CISSP Certification Preparation

5 Day Course
Hands On
Code GK9840

Book Now - 2 Delivery Methods Available:

Scheduled Online Onsite

Overview

If you are ready to take your security career to the next level, our Certified Information Systems Security Professional (CISSP) exam preparation course will help get you there. Get instruction from our experts with real-world experience as you cover all the material you need to be fully prepared for the (ISC)2 CISSP exam.

IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers, and other security professionals whose positions require CISSP certification.

At the end of this course delegates will be able to:

In-depth coverage of the ten domains required to pass the CISSP exam:

  • Operations Security
  • Information Security and Risk Management
  • Physical (Environmental) SecurityCryptography
  • Access Control
  • Security Architecture and Design
  • Telecommunications and Network Security
  • Business Continuity and Disaster Recovery Planning
  • Application SecurityLegal, Regulations, Compliance, and Investigations

Certification:

  • Students attending this course may wish to further expand their knowledge in specific areas by attending Wireless Networking or Network Security Courses.

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.

Modules

Hide all

Test-Taking Tips and Study Techniques (4 topics)

  • Preparation for the CISSP Exam
  • Submitting Required Paperwork
  • Resources and Study Aids
  • Passing the Exam the First Time

Operations Security (3 topics)

  • Change Control/Configuration Management
  • Dual Control, Separation of Duties, Rotation of Duties
  • Vulnerability Assessment and Pen-Testing

Access Control (8 topics)

  • AAA
  • Authentication Methods (Types 1, 2, & 3)
  • Authorization - DAC, RBAC, MAC
  • Accounting - Logging, Monitoring, Auditing
  • Central/Decentralized and Hybrid Management
  • Single Sign-on - Kerberos, Radius, Diameter, TACACS
  • Vulnerabilities - Emanations, Impersonation, Rouge Infrastructure,
  • Social Engineering

Cryptography (7 topics)

  • Intro - History
  • Symmetric
  • Asymmetric
  • Hashing
  • Cryptosystems - SSL, S/MIME, PGP
  • PKI
  • Cryptanalysis

Security Architecture and Design (7 topics)

  • Layering, Data Hiding and Abstraction
  • Processors
  • Memory - Segmentation/Rings, Types of Memory
  • Operating Systems
  • Models
  • Assurance - TCSEC, ITSEC, CC
  • Architecture Problems - Covert Channels + TOC/TOU, Object Reuse

Telecommunications and Network Security (10 topics)

  • OSI/DoD TCP/IP Models
  • TCP/UDP/ICMP/IP
  • Ethernet
  • Devices - Routers/Switches/Hubs
  • Firewalls
  • Wireless
  • WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cable
  • Voice - PBX/Cell Phones/VOIP
  • IPSec
  • Network Vulnerabilities

Application Security (7 topics)

  • SDLC
  • Change (Lifecycle) Management
  • Database Security
  • AI
  • OOD
  • Mobil Code
  • Malware

Disaster Recovery and Business Continuity (7 topics)

  • This course is part of the
  • following programs or tracks:
  • CISSP - Certified Information
  • Systems Security Professional
  • Security Management Expert
  • Also Available
  • Online IT Library

College Credits (8 topics)

  • Policy
  • Roles and Teams
  • BIA
  • Data Backups, Vaulting, Journaling, Shadowing
  • Alternate Sites
  • Emergency Response
  • Required Notifications
  • Tests

Legal, Regulations, Compliance, and Investigations (6 topics)

  • Ethics - Due Care/Due Diligence
  • Intellectual Property
  • Incident Response
  • Forensics
  • Evidence
  • Laws - HIPAA, GLB, SOX

Physical (Environmental) Security (9 topics)

  • CPTED
  • Facility Design
  • Fire Safety
  • Electrical Security
  • HVAC
  • Perimeter Security - Fences, Gates, Lighting
  • Physical Access Control - Transponders, Badges, Swipe Cards
  • Theft
  • Intrusion Detection - CCTV, Alarms, Guards, & Dogs

Information Security and Risk Management (9 topics)

  • CIA
  • Roles and Responsibilities - RACI
  • Asset Management
  • Taxonomy - Information Classification
  • Risk Management
  • SDLC (Security Development Lifecycle)
  • Certification and Accreditation
  • Policies, Procedures, Standards, Guidelines, Baselines
  • Knowledge Transfer - Awareness, Training, Education

Review and Q&A Session (1 topic)

  • Final Review and Test Prep

Prerequisites

Students should have a fundamental understanding of local area networks as well as the functions of the seven layers in the open interconnect (OSI) reference model s outlined in the course • Understanding Networking Fundamentals (GK3150)

Additional Learning

The courses below may help you meet the knowledge level required to take this course. If you are unsure please ask a training advisor .

Scheduled Dates

Please select from the dates below to make an enquiry or booking.

Pricing

Different pricing structures are available including special offers. These include early bird, late availability, multi-place, corporate volume and self-funding rates. Please arrange a discussion with a training advisor to discover your most cost effective option.

Code Location Duration Price Feb Mar Apr May Jun Jul
GK9840 5 Days $2,520
05-09
GK9840 5 Days $2,520

or call:408-759-5074

Course PDF

Print

Share this Course

+1
Share

Recommend this Course

Sections