Questions? Feedback? powered by Olark live chat software

CISSP: Certified Information Systems Security Professional Training Courses

About the CISSP: Certified Information Systems Security Professional

Duration: 5 days (40 hours)

CISSP has emerged as the key certification for security professionals. In fact, an informal survey of information security jobs on a major employment web site revealed that over 70% of the positions required CISSP certification. Corporations are demanding experienced information security professionals -- with the certifications to prove it -- to protect their information and assets.


CISSP exams are primarily made up of the 10 essential domains:

  1. Information security and risk management
  2. Access control
  3. Security architecture and design
  4. Physical and environmental security
  5. Telecommunications and network security
  6. Cryptography
  7. Business continuity and disaster recovery planning
  8. Legal regulations, compliance, and investigations
  9. Application security
  10. Operations security

Next Class Dates

Jan 5, 2015–Jan 9, 2015
 
8:00am – 4:00pm PST
 
 

Jan 19, 2015–Jan 23, 2015
 
9:00am – 5:00pm EST
 
 

Feb 2, 2015–Feb 6, 2015
 
9:00am – 5:00pm EST
 
 

View More Schedules »

For a customized version of this class, please contact us or call 1-888-563-8266.

Back to Top

This training consists of the following courses:

Why take a combo course?
In one word, savings! You save an average of 15-20% off the individual courses if taken separately.

CISSP Certification   More on this course

5 days | 40 hours

arrow Course Objectives

  • » Competently identify and handle security threats
  • » Gain credentials as a leading security professional for current and future employment
  • » Thoroughly understand the 10 essential core domains of the common body of knowledge

Back to Top

arrow Course Outline

  • Access Control
    1. Concepts, terms of subjects and objects, implementation of authentication techniques
  • Application Security
    1. Security and controls of the systems development process, life cycle, application controls, change controls, data warehousing, data mining, knowledge-based systems, program interfaces, and concepts used to ensure data and application integrity, security, and availability
  • Business Continuity and Disaster Recovery Planning
    1. Preservation of the business in the face of major disruptions to normal business operations
  • Cryptography
    1. Business and security requirements for cryptography, principles of certificates and key management, secure protocols
  • Information Security and Risk Management
    1. Identification of an organization's information assets and the development, documentation, and implementation of policies, standards, procedures and guidelines that ensure confidentiality, integrity, and availability
  • Legal, Regulations, Compliance and Investigations
    1. Computer crime laws and regulations, the investigative measures and techniques which can be used to determine if a crime has been committed, methods to gather evidence if it has, as well as the ethical issues and code of conduct for the security professional
  • Operations Security
    1. Identify the controls over hardware, media, and the operators with access privileges to any of these resources
  • Physical (Environmental) Security
    1. Threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise's resources and sensitive information
  • Security Architecture and Design
    1. Concepts, principles, structures, and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability
  • Telecommunications and Network Security
    1. Structures, transmission methods, transport formats, and security measures used to provide integrity, availability, authentication, and confidentiality for transmissions over private and public communications networks and media

Back to Top

This training prepares students for the following exam(s):

  • » CISSP Examination: Certified Information Systems Security Professional

Back to Top

Recent Client Testimonials & Reviews

Aug 06 2014
Class format, content and instructor was very knowledgeable.

-Robert A.
Course(s) Taken

» CISSP: Certified Information Systems Security Professional

Aug 06 2014
Great instructors that teach you how to think and not just pass a test.

-Richard W.
Course(s) Taken

» CISSP: Certified Information Systems Security Professional

Aug 06 2014
The instructor was good and the facility is convenient for me.

-Per L.
Course(s) Taken

» Free Webinar: Wonderful World of Botnets

  More testimonials »  

Back to Top

Ways to contact us

Website Live Chat

Call us toll-free at 1-888-563-8266

FREE Training Inquiry form

Contact us via Email: info@netcomlearning.com

Back to Top

Trademark Notice

CISSP and (ISC)2 are registered marks of the International Information Systems Security Certification Consortium, Inc. CISSP All-in-One Exam Guide and the material presented are not affiliated with or endorsed by (ISC)2

Back to Top