Loading...

Course Description

CISSP is the basis of advanced information assurance knowledge for information security professionals. Often referred to as the "gold standard" of security certifications, being CISSP certified is one of the most important distinctions an information security professional can have on their resume.

This is a self-paced, asyncronous learning course. It includes a practice certification exam.

Course Outline

  • SECURITY AND RISK MANAGEMENT
    • Overview
    • Understand Adhere, Promote Professional Ethics
    • Understand And Apply Security Concepts (CIA)
    • Evaluate And Apply Security Governance Principles
    • Determine Compliance And Other Requirements
    • Legal, Regulatory Issues For Information Security
    • Spotlight On The GDPR
    • Understand Requirements For Investigation Types
    • Security Policy, Standards, Procedures, Guidelines
    • Identify, Analyze, Prioritize BC Requirements
    • Personnel Security Policies And Procedures
    • Understand, Apply Risk Management Concepts
    • Spotlight On The Risk Management Framework
    • Threat Modeling Concepts And Methodologies
    • Apply Supply Chain Risk Management (SCRM) Concepts
    • Security Awareness, Education And Training Program
    • Security And Risk Management Key Points
  • ASSET SECURITY
    • Identify And Classify Information, Assets
    • Establish Information, Asset Handling Requirements
    • Provision Resources Securely
    • Manage Data Lifecycle
    • Ensure Appropriate Asset Retention
    • Data Security Controls And Compliance Requirements
    • Assets Security - Key Points
  • SECURITY ARCHITECTURE AND ENGINEERING
    • Engineering Process Using Secure Design Principles
    • Fundamental Concepts Of Security Models
    • Controls Based Upon System Security Requirements
    • Security Capabilities Of Information Systems–Vocab
    • Security Capabilities Of Information Systems – CPU
    • Security Capabilities Of Info Systems – Memory
    • Assess And Mitigate Vulnerabilities - The Basics
    • Assess And Mitigate Vulnerabilities - The Rest
    • Spotlight On Cryptographic Solutions - Symmetric
    • Spotlight On Cryptographic Solutions - Asymmetric
    • Spotlight On Cryptographic Solutions - PKI & Certs
    • Spotlight On Cryptographic Solutions - Hashing
    • Cryptographic Solutions - Digital Signing
    • Understand Methods Of Cryptanalytic Attacks
    • Security Principles For Site And Facility Design
    • Design Site And Facility Security Controls
    • Spotlight On Fire Control
    • Security Architecture & Engineering - Key Points
  • COMMUNICATION AND NETWORK SECURITY
    • Spotlight On The OSI Model
    • Spotlight On Internet Protocol (IP) Networking
    • Spotlight On IPsec
    • Spotlight On Secure Protocols
    • Implications Of Converged & Multilayer Protocols
    • Spotlight On Micro-Segmentation
    • Wireless, Cellular & Content Distribution Networks
    • Secure Network Components
    • Implement Secure Communication Channels
    • Communications & Network Security - Key Points
  • IDENTITY AND ACCESS MANAGEMENT (IAM)
    • Control Physical And Logical Access To Assets
    • Manage Identification And Authentication
    • Federated Identity With A Third-Party Service
    • Implement, Manage Auth Mechanisms - Vocab
    • Implement, Manage Auth Mechanisms - Models
    • Manage The Identity, Access Provisioning Lifecycle
    • Implement Authentication Systems
    • Spotlight On Kerberos
    • Spotlight On Federated Identity Management (FIM)
    • Identity Access Management (IAM) - Key Points
  • SECURITY ASSESSMENT AND TESTING
    • Assessment, Test, & Security Audit Strategies
    • Spotlight On System And Org Controls Reports (SOC)
    • Conduct Security Control Testing - The Basics
    • Conduct Security Control Testing - The Rest
    • Collect Security Process Data
    • Analyze Test Output And Generate Reports
    • Security Assessment And Testing - Key Points
  • SECURITY OPERATIONS
    • Understand And Comply With Investigations
    • Conduct Logging & Monitoring Activities
    • Conduct Logging & Monitoring Activities - Threat
    • Perform Configuration Management (CM)
    • Apply Foundational Security Operations Concepts
    • Apply Resource Protection
    • Conduct Incident Management
    • Detective & Preventative Measures
    • Patch & Vulnerability Management
    • Understand & Participate In Change Management
    • Implement Recovery Strategies
    • Implement Disaster Recovery (DR) Processes
    • Test Disaster Recovery Plans (DRP)
    • Business Continuity (BC) Planning & Exercises
    • Implement And Manage Physical Security
    • Address Personnel Safety And Security Concerns
    • Security Operations - Key Points
  • SOFTWARE DEVELOPMENT SECURITY
    • Spotlight On The Software Development Life Cycle
    • Certs & Accreditation Verification & Validation
    • Security In The SDLC - Methodologies
    • Security In The SDLC - Maturity Models
    • Security In The SDLC - Odds & Ends
    • Apply Controls In Development Ecosystems - Basics
    • Apply Controls In Development Ecosystems - Rest
    • Spotlight On The OWASP TOP 10
    • Assess The Effectiveness Of Software Security
    • Assess Security Impact Of Acquired Software
    • Define, Apply Secure Coding Guidelines, Standards
    • Spotlight On Databases
    • Software Development Security - Key Points
  • THE CISSP TOOLBOX
    • What Is The CISSP Toolbox?
    • Who Are You?
    • What Does Your Study Plan Look Like?
    • What Is Your Timeline?

Notes

Cost of the actual exam is NOT included in course fee.

This course is offered in partnership with ITProTV and will run on their platform. Students will be emailed a link and access code after registering.

Loading...
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .