CISSP Master Training

Customized Onsite Training

5
Days
  • Customized Content
  • For Groups of 5+
  • Online or On-location
  • Expert Instructors
Overview

This CISSP® Master Class will provide in depth coverage of the ten domains of the information security CBK and prepare you for the Certified Information Security Professional (CISSP#174;) certification, the premier security certification created and administered by the International Systems Security Certification Consortium (ISC2).

The course focuses on preparing students for the CISSP exam through extensive mentoring and drill sessions, review of the entire body of knowledge, simulated exams, and practical question and answer sessions. CISSP holders have demonstrated that they have the required skills and best practices to provide leadership in the creation and execution of enterprise-wide security infrastructures.

This CISSP course prepares attendees for the CISSP® exam and provides 40 hours of continuing security education credits.

Goals
  1. Learn about the ten domains of the information security CBK.
  2. Prepare for the Certified Information Security Professional (CISSP®) certification.
  3. Get 40 hours of continuing security education credits.
Outline
  1. Information Security Management Practices
    1. Management Responsibilities
    2. Security Policies and their supporting counterparts
    3. Information Classification
    4. Roles and Responsibilities
    5. Risk Management
    6. Security Awareness
  2. Access Control Systems and Methodology
    1. Identification, authentication, authorization methods
    2. Authentication methods, models and technologies
    3. Discretionary, mandatory and nondiscretionary access control
    4. Accountability, monitoring and auditing practices
    5. Possible threats to access control practices and technologies
  3. Security Architecture and Models
    1. Computer architecture and the items that fall within it
    2. Components within an operating system
    3. OSI Model
    4. Trusted computing and security mechanisms
    5. Different security models used in software development
    6. Security criterion and ratings
    7. Certification and accreditation processes
  4. Business Continuity Planning
    1. Business Continuity Planning
    2. Disaster Recovery Planning
    3. Possible Threats
    4. Business Impact Analysis
    5. Roles and Responsibilities
    6. Backups and Offsite Facilities
  5. Cryptography
    1. History of cryptography
    2. Cryptography components and their relationships
    3. Government involvement in cryptography
    4. Symmetric and asymmetric key cryptosystems
    5. Public key infrastructure (PKI) concepts and mechanisms
    6. Hashing algorithms and uses
    7. Types of attacks on cryptosystems
  6. Physical Security
    1. Administrative, technical and physical controls pertaining to physical security
    2. Facility location, construction and management
    3. Physical security risks, threats and countermeasures
    4. Electrical issues and countermeasures
    5. Fire Prevention, detection and suppression
    6. Authenticating individuals and intrusion detection
  7. Telecommunication, Network and Internet Security
    1. TCP/IP Suite
    2. Cabling and data transmission types
    3. LAN and WAN technologies
    4. Network devices and service
    5. Telecommunication protocols and devices
    6. Remote access methods and technologies
    7. Fault tolerance mechanisms
  8. Law, Investigations, Ethics
    1. Ethics, pertaining to security professionals and best practices
    2. Computer crimes and computer laws
    3. Motivations and profiles of attackers
    4. Computer crime investigation process and evidence collection
    5. Incident handling procedures
    6. Different types of evidence
    7. Laws and acts put into effect to fight computer crime
  9. Applications Security and System Development
    1. Different types of software controls and implementation
    2. Database concepts and security issues
    3. Data warehousing and data mining
    4. Software life cycle development processes
    5. Change control concepts
    6. Object oriented programming components
    7. Expert systems and artificial intelligence
  10. Computer Operations Security
    1. Operations responsibilities
    2. Configuration management
    3. Media access protection
    4. System recovery
    5. Facsimile security
    6. Intrusion detection systems
    7. Attack types
Class Materials

Each student in our Live Online and our Onsite classes receives a comprehensive set of materials, including course notes and all the class examples.

Preparing for Class

No cancelation for low enrollment

Certified Microsoft Partner

Registered Education Provider (R.E.P.)

GSA schedule pricing

81,519

Students who have taken Live Online Training

15,629

Organizations who trust Webucator for their training needs

100%

Satisfaction guarantee and retake option

9.40

Students rated our trainers 9.40 out of 10 based on 4,754 reviews

The core concepts I learned in class apply in my real world work setting, which is good for job security and for my employer to grow and prosper!

Aaron Anderson, Widener University
Chester PA

Webucator delivers a great training opportunity for those of us with busy lives. It allows us to skip all the travel time and expense and learn right from our home or office.

Delina Bible, Green Country Technology Center
Okmulgee OK

I wanted to take an in-classroom course because I thought I needed hands-on training and personal attention from the instructor. With such a small number of people in the class and the ability to talk to the instructor via the headset, I was able to get exactly what I needed. It was just like being in the classroom but better - I didn't have to leave my office! I was absolutely thrilled with the experience and am telling everyone in my company that this is the kind of training they should take should they require anything in the future!

Shannon Bray, ADM Corporation
Middlesex NJ

I really enjoyed learning how to run SQL queries in this course! Looking forward to using Webucator again.

Bridgette Harris, Citrix

Contact Us or call 1-877-932-8228