CISSP Master Training

This CISSP® Master Class will provide in depth coverage of the ten domains of the information security CBK and prepare you for the Certified Information Security Professional (CISSP#174;) certification, the premier security certification created and administered by the International Systems Security Certification Consortium (ISC2).

The course focuses on preparing students for the CISSP exam through extensive mentoring and drill sessions, review of the entire body of knowledge, simulated exams, and practical question and answer sessions. CISSP holders have demonstrated that they have the required skills and best practices to provide leadership in the creation and execution of enterprise-wide security infrastructures.

This CISSP course prepares attendees for the CISSP® exam and provides 40 hours of continuing security education credits.

Goals
  1. Learn about the ten domains of the information security CBK.
  2. Prepare for the Certified Information Security Professional (CISSP®) certification.
  3. Get 40 hours of continuing security education credits.
Outline
  1. Information Security Management Practices
    1. Management Responsibilities
    2. Security Policies and their supporting counterparts
    3. Information Classification
    4. Roles and Responsibilities
    5. Risk Management
    6. Security Awareness
  2. Access Control Systems and Methodology
    1. Identification, authentication, authorization methods
    2. Authentication methods, models and technologies
    3. Discretionary, mandatory and nondiscretionary access control
    4. Accountability, monitoring and auditing practices
    5. Possible threats to access control practices and technologies
  3. Security Architecture and Models
    1. Computer architecture and the items that fall within it
    2. Components within an operating system
    3. OSI Model
    4. Trusted computing and security mechanisms
    5. Different security models used in software development
    6. Security criterion and ratings
    7. Certification and accreditation processes
  4. Business Continuity Planning
    1. Business Continuity Planning
    2. Disaster Recovery Planning
    3. Possible Threats
    4. Business Impact Analysis
    5. Roles and Responsibilities
    6. Backups and Offsite Facilities
  5. Cryptography
    1. History of cryptography
    2. Cryptography components and their relationships
    3. Government involvement in cryptography
    4. Symmetric and asymmetric key cryptosystems
    5. Public key infrastructure (PKI) concepts and mechanisms
    6. Hashing algorithms and uses
    7. Types of attacks on cryptosystems
  6. Physical Security
    1. Administrative, technical and physical controls pertaining to physical security
    2. Facility location, construction and management
    3. Physical security risks, threats and countermeasures
    4. Electrical issues and countermeasures
    5. Fire Prevention, detection and suppression
    6. Authenticating individuals and intrusion detection
  7. Telecommunication, Network and Internet Security
    1. TCP/IP Suite
    2. Cabling and data transmission types
    3. LAN and WAN technologies
    4. Network devices and service
    5. Telecommunication protocols and devices
    6. Remote access methods and technologies
    7. Fault tolerance mechanisms
  8. Law, Investigations, Ethics
    1. Ethics, pertaining to security professionals and best practices
    2. Computer crimes and computer laws
    3. Motivations and profiles of attackers
    4. Computer crime investigation process and evidence collection
    5. Incident handling procedures
    6. Different types of evidence
    7. Laws and acts put into effect to fight computer crime
  9. Applications Security and System Development
    1. Different types of software controls and implementation
    2. Database concepts and security issues
    3. Data warehousing and data mining
    4. Software life cycle development processes
    5. Change control concepts
    6. Object oriented programming components
    7. Expert systems and artificial intelligence
  10. Computer Operations Security
    1. Operations responsibilities
    2. Configuration management
    3. Media access protection
    4. System recovery
    5. Facsimile security
    6. Intrusion detection systems
    7. Attack types
Class Materials

Each student in our Live Online and our Onsite classes receives a comprehensive set of materials, including course notes and all the class examples.

Preparing for Class

Training for your Team

Length: 5 Days
  • Private Class for your Team
  • Online or On-location
  • Customizable
  • Expert Instructors

What people say about our training

The instructor was terrific.
Wayne Hill
Wayne Hill Consulting
I received one on one help with the labs and any questions I had whenever I needed it.
Sandie Navarro
atos
The class and the on-line format fully exceeded my expectations in every way. Fantastic!
Chris Ferrara
Ernst & Young
My instructor knew the program inside and out. She was able to answer all questions that were asked. It was just like having a teacher in the same room as you.
Sarah Gamache
Portland Pie Company

No cancelation for low enrollment

Certified Microsoft Partner

Registered Education Provider (R.E.P.)

GSA schedule pricing

60,501

Students who have taken Instructor-led Training

11,680

Organizations who trust Webucator for their Instructor-led training needs

100%

Satisfaction guarantee and retake option

9.28

Students rated our trainers 9.28 out of 10 based on 28,431 reviews

Contact Us or call 1-877-932-8228