a
  COMPUTER
INSTITUTE

CISSP Security Professional Online Training Course


This online course helps a learner prepare to take and pass the Certified Information Systems Security Professional (CISSP) exam. This online course, like the exam, covers ten domains of information system security knowledge including access control systems and methodology, network and telecommunications security, security management and practices, applications and systems development security, cryptography, security and architecture models, operations security, business continuity and disaster recovery planning, law, investigation, and ethics, as well as physical security.
Why should you become Certified?
People are the key to a secure organization.
Technological solutions alone cannot protect an organization's critical information assets. Employers demanding qualified information security staff give their organizations a leading edge by providing the highest standard of security for their customers', employees', stakeholders' and organizational information assets. (ISC)˛, the only not-for-profit body charged with maintaining, administering and certifying information security professionals via the compendium of industry best practices, the (ISC)˛ CBK®, is the premier resource for information security professionals worldwide.

Benefits of the CISSP for Professionals

  •  Demonstrates a working knowledge of information security  
  •  Confirms commitment to profession 
  •  Offers a career differentiator, with enhanced credibility and marketability 
  •  Affords you exclusive benefits as an (ISC)˛ member, including valuable resources such as peer networking and idea exchange 
  •  Indicates that certified information security professionals earn a worldwide average of 25% more than their non-certified counterparts, according to the Global Information Security Workforce Study 
  •  Fulfills government and organization requirements for information security certification mandates

 

What are the Prerequisites for CISSP?

Candidates for the CISSP must meet several requirements:

  • Possess a minimum of five years of direct full-time security work experience in two or more of the ten (ISC)˛ information security domains (CBK). One year may be waived for having either a four-year college degree, a Master's degree in Information Security, or for possessing one of a number of other certifications from other organizations. A candidate not possessing the necessary five years of experience may earn the Associate of (ISC)˛ designation by passing the required CISSP examination. The Associate of (ISC)˛ for CISSP designation is valid for a maximum of six years from the date (ISC)˛ notifies the candidate of having passed the exam. During those six years a candidate will need to obtain the required experience and submit the required endorsement form for certification as a CISSP. Upon completion of the professional experience requirements the certification will be converted to CISSP status.
  • Attest to the truth of their assertions regarding professional experience and accept the CISSP Code of Ethics.
  • Answer four questions regarding criminal history and related background.
  • Have their qualifications endorsed by another CISSP in good standing. The endorser attests that the candidate's assertions regarding professional experience are true to the best of their knowledge, and that the candidate is in good standing within the information security industry.

If you’re working on building your experience right now, you may earn the Associate of (ISC)˛ designation by passing the required CISSP examination.

For more information, please visit https://www.isc2.org/cissp/default.aspx


CISSP  Exam Requirements: Pass the CISSP exam with a scaled score of 700 points or greater out of 1000 possible points. The exam is multiple choice, consisting of 250 questions with four options each, to be answered over a period of six hours. 25 of the questions are experimental questions which are not graded..

Course Tutorials Include:

Time: 2 hour(s)

CISSP Security Professional: 1 Access Control Systems and Methodology

Description

This course covers Domain 1 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about the mechanisms you can use to exercise either a directing or restraining influence over the behavior, use, and content of a system.

Objectives

  • Discuss the relationship between access control and accountability
  • Define common access control techniques and models
  • Detail the specifics of access control administration
  • Explain identification and authentication techniques
  • Discuss centralized/decentralized control
  • Explain intrusion detection and common methods of attack

CISSP Security Professional: 2 Telecommunications and Network Security

Description

This course covers Domain 2 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about the structures, transmissions methods, transport formats, and security measures used to provide integrity, availability, authentication, and confidentiality for transmissions over private and public communications networks and media.

Objectives

  • Explain the International Standards Organization/Open Systems Interconnection
  • (ISO/OSI) layers and characteristics
  • Describe the design and function of communications and network security
  • Describe the components, protocols and services involved in Internet/intranet/extranet design
  • Define and describe communications security techniques to prevent, detect, and correct errors so that integrity, availability, and confidentiality of transactions over networks may be maintained
  • Define and describe specific areas of communication and how they can be secured
  • Explain current forms of network attacks and their countermeasures

CISSP Security Professional: 3 Security Management and Practices

Description

This course covers Domain 3 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about identifying an organization's information assets, as well as the development, documentation, and implementation of appropriate policies, standards, procedures, and guidelines. It also covers how data classification, risk assessment, and risk analysis are used to identify the threats, classify assets, and to rate their vulnerabilities so that effective security controls can be implemented.

Objectives

  • Understand the principles of security management
  • Understand risk management and how to use risk analysis to make information security management decisions
  • Set information security roles and responsibilities throughout your organization
  • Understand the considerations and criteria for classifying data
  • Determine how employment policies and practices are used to enhance information security in your organization
  • Use change control to maintain security

Time: 3 hour(s)

CISSP Security Professional: 4 Applications and Systems Development Security

Description

This course covers Domain 4 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about the security controls that are included within systems and applications software and the steps used in their development in both distributed and centralized environments.

Objectives

  • Demonstrate an understanding of challenges in both distributed and nondistributed environments
  • Discuss databases and data warehousing issues
  • Describe knowledge-based systems and examples of edge computing
  • Discuss the types of attacks made on software vulnerabilities
  • Describe and define malicious code
  • Discuss system development controls

Time: 2 hour(s)

CISSP Security Professional: 5 Cryptography, Security Architecture, and Security Models

Description

This course covers Domains 5 and 6 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about the principles, means, and methods of disguising information to ensure its integrity, confidentiality, and authenticity. It also covers concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, and applications.

Objectives

  • Compare and contrast symmetric and asymmetric algorithms
  • Describe PKI and key management
  • Detail common methods of attacking encryption, including general and specific attacks
  • List common security models and their function
  • Explain the basics of security architecture
  • Describe the Internet Protocol Security (IPSec) standard

Time: 2 hour(s)

CISSP Security Professional: 6 Operations Security

Description

This course covers Domain 7 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about identifying the hardware and media controls, as well as the operators with access privileges to any of these resources. It also covers auditing and monitoring techniques that permit the identification of security events and their sources.

Objectives

  • Identify the key roles of operations security
  • Define threats and countermeasures
  • Explain how audit and monitoring can be used as operations security tools
  • Define the role of Administrative management in operations security
  • Define operations security concepts and describe operations security best practices

Time: 2 hour(s)

CISSP Security Professional: 7 Business Continuity and Disaster Recovery Planning

Description

This course covers Domain 8 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about preservation in the face of major disruptions to normal business operations. It covers both the preparation and testing of specific actions to protect critical business processes from the effect of major system and network failures.

Objectives

  • Document the natural and man-made events that need to be considered in making disaster recovery and business continuity plans
  • Explain the difference between disaster recovery planning (DRP) and business continuity planning (BCP) and the importance of developing plans that include both
  • Detail the business continuity planning process
  • Explain the need for, and development of, a backup strategy. Include information on determining what to back up, how often to back up, as well as the proper storage facility for backups
  • Detail the disaster recovery planning process, including recovery plan development, implementation, maintenance, and the restoration of business functions

Time: 3 hour(s)

CISSP Security Professional: 8 Law, Investigation, Ethics, and Physical Security

Description

This course covers Domains 9 and 10 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about computer crime laws and regulations, as well as the investigative measures and techniques which can be used to determine if a crime has been committed. It also covers the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise's resources and sensitive information.

Objectives

  • Define what constitutes a computer crime and how such a crime is proven in court
  • Explain the laws of evidence
  • Discuss computer ethics
  • Understand general principles that apply to the theft of information and assets
  • Know the general criteria that apply to the location and construction of facilities
  • Describe physical intrusion detection methodologies and products

Time: 5 hour(s)

CISSP Security Professional: 9 Practice Exams

Description

This course provides five practice exams for the Certified Information Systems Security Professional (CISSP) exam.

Objectives

  • Practice for the Certified Information Systems Security Professional (CISSP) exam
 
Copyright Computer Institute
Last Updated: Monday, July 24, 2017
A+ Certification, Network+ Certification, Security+ Certification, Cisco Certification, CCNA Certification, CCNP Certification, Oracle OCA DBA Developer Certifications, Unix, Linux, CISSP, PHP MYSQL, VMware, MCSA, MCSE, Microsft Certification, MCITP, Microsoft Certified Solutions Associate, Microsoft Certified Solutions Expert, Project Management Certification, HTML5, JavaScript, Java Programming, Java Certification, CompTIA training, Online Training, Online Courses, E-commerce, Distance Learning, Hands-on Training, Testing Center,Computer Classes, Training in Alabama AL, Training in Montana MT, Training in Alaska AK, Training in Nebraska NE, Training in Arizona AZ, Training in Nevada NV, Training in Arkansas AR, Training in New Hampshire NH, Training in California CA, Training in New Jersey NJ, Training in Colorado CO, Training in New Mexico NM, Training in Connecticut CT, Training in New York NY, Training in District of Columbia DC, Training in Delaware DE, Training in North Carolina NC, Training in Florida FL, Training in North Dakota ND, Training in Georgia GA, Training in Ohio OH, Training in Hawaii HI, Training in Oklahoma OK, Training in Idaho ID, Training in Oregon OR, Training in Illinois IL, Training in Pennsylvania PA, Training in Indiana IN, Training in Rhode Island RI, Training in Iowa IA, Training in South Carolina SC, Training in Kansas KS, Training in South Dakota SD, Training in Kentucky KY, Training in Tennessee TN, Computer Training, IT Training