Certified Information Systems Security
Professional Course – CISSP

Duration

5 Days

Entry Requirements

Minimum High School Diploma

Tuition

$2000 (In-Class)
$500 (Online)

i

Course Delivery

On-Campus
Online

Program Overview

$

This course prepares you for one of the most-esteemed cybersecurity certifications in the world. It is ideal for those professionals in the following roles: Security Consultant, Security Analyst, Security Manager, Security Auditor, Security Architect, Director of Security, Security Systems Engineer, and Chief Information Security Officer.

This cybersecurity certification is an elite way to demonstrate your knowledge, advance your career and become a member of a community of cybersecurity leaders. It shows you have all it takes to design, engineer, implement and run an information security program.

The CISSP is an objective measure of excellence. It’s the most globally recognized standard of achievement in the industry. And this cybersecurity certification was the first information security credential to meet the strict conditions of ISO/IEC Standard 17024.

Accreditation

$

CISSP Certificate

Study Outline

Day 1

Certified Information Systems Security Professional, Part 1 of 9: Risk and Authentication

This course covers risk management and authentication. It will look at risk from a negative perspective or the likelihood of something bad happening. Topics covered will be plans, programs, and infrastructure providing the foundation for all other domains including access control, validating, and verifying the use of resources. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional or CISSP.

Certified Information Systems Security Professional, Part 2 of 9: Access and Security Models

Access control is the heartbeat of information security. This course will talk about role access, layers of access, control characteristics, administrative controls, and technical access. It will also cover architecture and computer security concepts. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional or CISSP.

Day 2

Certified Information Systems Security Professional, Part 3 of 9: Cryptography and Operations

Operations security is where all the theories and policies are put into action. Topics in this course will include administration responsibilities, redundancy and fault tolerance, and threats to operations. Also, an overview of cryptography and how it can be used in something like access will be discussed. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional (CISSP).

Certified Information Systems Security Professional, Part 4 of 9: Cryptography and Net Topologies

This course covers symmetric and asymmetric cryptography and their history will be covered along with topics like Public key infrastructure, and various attacks. Also, network and communication security will be discussed with topics including network topologies, and cabling, and finally, end with looking at network solutions. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional (CISSP).

Day 3

Certified Information Systems Security Professional, Part 5 of 9: Network Protocols and Wireless

This course will discuss protocols and structures of communications transmitted across networks. OSI hierarchy and the devices that manage communications and how to protect them. It will end with ports, services, and switches and how they must be secured and network-based attacks to be prepared for. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional (CISSP).

Certified Information Systems Security Professional, Part 6 of 9: Security Architecture and Apps

This course discusses security architecture and models. It starts with the common concerns about security within the software, risk management, and how it integrates. Next, web applications, compliance with standards, and investigation of database security issues. Finally the role of artificial intelligence and knowledge discovery, software development models, and change control processes. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional (CISSP).

Day 4

Certified Information Systems Security Professional, Part 7 of 9: Malware and Business Continuity

Malicious software exists in many forms. This course will cover many types of malware including worms, Trojans, and viruses along with rootkits and back-doors. It then will cover business continuity, hot and cold sites, redundancy, and backups. Finally, it will look at specifics of how to recover from disasters and how it ties into risk management. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional (CISSP).

Certified Information Systems Security Professional, Part 8 of 9: Incident Management

This course covers incident management, types of laws and computer crimes, how to handle evidence, physical security, and how to integrate with information security. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional or CISSP.

Day 5

Certified Information Systems Security Professional, Part 9 of 9: Systems Professional

This course covers security fundamentals, risk management, and threat modeling. governance, compliance, ethics, policies, and personnel security. When complete you’ll have a comprehensive understanding of how security integrates with all of these key areas of knowledge. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional (CISSP).

Complete Revision from Part 1 to Part 9

On day five, students will write a MOCK Exam in preparation for an actual exam, which can schedule accordingly.