Certified Information Systems Security Professional (CISSP)

40 Hours / Access Length: Schedule Varies / Delivery: Live Online, Instructor Led

Course Overview:

This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all 10 CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. The CISSP exam is intentionally difficult and should not be taken lightly. Even students with years of security experience should assume that they will have additional study time after class. Because the domains are so varied, it is unlikely that any one student will have experience in all 10 domains.

Course Objective: You will analyze a wide range of information systems security subjects that are organized into 10 domains for CISSP exam certification.

Additional CISSP certification requirements include a minimum of five years of direct professional work experience in one or more fields related to the 10 CBK security domains, or a college degree and four years of experience.

Upon successful completion of this course, students will be able to:
  • Analyze information systems access control.
  • Analyze security architecture and design.
  • Analyze network security systems and telecommunications.
  • Analyze information security management goals.
  • Analyze information security classification and program development.
  • Analyze risk management criteria and ethical codes of conduct.

Course Dates:  COMING!  

Course Time:  TBD

Prerequisites:  It is highly recommended that students have certifications in Network+ or Security+, or possess equivalent professional experience upon entering CISSP training. It will be beneficial if students have one or more of the following security-related or technology-related certifications or equivalent industry experience: MCSE, MCTS, MCITP, SCNP, CCNP, RHCE, LCE, CNE, SSCP®, GIAC, CISA™, or CISM®.

Course Outline:

Lesson 1: Information Systems Access Control
  • Topic 1A: Data Access Principles
  • Topic 1B: System Access and Authentication
  • Topic 1C: Attacks and Penetration Tests
Lesson 2: Security Architecture and Design
  • Topic 2A: Security Architecture Frameworks and Security Models
  • Topic 2B: Security Modes
  • Topic 2C: System Assurance
Lesson 3: Network and Telecommunications Security
  • Topic 3A: Data Network Design
  • Topic 3B: Remote Data Access
  • Topic 3C: Data Network Security
  • Topic 3D: Data Network Management
Lesson 4: Information Security Management Goals
  • Topic 4A: Organizational Security
  • Topic 4B: The Application of Security Concepts
Lesson 5: Information Security Classification and Program Development
  • Topic 5A: Information Classification
  • Topic 5B: Security Program Development
Lesson 6: Risk Management and Ethics
  • Topic 6A: Risk Management
  • Topic 6B: Ethics
Lesson 7: Software Development Security
  • Topic 7A: Software Configuration Management
  • Topic 7B: Software Controls
  • Topic 7C: Database System Security
Lesson 8: Cryptography
  • Topic 8A: Ciphers and Cryptography
  • Topic 8B: Symmetric-Key Cryptography
  • Topic 8C: Asymmetric-Key Cryptography
  • Topic 8D: Hashing and Message Digests
  • Topic 8E: Email, Internet, and Wireless Security
  • Topic 8F: Cryptographic Weaknesses
Lesson 9: Physical Security
  • Topic 9A: Physical Access Control
  • Topic 9B: Physical Access Monitoring
  • Topic 9C: Physical Security Methods
  • Topic 9D: Facilities Security
Lesson 10: Operations Security
  • Topic 10A: Operations Security Control
  • Topic 10B: Operations Security Auditing and Monitoring
  • Topic 10C: Operational Threats and Violations
Lesson 11: Business Continuity and Disaster Recovery Planning
  • Topic 11A: Business Continuity Plan Fundamentals
  • Topic 11B: Business Continuity Plan Implementation
  • Topic 11C: Disaster Recovery Plan Fundamentals
  • Topic 11D: Disaster Recovery Plan Implementation
Lesson 12: Legal, Regulations, Compliance, and Investigations
  • Topic 12A: Computer Crime Laws and Regulations
  • Topic 12B: Computer Crime Incident Response
Appendix A: Mapping CISSP® Course Content to the (ISC)² CISSP Exam Objectives
System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended for the best experience.
Hardware Requirements:
  • CPU: 1 GHz or higher
  • RAM: 2 GB or higher
  • Resolution: 1280 x 720 or higher
  • Speakers / Headphones
  • Microphone (Webinar / Live Online sessions)
Operating System Requirements:
  • Microsoft Windows 7 or 10 (Home, Pro)
  • Mac OSX 10 or higher.
  • Latest Chrome OS
  • Latest Linux Distributions

NOTE: While we understand that our courses can be viewed on Android and iPhone devices, we do not recommend the use of these devices for our courses. The size of these devices do not provide a good learning environment for students taking online or live online based courses.

Web Browser Requirements:
  • Latest Google Chrome is recommended for the best experience.
  • Latest Mozilla FireFox
  • Latest Microsoft Edge
  • Latest Apple Safari
Basic Software Requirements (These are recommendations of software to use):
  • Office suite software (Microsoft Office, OpenOffice, or LibreOffice)
  • PDF reader program (Adobe Reader, FoxIt)
  • Courses may require other software that is denoted in the above course outline.

** The course outlines displayed on this website are subject to change at any time without prior notice. **