Course Overview
If you are ready to take your security career to the next level, our Certified Information Systems Security Professional (CISSP) exam preparation course will help get you there. Get instruction from our experts with real-world experience as you cover all the material you need to prepare for the (ISC)2 CISSP exam.
Certification
(ISC)2 requires exam candidates to have a minimum of five years of relevant work experience in two or more of the ten domains, four years of work experience with an applicable college degree, or a credential from the (ISC)2-approved list.
The CISSP certification requires successfully passing the CISSP exam (administered by (ISC)2) and having met the experience requirements. After class, we recommend self-study to sharpen your weak areas before taking the exam.
Who Can Take This Course
IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers, and other security professionals whose positions require CISSP certification.
Prerequisites
Systems administration experience, familiarization with TCP/IP, and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in our Security+ Prep Course.
Objectives
In-depth coverage of the ten domains required to pass the CISSP exam:
- Operations Security
- Access Control
- Cryptography
- Security Architecture and Design
- Telecommunications and Network Security
- Disaster Recovery and Business Continuity Planning
- Legal, Regulations, Compliance, and Investigations
- Application Security
- Information Security and Risk Management
- Physical (Environmental) Security
Course Content
1. Introduction
- Course Overview
- CISSP Candidate Requirements
- CISSP Exam Review
2. Operations Security
- Operation Security Principles, Techniques, and Mechanisms
- Principles and Practices of Good Security
- Resource Protection Mechanisms and Techniques
- Attacks and Prevention Methods
3. Access Control
- Authentication
- Authorization
- Accountability
- Threats to Access Control
4. Cryptography
- History of Cryptography
- Symmetric Encryption
- Asymmetric Encryption
- Hashing and Digital Signatures
- Public Key Infrastructure
- Cryptographic Attacks
5. Security Architecture and Design
- Computer Architecture
- Rings of Protection
- Security Models
- System Evaluation
6. Telecommunications and Network Security
- The OSI Model
- The TCP/IP Model
- WAN Protocols
- Routing
- Wireless Systems
- Fault Tolerance
7. Disaster Recovery and Business Continuity Planning
- Disaster Recovery Planning
- Business Impact Analysis
- Business Continuity Planning
- Backup and Off-Site Facilities
- Testing Contingency Plans
8. Legal, Regulations, Compliance, and Investigations
- Laws and Ethics
- Computer Crime
- Incident Response and Forensics
9. Application Security
- Database Security
- System Development
- Software Development Methods
- Threats and Vulnerabilities
10. Information Security and Risk Management
- Security Management
- Risk Analysis
- Classification Controls
11. Physical (Environmental) Security
- Threats to Physical Security
- Administrative Controls
- Environmental and Safety Controls
- Physical and Technical Controls
12. Test Review and Preparation
- Test Review
- Test Registration
- Test Preparation
- Certification Maintenance
|
|
Corporate training |
Quality can only be experienced, not described.
 |
|
CCIE Bootcamp Schedule |
CCIE R&S 10-DAY BOOTCAMP
CCIE SERVICE PROVIDER V3.0 10-DAY BOOTCAMP
CCIE SECURITY V4.0 10-DAY BOOTCAMP
CCIE VOICE 10-DAY BOOTCAMP
 |
|