CISSP Master Training

Customized Onsite Training

5
Days
  • Customized Content
  • For Groups of 5+
  • Online or On-location
  • Expert Instructors
Overview

This CISSP® Master Class will provide in depth coverage of the ten domains of the information security CBK and prepare you for the Certified Information Security Professional (CISSP#174;) certification, the premier security certification created and administered by the International Systems Security Certification Consortium (ISC2).

The course focuses on preparing students for the CISSP exam through extensive mentoring and drill sessions, review of the entire body of knowledge, simulated exams, and practical question and answer sessions. CISSP holders have demonstrated that they have the required skills and best practices to provide leadership in the creation and execution of enterprise-wide security infrastructures.

This CISSP course prepares attendees for the CISSP® exam and provides 40 hours of continuing security education credits.

Goals
  1. Learn about the ten domains of the information security CBK.
  2. Prepare for the Certified Information Security Professional (CISSP®) certification.
  3. Get 40 hours of continuing security education credits.
Outline
  1. Information Security Management Practices
    1. Management Responsibilities
    2. Security Policies and their supporting counterparts
    3. Information Classification
    4. Roles and Responsibilities
    5. Risk Management
    6. Security Awareness
  2. Access Control Systems and Methodology
    1. Identification, authentication, authorization methods
    2. Authentication methods, models and technologies
    3. Discretionary, mandatory and nondiscretionary access control
    4. Accountability, monitoring and auditing practices
    5. Possible threats to access control practices and technologies
  3. Security Architecture and Models
    1. Computer architecture and the items that fall within it
    2. Components within an operating system
    3. OSI Model
    4. Trusted computing and security mechanisms
    5. Different security models used in software development
    6. Security criterion and ratings
    7. Certification and accreditation processes
  4. Business Continuity Planning
    1. Business Continuity Planning
    2. Disaster Recovery Planning
    3. Possible Threats
    4. Business Impact Analysis
    5. Roles and Responsibilities
    6. Backups and Offsite Facilities
  5. Cryptography
    1. History of cryptography
    2. Cryptography components and their relationships
    3. Government involvement in cryptography
    4. Symmetric and asymmetric key cryptosystems
    5. Public key infrastructure (PKI) concepts and mechanisms
    6. Hashing algorithms and uses
    7. Types of attacks on cryptosystems
  6. Physical Security
    1. Administrative, technical and physical controls pertaining to physical security
    2. Facility location, construction and management
    3. Physical security risks, threats and countermeasures
    4. Electrical issues and countermeasures
    5. Fire Prevention, detection and suppression
    6. Authenticating individuals and intrusion detection
  7. Telecommunication, Network and Internet Security
    1. TCP/IP Suite
    2. Cabling and data transmission types
    3. LAN and WAN technologies
    4. Network devices and service
    5. Telecommunication protocols and devices
    6. Remote access methods and technologies
    7. Fault tolerance mechanisms
  8. Law, Investigations, Ethics
    1. Ethics, pertaining to security professionals and best practices
    2. Computer crimes and computer laws
    3. Motivations and profiles of attackers
    4. Computer crime investigation process and evidence collection
    5. Incident handling procedures
    6. Different types of evidence
    7. Laws and acts put into effect to fight computer crime
  9. Applications Security and System Development
    1. Different types of software controls and implementation
    2. Database concepts and security issues
    3. Data warehousing and data mining
    4. Software life cycle development processes
    5. Change control concepts
    6. Object oriented programming components
    7. Expert systems and artificial intelligence
  10. Computer Operations Security
    1. Operations responsibilities
    2. Configuration management
    3. Media access protection
    4. System recovery
    5. Facsimile security
    6. Intrusion detection systems
    7. Attack types
Class Materials

Each student in our Live Online and our Onsite classes receives a comprehensive set of materials, including course notes and all the class examples.

Preparing for Class

No cancelation for low enrollment

Certified Microsoft Partner

Registered Education Provider (R.E.P.)

GSA schedule pricing

76,130

Students who have taken Live Online Training

15,315

Organizations who trust Webucator for their training needs

100%

Satisfaction guarantee and retake option

9.40

Students rated our trainers 9.40 out of 10 based on 5,230 reviews

This class was better than expected. It was great to watch the instructor use Google Analytics, so I could follow along.

Dana Nourie, VMware, Inc
SAN JOSE CA

A very knowledgeable and hands-on instructor.

James Ting, Texas Instruments
Carrollton TX

My trainer was extremely knowledgeable and professional. She was very courteous and encouraged learning. She was able to effectively answer any questions I had and I learned a great deal in a very short amount of time. The set up between the book, computer, and audio is ideal for learning. You get hands on experience while under the supervision of an expert. I will gladly recommend this training to others.

Kristin Huddy, Department of Children & Families - Training Academy
Trenton NJ

I really enjoyed taking this course and would recommend it to anyone who wants to know how to use FrameMaker.

Mary Pat Thoma, Draeger Safety
Pittsburgh PA

Contact Us or call 1-877-932-8228