Questions? Feedback? powered by Olark live chat software
Passionate about Learning
HOME      Live Chat        My NetCom Free Catalog 1-888-563-8266
Home > Vendors > CAP/CISSP > CISSP > CISSP: Certified Information Systems Security Professional

CISSP: Certified Information Systems Security Professional Training Courses

About CISSP: Certified Information Systems Security Professional

CISSP has emerged as the key certification for security professionals. In fact, an informal survey of information security jobs on a major employment web site revealed that over 70% of the positions required CISSP certification. Corporations are demanding experienced information security professionals -- with the certifications to prove it -- to protect their information and assets.

CISSP exams are primarily made up of the 10 essential domains:

  1. Information security and risk management
  2. Access control
  3. Security architecture and design
  4. Physical and environmental security
  5. Telecommunications and network security
  6. Cryptography
  7. Business continuity and disaster recovery planning
  8. Legal regulations, compliance, and investigations
  9. Application security
  10. Operations security

CISSP: Certified Information Systems Security Professional
CISSP Certification 40 hours Schedule

view course outline

  • Access Control
    • Concepts, terms of subjects and objects, implementation of authentication techniques
  • Application Security
    • Security and controls of the systems development process, life cycle, application controls, change controls, data warehousing, data mining, knowledge-based systems, program interfaces, and concepts used to ensure data and application integrity, security, and availability
  • Business Continuity and Disaster Recovery Planning
    • Preservation of the business in the face of major disruptions to normal business operations
  • Cryptography
    • Business and security requirements for cryptography, principles of certificates and key management, secure protocols
  • Information Security and Risk Management
    • Identification of an organization's information assets and the development, documentation, and implementation of policies, standards, procedures and guidelines that ensure confidentiality, integrity, and availability
  • Legal, Regulations, Compliance and Investigations
    • Computer crime laws and regulations, the investigative measures and techniques which can be used to determine if a crime has been committed, methods to gather evidence if it has, as well as the ethical issues and code of conduct for the security professional
  • Operations Security
    • Identify the controls over hardware, media, and the operators with access privileges to any of these resources
  • Physical (Environmental) Security
    • Threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise's resources and sensitive information
  • Security Architecture and Design
    • Concepts, principles, structures, and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability
  • Telecommunications and Network Security
    • Structures, transmission methods, transport formats, and security measures used to provide integrity, availability, authentication, and confidentiality for transmissions over private and public communications networks and media
Close »

Trademark Notice

CISSP and (ISC)2 are registered marks of the International Information Systems Security Certification Consortium, Inc. CISSP All-in-One Exam Guide and the material presented are not affiliated with or endorsed by (ISC)2
Duration: 5 days (40 hours)
.  Next Class Dates
Jan 5, 2015–Jan 9, 2015
8:00am – 4:00pm PST
Jan 19, 2015–Jan 23, 2015
9:00am – 5:00pm EST
Feb 2, 2015–Feb 6, 2015
9:00am – 5:00pm EST

For a customized version of this class, please contact us or call 1-888-563-8266.
.  Get More Information
Help us filter out spammers:

Change text if hard to read
Enter code above:
. .
Live ChatLive Help! Click to start chat.
© 1998-2014, NetCom Learning. All Rights Reserved.