Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP)

Category: 
Course Hours: 
180
Price: 
$900.00
Course Type: 
Mentor Supported
You may also like: 
  • Description
  • Objectives
  • Outline
  • Materials
  • Certification
  • Approvals
  • System Requirements
  • Watch a Demo

The Certified Information Systems Security Professional (CISSP) course is designed to ensure that someone handling computer security for a company or client has mastered a standardized body of knowledge. Certified Information Systems Security Professional (CISSP) has developed as the key certification for security professionals in government and industry. Corporations are seeking certified, experienced information security professionals to safeguard their information and assets. The CISSP® is considered the global standard that proves an individual's proficiency in several security disciplines. Security professionals consider the Certified Information Systems Security Professional (CISSP) to be the most desired certification to achieve.

 Prerequisite(s): None

 

By the end of this course, you will be able to:

  • Comprehend control systems and methodology
  • Identify security architecture and models
  • Recognize business continuity planning and disaster recovery planning
  • Recognize key aspects of security management and practices
  • Identify key concepts of telecommunications and networking security

Certified Information Systems Security Professional (CISSP) Module 1
Access Control

  • Identification and Authentication Techniques
  • Access Control Techniques
  • Authorization Mechanisms
  • Access Control Attacks and Monitoring Authentication
  • Risk Elements
  • Preventing Access Control Attacks
  • Smart Cards
  • Biometrics
  • Security Operations Principals
  • Role-Based Access Controls
  • Centralized versus Decentralized Access Control
  • Assessing Effectiveness of Access Controls

Certified Information Systems Security Professional (CISSP) Module 2
Network Security

  • Secure Network Architecture and Securing Network Components
  • OSI Model
  • Secure Network Components
  • Cabling, Wireless, Topography and Communications Technology
  • System and Security Management
  • Secure Communications and Network Attacks
  • Network and Protocol Security
  • Virtual Private Network
  • Firewall Terms and Types
  • Web Security
  • Common Attacks
  • Remote Access Security

Certified Information Systems Security Professional (CISSP) Module 3
Information Security Governance and Risk Management

  • Security Governance Concepts, Principles, and Policies
  • Layering
  • Data Hiding
  • Control Frameworks
  • Security Management
  • Risk Management
  • Terminology
  • Qualitative/Quantitative Risk Analysis
  • Manage Personnel Security
  • Security Education and Training
  • Information Classification
  • Employment Policies
  • Change Management

Certified Information Systems Security Professional (CISSP) Module 4
Software Development and Malicious Applications

  • Application Issues
  • Databases and Data Warehousing
  • Data Information Storage
  • Knowledge Based Systems
  • System Development and Controls
  • Malicious Code and Application Attacks
  • Password Attacks
  • Applications Beyond the Database
  • Web Application Security
  • IP Probes
  • IP Spoofing
  • Vulnerabilities

Certified Information Systems Security Professional (CISSP) Module 5
Cryptography

  • Cryptography and Symmetric Key Algorithms
  • PKI and Cryptographic Applications
  • Cryptography Basics
  • Cryptanalysis Terms
  • Symmetric Encryption
  • Asymmetric Cryptography
  • Modern Cryptography
  • Public Key Infrastructures
  • Hash Functions
  • Digital Signatures
  • Protocol Based
  • Pretty Good Privacy
  • Cracking Techniques

Certified Information Systems Security Professional (CISSP) Module 6
Security Architecture and Design

  • Principles of Security Models, Design, and Capabilities
  • Security Architecture Vulnerabilities, Threats, and Countermeasures
  • Security Operations
  • Fundamentals of Security
  • Clark-Wilson Model
  • Objects and Subjects
  • Computer Architecture
  • Singe Points of Failure
  • Information Security Architecture
  • Common Security Issues
  • Security Operations
  • Resource Protection
  • Change and Configuration Management

Certified Information Systems Security Professional (CISSP) Module 7
Incident Management, Business Continuity and Disaster Recovery

  • Manage Incident Response
  • Preventative Measures
  • System Resilience
  • Reasons for Business Continuity Plans
  • Business Continuity Life Cycle
  • Project Scope and Planning
  • Business Impact Assessment
  • BCP Documentation
  • Nature of Disaster
  • Recovery Strategies
  • Data Redundancy
  • System Backups
  • Testing and Maintenance

Certified Information Systems Security Professional (CISSP) Module 8
Legal Requirements, Incidents and Ethics

  • Categories of Law
  • Compliance
  • Contracting and Procurement
  • Code of Ethics
  • Computer Crimes
  • Import/Export
  • Privacy
  • Major Categories of Computer Crimes
  • Incident Handling
  • Liability
  • Response Teams
  • Accessibility and Perimeter Security
  • Natural Disasters
  • Work Area
  • Internal Security
  • Boundary Protection
  • Course Summary

**Outlines are subject to change, as courses and materials are updated.**

Ed4Online is committed to being both environmentally conscious and making it easier for you to study! We’re making your education mobile! All of our textbooks are now provided as eTextbooks. You can access them on your laptop, tablet, or mobile device and can study anytime, anywhere.

The move away from physical books to eTextbooks means you get the latest, most up-to-date version available. This also makes your training more accessible, so you can study anywhere you have your phone or tablet. The best part is that all materials are included in your training cost so there are NO extra fees for books!

Upon successful completion of this course, students will be prepared to sit for the ISC2 Certified Information Systems Security Professional (CISSP) certification exam.

**Certification exams are not included in the cost of the course.**

 International Association for Continuing Education and Training (IACET)

Ed4Online has been approved as an Accredited Provider by the International Association for Continuing Education and Training (IACET). In obtaining this accreditation, Ed4Online has demonstrated that it complies with the ANSI/IACET Standard which is recognized internationally as a standard of good practice. As a result of the Accredited Provider status, Ed4Online is authorized to offer IACET CEUs for courses and programs that qualify under the ANSI/IACET Standard.

The Continuing Education Unit (CEU) was created by IACET as a measurement of continuing education. One (1) IACET CEU is equal to ten (10) contact hours of participation in an organized continuing education experience under responsible sponsorship, capable direction, and qualified instruction. Under IACET's care, the IACET CEU has evolved from a quantitative measure to a hallmark of quality training and instruction. For more information on IACET, visit iacet.org.

Internet Connection

  • Broadband or High-Speed - DSL, Cable, and Wireless Connections

*Dial-Up internet connections will result in a diminished online experience. Classroom pages may load slowly and viewing large audio and video files may not be possible.

 

Hardware Requirements

  • Processor - 2GHz Processor or Higher
  • Memory - 1 GB RAM Minimum Recommended

While our courses are accessible through multiple mobile learning platforms, some courses may include a CD or DVD with the Textbook, so you may need access to a computer with CD-ROM or DVD Drive.

 

PC Software Requirements

  • Operating Systems - Windows 7 or higher
  • Microsoft Office 2007 or higher. Also, you could use a general Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
  • Internet Browsers - Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
  • Kindle Reader App is needed for many of our courses (No special equipment needed. This can be downloaded for FREE onto your computer.)
  • PowerPoint Viewer (if you do not have PowerPoint)
  • Adobe PDF Reader
  • QuickTime, Windows Media Player &/or Real Player

 

MAC Software Requirements

  • Operating Systems - Mac OS x 10 or higher with Windows
  • Mac office programs or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
  • Internet Browsers- Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
  • Kindle Reader App is needed for many of our courses (No special equipment needed. This can be downloaded for FREE onto your computer.)
  • PowerPoint Viewer (if you do not have PowerPoint)
  • Adobe PDF Reader
  • Apple QuickTime Media Player
  • Courses that include a CD-ROM or DVD may require an external drive and Parallels software to view.
School Location: