CISSP Master Training

This CISSP® Master Class will provide in depth coverage of the ten domains of the information security CBK and prepare you for the Certified Information Security Professional (CISSP#174;) certification, the premier security certification created and administered by the International Systems Security Certification Consortium (ISC2).

The course focuses on preparing students for the CISSP exam through extensive mentoring and drill sessions, review of the entire body of knowledge, simulated exams, and practical question and answer sessions. CISSP holders have demonstrated that they have the required skills and best practices to provide leadership in the creation and execution of enterprise-wide security infrastructures.

This CISSP course prepares attendees for the CISSP® exam and provides 40 hours of continuing security education credits.

Goals
  1. Learn about the ten domains of the information security CBK.
  2. Prepare for the Certified Information Security Professional (CISSP®) certification.
  3. Get 40 hours of continuing security education credits.
Outline
  1. Information Security Management Practices
    1. Management Responsibilities
    2. Security Policies and their supporting counterparts
    3. Information Classification
    4. Roles and Responsibilities
    5. Risk Management
    6. Security Awareness
  2. Access Control Systems and Methodology
    1. Identification, authentication, authorization methods
    2. Authentication methods, models and technologies
    3. Discretionary, mandatory and nondiscretionary access control
    4. Accountability, monitoring and auditing practices
    5. Possible threats to access control practices and technologies
  3. Security Architecture and Models
    1. Computer architecture and the items that fall within it
    2. Components within an operating system
    3. OSI Model
    4. Trusted computing and security mechanisms
    5. Different security models used in software development
    6. Security criterion and ratings
    7. Certification and accreditation processes
  4. Business Continuity Planning
    1. Business Continuity Planning
    2. Disaster Recovery Planning
    3. Possible Threats
    4. Business Impact Analysis
    5. Roles and Responsibilities
    6. Backups and Offsite Facilities
  5. Cryptography
    1. History of cryptography
    2. Cryptography components and their relationships
    3. Government involvement in cryptography
    4. Symmetric and asymmetric key cryptosystems
    5. Public key infrastructure (PKI) concepts and mechanisms
    6. Hashing algorithms and uses
    7. Types of attacks on cryptosystems
  6. Physical Security
    1. Administrative, technical and physical controls pertaining to physical security
    2. Facility location, construction and management
    3. Physical security risks, threats and countermeasures
    4. Electrical issues and countermeasures
    5. Fire Prevention, detection and suppression
    6. Authenticating individuals and intrusion detection
  7. Telecommunication, Network and Internet Security
    1. TCP/IP Suite
    2. Cabling and data transmission types
    3. LAN and WAN technologies
    4. Network devices and service
    5. Telecommunication protocols and devices
    6. Remote access methods and technologies
    7. Fault tolerance mechanisms
  8. Law, Investigations, Ethics
    1. Ethics, pertaining to security professionals and best practices
    2. Computer crimes and computer laws
    3. Motivations and profiles of attackers
    4. Computer crime investigation process and evidence collection
    5. Incident handling procedures
    6. Different types of evidence
    7. Laws and acts put into effect to fight computer crime
  9. Applications Security and System Development
    1. Different types of software controls and implementation
    2. Database concepts and security issues
    3. Data warehousing and data mining
    4. Software life cycle development processes
    5. Change control concepts
    6. Object oriented programming components
    7. Expert systems and artificial intelligence
  10. Computer Operations Security
    1. Operations responsibilities
    2. Configuration management
    3. Media access protection
    4. System recovery
    5. Facsimile security
    6. Intrusion detection systems
    7. Attack types
Class Materials

Each student in our Live Online and our Onsite classes receives a comprehensive set of materials, including course notes and all the class examples.

Training for your Team

Length: 5 Days
  • Private Class for your Team
  • Online or On-location
  • Customizable
  • Expert Instructors

What people say about our training

The Goal Setting and Time Management course was everything I expected, with a few nuggets that I can implement immediately on my job and in my personal life. The instructor was terrific.
Frank Rich
Alliance Beverage
I really liked the instructor. She was very knowledgeable and able to answer all my questions in a way I understood. I really like the class folder with all the files we worked on that I can now use at work. I had never done an online training class and I really enjoyed it, and I was able to do it from home and was very relaxed.
Daniel Laird
SUNY Oswego
The instructor had an excellent way of explaining the topics from the manual. This class was exactly what I was looking for.
James Porzse
CIBER
I've had great experiences with Webucator classes. The instructors are great and are very helpful. I feel I've gotten my money's worth with each class.
Kim Sanders
Columbus Metropolitan Library

No cancelation for low enrollment

Certified Microsoft Partner

Registered Education Provider (R.E.P.)

GSA schedule pricing

61,793

Students who have taken Instructor-led Training

11,791

Organizations who trust Webucator for their Instructor-led training needs

100%

Satisfaction guarantee and retake option

9.29

Students rated our trainers 9.29 out of 10 based on 28,758 reviews

Contact Us or call 1-877-932-8228