read & agree to Findacourse privacy policy
Receive monthly updates about courses & colleges (unsubscribe at any time)