Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP)

Category: 
Course Hours: 
180
Price: 
$900.00
Course Type: 
Mentor Supported
You may also like: 
  • Description
  • Objectives
  • Outline
  • Materials
  • Certification
  • Approvals
  • System Requirements
  • Watch a Demo

The Certified Information Systems Security Professional (CISSP) course is designed to ensure that someone handling computer security for a company or client has mastered a standardized body of knowledge. Certified Information Systems Security Professional (CISSP) has developed as the key certification for security professionals in government and industry. Corporations are seeking certified, experienced information security professionals to safeguard their information and assets. The CISSP® is considered the global standard that proves an individual's proficiency in several security disciplines. Security professionals consider the Certified Information Systems Security Professional (CISSP) to be the most desired certification to achieve.

 Prerequisite(s): None

 

By the end of this course, you will be able to:

  • Recall the steps for protecting assets and ensuring proper security measures
  • Identify risk management concepts, security engineering and how to protect against threats
  • Recognize business continuity planning and disaster recovery planning
  • List key aspects of security management and practices
  • Identify key concepts of telecommunications and networking security

Certified Information Systems Security Professional (CISSP) Module 1
Security and Risk Management 

  • Confidentiality, Integrity and Availability
  • Security Governance
  • Compliance
  • Global Legal and Regulatory Issues
  • Security Policies
  • Business Continuity Requirements
  • Manage Personnel Security
  • Risk Management Concepts
  • Threat Modeling
  • Security Awareness

Certified Information Systems Security Professional (CISSP) Module 2
Asset Security

  • Asset Security Concepts
  • Identify and Classify Information and Assets
  • Information and Asset Ownership
  • Protect Privacy
  • Data Security Controls
  • Handling Requirements

Certified Information Systems Security Professional (CISSP) Module 3
Security Architecture and Engineering

  • Fundamental Concepts of Security Models
  • Information Systems Security Evaluation Models
  • Vulnerabilities of Security Architecture
  • Vulnerabilities in Web-Based Systems
  • Vulnerabilities in Mobile Systems
  • Vulnerabilities in Embedded Devices
  • Apply Cryptography
  • Site and Facility Design
  • Site and Facility Security Controls

Certified Information Systems Security Professional (CISSP) Module 4
Communications and Network Security 

  • Secure Design Principles in Network Architectures
  • Secure Network Components
  • Implement Secure Communication Channels According to Design

Certified Information Systems Security Professional (CISSP) Module 5
Identity and Access Management 

  • Physical and Logical Access to Assets
  • Identification and Authentication of People and Devices
  • Integrate Third-Party Identity Services
  • Implement and Management Authorization Mechanisms
  • Identity and Access Provisioning Lifecycle

Certified Information Systems Security Professional (CISSP) Module 6

Security Assessment and Testing

  • Assessment and Test Strategies
  • Conduct Security Control Testing
  • Collect Security Process Data
  • Analyze Test Output and Generate Report
  • Conduct or Facilitate Security Audits

Certified Information Systems Security Professional (CISSP) Module 7
Security Operations

  • Investigations
  • Logging and Monitoring Activities
  • Securely Provision Resources
  • Incident Management
  • Detective and Preventative Measures
  • Vulnerability Management
  • Change Management
  • Recovery Strategies
  • Disaster Recovery Plans

Certified Information Systems Security Professional (CISSP) Module 8
Software Development Security 

  • Software Development Security Online
  • Environment and Security Controls 
  • Effectiveness of Software Security 
  • Impact of Acquired Software 
  • Secure Coding Standards and Guidelines

**Outlines are subject to change, as courses and materials are updated.**

Ed4Career is committed to being both environmentally conscious and making it easier for you to study! We’re making your education mobile! All of our textbooks are now provided as eTextbooks. You can access them on your laptop, tablet, or mobile device and can study anytime, anywhere.

The move away from physical books to eTextbooks means you get the latest, most up-to-date version available. This also makes your training more accessible, so you can study anywhere you have your phone or tablet. The best part is that all materials are included in your training cost so there are NO extra fees for books!

Upon successful completion of this course, students will be prepared to sit for the ISC2 Certified Information Systems Security Professional (CISSP) certification exam.

**Certification exams are not included in the cost of the course.**

 International Association for Continuing Education and Training (IACET)

Ed4Career has been approved as an Accredited Provider by the International Association for Continuing Education and Training (IACET). In obtaining this accreditation, Ed4Career has demonstrated that it complies with the ANSI/IACET Standard which is recognized internationally as a standard of good practice. As a result of the Accredited Provider status, Ed4Career is authorized to offer IACET CEUs for courses and programs that qualify under the ANSI/IACET Standard.

The Continuing Education Unit (CEU) was created by IACET as a measurement of continuing education. One (1) IACET CEU is equal to ten (10) contact hours of participation in an organized continuing education experience under responsible sponsorship, capable direction, and qualified instruction. Under IACET's care, the IACET CEU has evolved from a quantitative measure to a hallmark of quality training and instruction. For more information on IACET, visit iacet.org.

Internet Connection

  • Broadband or High-Speed - DSL, Cable, and Wireless Connections

*Dial-Up internet connections will result in a diminished online experience. Classroom pages may load slowly and viewing large audio and video files may not be possible.

Hardware Requirements

  • Processor - 2GHz Processor or Higher
  • Memory - 1 GB RAM Minimum Recommended

 

PC Software Requirements

  • Operating Systems - Windows 7 or higher
  • Microsoft Office 2013 or higher. Also, you could use a general Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
  • Internet Browsers - Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
  • The Kindle Reader App or VitalSource Bookshelf App are needed for many of our courses (No special equipment needed. This can be downloaded for FREE onto your computer.)
  • PowerPoint Viewer (if you do not have PowerPoint)
  • Adobe PDF Reader
  • QuickTime, Windows Media Player &/or Real Player

 

MAC Software Requirements

  • Operating Systems - Mac OS x 10 or higher with Windows
  • Mac office programs or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
  • Internet Browsers- Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
  • The Kindle Reader App or VitalSource Bookshelf App are needed for many of our courses (No special equipment needed. This can be downloaded for FREE onto your computer.)
  • PowerPoint Viewer (if you do not have PowerPoint)
  • Adobe PDF Reader
  • Apple QuickTime Media Player