CISSP (Information Security for the IT Professional)

This course is primarily for Information Technology Security Professionals who want advance their security certifications such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH), and related courses. This course also covers most of the knowledge required to prepare for the Systems Security Certified Practitioner (SSCP) certification exam

Retail Price: $3,095.00

Next Date: 01/21/2019

Course Days: 5


Enroll in Next Date

Request Custom Course


About this Course

This course is primarily for Information Technology Security Professionals who want advance their security certifications such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH), and related courses. This course also covers most of the knowledge required to prepare for the Systems Security Certified Practitioner (SSCP) certification exam

Audience Profile

This course is primarily designed for the IT professional whose role includes some information security tasks or responsibilities. Common job titles for students include:

  • CISO Director
  • Manager
  • Supervisor
  • Analyst
  • Information Architect
  • Program Manager, Lead
  • Information Security Officer
  • Security Specialist
  • Auditor. 

At Course Completion

After taking this course, students will learn how to apply the knowledge to valuable job skills.

Prerequisites

Before taking this course, students should have six to nine months in a role that is relevant to security practices. It is also recommended that student have successfully completed the following courses or have equivalent experience.

CCNA215: ICND 1 – Interconnecting Cisco Networking Devices Part1 v2
A565: CompTIA A+ Certification 801 Support Skills (2012 Objectives)


Course Outline

1.Access Control

  • Security Principles and the Principle of Least
  • Privilege
  • Confidentiality
  • Integrity
  • Availability
  • Identification, Authentication, Authorization, Access, and Accounting
  • Authentication Techniques and Standards
  • Access Control Models
  • Access Control Methods and Implementations
  • Access Control Accounting and Auditing

2. Information Security Governance and Risk Management

  • Fundamental Principles of Security
  • Confidentiality
  • Integrity
  • Availability
  • Balancing the Security Principles
  • Security vs. Usability vs. Cost
  • Security Definitions
  • Types of Security Controls
  • Security Frameworks
  • ISO/IEC 27001
  • COSO
  • COBIT
  • Process Management
  • Security Management
  • Risk Management
  • Risk Assessment and Analysis
  • Asset Classification
  • Data Classification
  • Risk Mitigation Strategies
  • Policies
  • Standards
  • Guidelines
  • Baselines
  • Procedures
  • Executive Leadership in Risk Management
  • Implementing Governance and Compliance Strategies

3. Security Architecture and Design

  • Computer System Architecture
  • Operating System Security Architecture
  • Application Security Architecture
  • System Security Models
  • Security Architecture Evaluation and Certification
  • Trusted Computer System Evaluation Criteria (TCSEC, or Orange Book)
  • Common Criteria for Information Technology Security Evaluation (ISO/IEC 15408)
  • System Testing and Certification

4. Business Continuity and Disaster Recovery Planning

  • Standards and Best Practices
  • Planning for Incidents
  • The Business Continuity Process
  • Implementing A Disaster Recovery Plan

5. Cryptography

  • Overview of Cryptography
  • The History of Cryptography (Without Math)
  • The Use of Cryptography (With Math)
  • Symmetric Key (Shared Secret Key) Cryptography
  • Diffie-Hellman Key Agreement
  • Asymmetric Key (Public – Private Key) Cryptography
  • Digital Signature (Hash) Cryptography
  • Implementing All Types of Cryptography in Cryptosystems
  • Public Key Infrastructure (PKI) and Certificates
  • Encrypted VPN Tunnels
  • Digitally Signed Documents and Email
  • Encrypting Data At Rest and In Transit

6. Legal, Regulations, Investigations and Compliance

  • The Complexity of Cybercrime
  • Regions
  • Laws
  • Law Enforcement
  • Privacy Laws
  • Intellectual Privacy Laws
  • Eavesdropping and Workplace Spying Laws
  • Legal Liability and Security Compliance
  • Conducting a Security Investigation
  • Ethics of Information Security

7. Operations Security (formerly Security Operations)

  • The Role of Operations in Information Security
  • Personnel Management and Administration
  • Planning System Security
  • Implementing and Maintaining System Security
  • Applying Controls
  • System Hardening
  • Trusted Recovery
  • Configuration Management
  • Change Control Process
  • Change Control Documentation
  • Change Control Compliance and Auditing
  • Vulnerability Assessment
  • Continuous Security Lifecycle

8. Physical (Environmental) Security

  • The Importance of Physical Security in Information Security
  • Planning Physical Security
  • Identifying and Protecting Assets
  • Internal Physical Security Threats and Controls
  • Perimeter Physical Security Threats and Controls
  • External Physical Security Threats and Controls

9. Software Development Security

  • Security as a Part of Software Development
  • System Development Lifecycle
  • Secure Software Development Lifecycle
  • Software Development Models
  • Change Control and Update Management
  • Cloud Computing
  • Web and Mobile Applications
  • Database Management and Security
  • Malicious Software
  • Viruses
  • Trojan Horses
  • Worms
  • Rootkits
  • Backdoors

10. Telecommunications and Network Security

  • The Open Systems Interconnect Model
  • TCP/IP Security
  • IPv4 Security and Threats
  • IPv6 Security and Threats
  • Network Cabling Types and Security
  • Considerations
  • Network Devices
  • Hubs
  • Switches
  • Routers
  • Bridges
  • Gateways
  • Security Network Devices
  • Firewalls and Content Filters
  • Proxy Servers
  • Intrusion Detection Systems
  • Intrusion Prevention Systems
  • Firewalls
  • WAN Security
  • Dial-Up Network Security
  • Virtual Private Network (VPN) Security
  • Internet Protocol Security (IPSec)
Course Dates Course Times (EST) Delivery Mode GTR
1/21/2019 - 1/25/2019 9:30 AM - 5:00 PM Virtual gauranteed to run course date Enroll
2/4/2019 - 2/8/2019 10:00 AM - 5:30 PM Virtual Enroll
6/17/2019 - 6/21/2019 11:00 AM - 7:00 PM Virtual Enroll