ISC2 - CISSP
 
 

CISSP: Certified Information
Systems Security Professional


  
Certify I.T Training's CISSP: Certified Information Systems Security Professional Certification certification training package covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the ten domains of information system security knowledge.

The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². (ISC)² promotes the CISSP exam as an aid to evaluating personnel performing information security functions. Candidates for this exam are typically network security professionals and system administrators with at least four years of direct work experience in two or more of the ten test domains.

As the first ANSI ISO accredited credential in the field of information security, the Certified Information Systems Security Professional (CISSP) certification provides information security professionals with not only an objective measure of competence, but a globally recognized standard of achievement.

Certify I.T Training follows the approved Microsoft course curriculum, ensuring you receive the training and knowledge needed to succeed.Certify I.T Training is so certain this course meets and exceeds the exam objectives, we guarantee you will pass your exam!

 


 
Deployment Methods
 
 

ISC2 - CISSP

 
 
CISSP, 1 Year Online Access, & Technical Email Support, e-Book, 40 hours Self Study, 1 Yr Technical Email Support, Training simulations.
 
 
COURSE PRICE: £355.00 + VAT
 

Certified Information Systems Security Professional

Course Outline

Access Control
General Concepts
Authentication
Principles
Types and Categories
Reference Monitor
Techniques
Models Passwords
Smart Cards
Biometrics
Access Control Systems
Administration
Residuals
Accountability
Summary

Telecommunications and Network Security
OSI Reference Model
ISO/OSI Layers and Characteristics
Topologies
LAN Access Methods
Wireless
System and Security Management
Internet Protocols and Security
Firewall Terms and Types
Web Security
Common Attacks
Remote Access Security
Summary

Information Security Governance and Risk Management
Key Concepts
Definitions
Key Concepts
Risk Management
Risk Assessment
Useful Formulas
3rd Party Governance
Information Classification
Roles and Responsibilities
Written Guidance
Policies and Standards
Employment Policies
Employee Education Programs
Change Management
Summary

Software Architecture and Design
Problems
Databases
Query Language
Object Oriented
Applications Beyond the Database
Definitions
Application System Development
Controls
Compiled vs. Interpreted
Vulnerabilities
Botnets
Summary

Cryptography
Definitions
Cryptanalysis Terms
Symmetric Encryption
Asymmetric Encryption
Hybrid Encryption
Public Key Infrastructures
Hash Functions
Digital Signatures
Protocol Based
Pretty Good Privacy
Cracking Techniques
Summary

Security Architecture and Design
Abstract Levels
Computer Hardware
Operating Systems
Processors
Types of Storage
Information Security Architecture
Open and Closed Systems
Access Controls
Architectural Foundation
Modes of Operation
Certification and Accreditation
Evaluation Criteria
Security Models
Summary

Operations Security
Threats in an Operating Environment
Control Categories
Accountability
Trusted Recovery
Management and Administrative Control
Due Care and Diligence
Hardware and Software Controls
Email and Fax
Privilege
Physical Access
Monitoring Techniques
Problem Management
Threats and Vulnerabilities
Defense in Depth
Summary

Business Continuity and Disaster Recovery
The Basics
Reasons for BCP
Key Concepts
Definitions
Business Continuity Life Cycle
Project Initiation
Business Impact Analysis
Assessing Risk
Recovery Strategies
Off-Site Requirements
Data Redundancy
System Backups
Plan Development
Testing and Maintenance
Stages in an Incident
Summary

Legal Requirements and Investigations
Ethics
Code of Ethics
Laws
Intellectual Property
Proprietary Rights
Liability
Computer Crime
Computer Crime Laws
Computer Investigation
Investigation Steps
Computer Forensics
Evidence Admissibility
Summary

Physical and Environmental Security
Physical Security
Crime Prevention
Site Design and Configuration
Boundary Protection
Computing Facility Requirements
Fire Prevention
Fire Suppression
Fire Classes
Media Protection
Access Controls
Physical Security
Summary
Course Summary

 
 
About us | Contact us | Support | T&C | Privacy Policy | Site Map | Guarantee ©2010 - 2013 Certify IT Training