CISSP Certification Preparation

5 Day Course
Hands On
Code GK9840

This course has been superseded by the CISSP Certified Information Systems Security Professional course.

Modules

Hide all

Test-Taking Tips and Study Techniques (4 topics)

  • Preparation for the CISSP Exam
  • Submitting Required Paperwork
  • Resources and Study Aids
  • Passing the Exam the First Time

Operations Security (3 topics)

  • Change Control/Configuration Management
  • Dual Control, Separation of Duties, Rotation of Duties
  • Vulnerability Assessment and Pen-Testing

Access Control (8 topics)

  • AAA
  • Authentication Methods (Types 1, 2, & 3)
  • Authorization - DAC, RBAC, MAC
  • Accounting - Logging, Monitoring, Auditing
  • Central/Decentralized and Hybrid Management
  • Single Sign-on - Kerberos, Radius, Diameter, TACACS
  • Vulnerabilities - Emanations, Impersonation, Rouge Infrastructure,
  • Social Engineering

Cryptography (7 topics)

  • Intro - History
  • Symmetric
  • Asymmetric
  • Hashing
  • Cryptosystems - SSL, S/MIME, PGP
  • PKI
  • Cryptanalysis

Security Architecture and Design (7 topics)

  • Layering, Data Hiding and Abstraction
  • Processors
  • Memory - Segmentation/Rings, Types of Memory
  • Operating Systems
  • Models
  • Assurance - TCSEC, ITSEC, CC
  • Architecture Problems - Covert Channels + TOC/TOU, Object Reuse

Telecommunications and Network Security (10 topics)

  • OSI/DoD TCP/IP Models
  • TCP/UDP/ICMP/IP
  • Ethernet
  • Devices - Routers/Switches/Hubs
  • Firewalls
  • Wireless
  • WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cable
  • Voice - PBX/Cell Phones/VOIP
  • IPSec
  • Network Vulnerabilities

Application Security (7 topics)

  • SDLC
  • Change (Lifecycle) Management
  • Database Security
  • AI
  • OOD
  • Mobil Code
  • Malware

Disaster Recovery and Business Continuity (7 topics)

  • This course is part of the
  • following programs or tracks:
  • CISSP - Certified Information
  • Systems Security Professional
  • Security Management Expert
  • Also Available
  • Online IT Library

College Credits (8 topics)

  • Policy
  • Roles and Teams
  • BIA
  • Data Backups, Vaulting, Journaling, Shadowing
  • Alternate Sites
  • Emergency Response
  • Required Notifications
  • Tests

Legal, Regulations, Compliance, and Investigations (6 topics)

  • Ethics - Due Care/Due Diligence
  • Intellectual Property
  • Incident Response
  • Forensics
  • Evidence
  • Laws - HIPAA, GLB, SOX

Physical (Environmental) Security (9 topics)

  • CPTED
  • Facility Design
  • Fire Safety
  • Electrical Security
  • HVAC
  • Perimeter Security - Fences, Gates, Lighting
  • Physical Access Control - Transponders, Badges, Swipe Cards
  • Theft
  • Intrusion Detection - CCTV, Alarms, Guards, & Dogs

Information Security and Risk Management (9 topics)

  • CIA
  • Roles and Responsibilities - RACI
  • Asset Management
  • Taxonomy - Information Classification
  • Risk Management
  • SDLC (Security Development Lifecycle)
  • Certification and Accreditation
  • Policies, Procedures, Standards, Guidelines, Baselines
  • Knowledge Transfer - Awareness, Training, Education

Review and Q&A Session (1 topic)

  • Final Review and Test Prep

Prerequisites

Students should have a fundamental understanding of local area networks as well as the functions of the seven layers in the open interconnect (OSI) reference model s outlined in the course • Understanding Networking Fundamentals (GK3150)

Additional Learning

The courses below may help you meet the knowledge level required to take this course.

Course PDF

Print

Sections