CISSP – Certified Information System Security Professional Course Overview

The Certified Information System Security Professional (CISSP) training courses program addresses the essential elements of the 10 domains that comprise a Common Body of Knowledge. It offers a job-related approach to the security process, and provides basic skills required to prepare for CISSP certification and to pass the CISSP exam. It is the perfect option for those seeking to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.

Apply Today

Instructor Led Learning

Duration: 5 Days
Registration Open Now!

Video Learning

Duration: 5 Days
Registration Open Now!

What you will learn

  • Module 1:Security Governance Through Principles and Policies
  • Module 2:Personnel Security and Risk Management Concepts
  • Module 3:Business Continuity Planning
  • Module 5:Laws, Regulations, and Compliance
  • Module 5:Protecting Security of Assets
  • Module 6:Cryptography and Symmetric Key Algorithms
  • Module 7:PKI and Cryptographic Applications
  • Module 8:Principles of Security Models, Design, and Capabilities
  • Module 9:Security Vulnerabilities, Threats, and Countermeasures
  • Module 10:Physical Security Requirements
  • Module 11:Secure Network Architecture and Securing Network Components
  • Module 12:Secure Communications and Network Attacks
  • Module 13:Managing Identity and Authentication
  • Module 14:Controlling and Monitoring Access
  • Module 15:Security Assessment and Testing
  • Module 16:Managing Security Operations
  • Module 17:Preventing and Responding to Incidents
  • Module 18:Disaster Recovery Planning
  • Module 19:Incidents and Ethics
  • Module 20:Software Development Security
  • Module 21:Malicious Code and Application Attacks

Basic computer skills

Computers made easy course

Windows 10 course

Introduction to Microsoft Office course

FULL COURSE OUTLINE

Module 1: Security Governance Through Principles and Policies

  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
  • Apply Security Governance Principles
  • Develop and Implement Documented Security Policy, Standards,Procedures, and Guidelines
  • Understand and Apply Threat Modelling
  • Integrate Security Risk Considerations into Acquisition Strategy and Practice

Module 2: Personnel Security and Risk Management Concepts

  • Contribute to Personnel Security Policies
  • Security Governance
  • Understand and Apply Risk Management Concepts
  • Establish and Manage Information Security Education, Training, and Awareness
  • Manage the Security Function

Module 3: Business Continuity Planning

  • Project Scope and Planning
  • Business Impact Assessment
  • Continuity Planning
  • BCP Documentation

Module 5: Laws, Regulations, and Compliance

  • Categories of Laws
  • Laws
  • Compliance
  • Contracting and Procurement

Module 5: Protecting Security of Assets

  • Classifying and Labeling Assets
  • Identifying Data Roles
  • Protecting Privacy

Module 6: Cryptography and Symmetric Key Algorithms

  • Historical Milestones in Cryptographys
  • Cryptographic Basics
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Life Cycle

Module 7: PKI and Cryptographic Applications

  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Applied Cryptography
  • Cryptographic Attacks

Module 8: Principles of Security Models, Design, and Capabilities

  • Implement and Manage Engineering Processes Using Secure Design Principles
  • Understand the Fundamental Concepts of Security Models
  • Select Controls and Countermeasures Based on Systems Security Evaluation Models
  • Understand Security Capabilities of Information Systems

Module 9: Security Vulnerabilities, Threats, and Countermeasures

  • Assess and Mitigate Security Vulnerabilities
  • Client-Based
  • Server-Based
  • Database Security
  • Distributed Systems
  • Industrial Control Systems
  • Assess and Mitigate Vulnerabilities in Web-Based Systems
  • Assess and Mitigate Vulnerabilities in Mobile Systems
  • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Essential Security Protection Mechanisms
  • Common Architecture Flaws and Security Issues

Module 10: Physical Security Requirements

  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
  • Apply Security Governance Principles
  • Develop and Implement Documented Security Policy, Standards,Procedures, and Guidelines
  • Understand and Apply Threat Modelling
  • Integrate Security Risk Considerations into Acquisition Strategy and Practice

Module 11: Secure Network Architecture and Securing Network Components

  • OSI Model
  • TCP/IP Model
  • Converged Protocols
  • Wireless Networks
  • General Wi-Fi Security Procedure
  • Cabling, Wireless, Topology, and Communications Technology

Module 12: Secure Communications and Network Attacks

  • Network and Protocol Security Mechanisms
  • Secure Voice Communications
  • Multimedia Collaboration
  • Manage Email Security
  • Remote Access Security Management
  • Virtual Private Network
  • Virtualization
  • Network Address Translation
  • Switching Technologies
  • WAN Technologies
  • Miscellaneous Security Control Characteristics
  • Security Boundaries
  • Prevent or Mitigate Network Attack

Module 13: Managing Identity and Authentication

  • Controlling Access to Assets
  • Comparing Identification and Authentication
  • Implementing Identity Management
  • Managing the Identity and Access Provisioning Life Cycle

Module 14: Controlling and Monitoring Access

  • Comparing Access Control Models
  • Understanding Access Control Attacks

Module 15: Security Assessment and Testing

  • Building a Security Assessment and Testing Program
  • Performing Vulnerability Assessments
  • Testing Your Software
  • Implementing Security Management Processes

Module 16: Managing Security Operations

  • Applying Security Operations Concepts
  • Provisioning and Managing Resources
  • Managing Configuration
  • Managing Change
  • Managing Patches and Reducing Vulnerabilities

Module 17: Preventing and Responding to Incidents

  • Managing Incident Response
  • Implementing Preventive Measures
  • Logging, Monitoring, and Auditing

Module 18: Disaster Recovery Planning

  • The Nature of Disaster
  • Understand System Resilience and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance

Module 19: Incidents and Ethics

  • Investigations
  • Major Categories of Computer Crime
  • Incident Handling

Module 20: Software Development Security

  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehousing
  • Storing Data and Information
  • Understanding Knowledge-Based Systems

Module 21: Malicious Code and Application Attacks

  • Malicious Code
  • Password Attacks
  • Application Attacks
  • Web Application Security
  • Reconnaissance Attacks
  • Masquerading Attacks

Join Over 10,000 Students that have studied with MasterGrade IT Now

Become Part of MasterGrade IT to Further Your Career.