Course description
Course Details
Developed and maintained by the International Information Systems Security Certification Consortium (ISC) 2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The CISSP course provides you with the knowledge and skills to pass the CISSP certification, after which you’ll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives you the opportunity to demonstrate your competence with information security best practice. CISSP® certification is a globally recognised standard of achievement that confirms an individual’s knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. It was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.
This course includes the following features:
Instructor-led demonstrations and visual presentations that you to develop your skills based on real world scenarios.
Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
Flash Cards and Education Games are also provided throughout the course.
Practice exams prepare you for your exams. These exams are on average 100 questions to ensure you are 100% prepared if you are taking a certification exam.
You can also interact and collaborate with other students through our forums, student contributions and announcement features.
Who should complete this course?
Internal and External Auditors (Both IT and Financial)
Compliance Officers
Finance/CPA Professionals
Information Security Professionals
Risk Management Professionals
IT Professionals and Management
Entry Requirements / Prerequisites
Candidates must have a minimum of five years of paid full-time work experience in two of the following ten domains: (1) Access Control, (2) Telecommunications and Network Security, (3) Information Security Governance and Risk Management, (4) Software Development Security, (5) Cryptography, (6) Security Architecture and Design, (7) Operations Security, (8) Business Continuity and Disaster Recovery Planning, (9) Legal, Regulations, Investigations and Compliance, (10) Physical (Environmental) Security.
Topics Covered on this Course
Access Control
General Concepts
Authentication
Principles
Types and Categories
Reference Monitor
Techniques
Models
Passwords
Smart Cards
Biometrics
Access Control Systems
Administration
Residuals
Accountability
Summary
Telecommunications and Network Security
OSI Reference Model
ISO/OSI Layers and Characteristics
Topologies
LAN Access Methods
Wireless
System and Security Management
Internet Protocols and Security
Firewall Terms and Types
Web Security
Common Attacks
Remote Access Security
Summary
Information Security Governance and Risk Management
Key Concepts
Definitions
Key Concepts
Risk Management
Risk Assessment
Useful Formulas
3rd Party Governance
Information Classification
Roles and Responsibilities
Written Guidance
Policies and Standards
Employment Policies
Employee Education Programs
Change Management
Summary
Software Architecture and Design
Problems
Databases
Query Language
Object Oriented
Applications Beyond the Database
Definitions
Application System Development
Controls
Compiled vs. Interpreted
Vulnerabilities
Botnets
Summary
Cryptography
Definitions
Cryptanalysis Terms
Symmetric Encryption
Asymmetric Encryption
Hybrid Encryption
Public Key Infrastructures
Hash Functions
Digital Signatures
Protocol Based
Pretty Good Privacy
Cracking Techniques
Summary
Security Architecture and Design
Abstract Levels
Computer Hardware
Operating Systems
Processors
Types of Storage
Information Security Architecture
Open and Closed Systems
Access Controls
Architectural Foundation
Modes of Operation
Certification and Accreditation
Evaluation Criteria
Security Models
Summary
Operations Security
Threats in an Operating Environment
Control Categories
Accountability
Trusted Recovery
Management and Administrative Control
Due Care and Diligence
Hardware and Software Controls
Email and Fax
Privilege
Physical Access
Monitoring Techniques
Problem Management
Threats and Vulnerabilities
Defense in Depth
Summary
Business Continuity and Disaster Recovery
The Basics
Reasons for BCP
Key Concepts
Definitions
Business Continuity Life Cycle
Project Initiation
Business Impact Analysis
Assessing Risk
Recovery Strategies
Off-Site Requirements
Data Redundancy
System Backups
Plan Development
Testing and Maintenance
Stages in an Incident
Summary
Legal Requirements and Investigations
Ethics
Code of Ethics
Laws
Intellectual Property
Proprietary Rights
Liability
Computer Crime
Computer Crime Laws
Computer Investigation
Investigation Steps
Computer Forensics
Evidence Admissibility
Summary
Physical and Environmental Security
Physical Security
Crime Prevention
Site Design and Configuration
Boundary Protection
Computing Facility Requirements
Fire Prevention
Fire Suppression
Fire Classes
Media Protection
Access Controls
Physical Security
Summary
Assessment
You may optionally take exams to receive CISSP certification. This is assessed through multiple choice exams. Exam fees are not included in the course price.
Technical Requirements
Broadband internet connection.
Browser – we recommend Chrome or Safari for Tablet or Apple Mac; and Firefox or Internet Explorer for PC hardware.
Operating System – PC (Windows XP, Vista, 7 or 8), Mac or Android.
Accreditation
Following completion of the online assessment you will receive a Certificate in Systems Security from College of Management and IT (CMIT).
You may optionally take exams to receive CISSP certification. This is assessed through computer-based multiple choice exam (ISC)² CISSP . Exam fees are not included in the course price.