CISSP Master Training

Customized Onsite Training

5
Days
  • Customized Content
  • For Groups of 5+
  • Online or On-location
  • Expert Instructors
Overview

This CISSP® Master Class will provide in depth coverage of the ten domains of the information security CBK and prepare you for the Certified Information Security Professional (CISSP#174;) certification, the premier security certification created and administered by the International Systems Security Certification Consortium (ISC2).

The course focuses on preparing students for the CISSP exam through extensive mentoring and drill sessions, review of the entire body of knowledge, simulated exams, and practical question and answer sessions. CISSP holders have demonstrated that they have the required skills and best practices to provide leadership in the creation and execution of enterprise-wide security infrastructures.

This CISSP course prepares attendees for the CISSP® exam and provides 40 hours of continuing security education credits.

Goals
  1. Learn about the ten domains of the information security CBK.
  2. Prepare for the Certified Information Security Professional (CISSP®) certification.
  3. Get 40 hours of continuing security education credits.
Outline
  1. Information Security Management Practices
    1. Management Responsibilities
    2. Security Policies and their supporting counterparts
    3. Information Classification
    4. Roles and Responsibilities
    5. Risk Management
    6. Security Awareness
  2. Access Control Systems and Methodology
    1. Identification, authentication, authorization methods
    2. Authentication methods, models and technologies
    3. Discretionary, mandatory and nondiscretionary access control
    4. Accountability, monitoring and auditing practices
    5. Possible threats to access control practices and technologies
  3. Security Architecture and Models
    1. Computer architecture and the items that fall within it
    2. Components within an operating system
    3. OSI Model
    4. Trusted computing and security mechanisms
    5. Different security models used in software development
    6. Security criterion and ratings
    7. Certification and accreditation processes
  4. Business Continuity Planning
    1. Business Continuity Planning
    2. Disaster Recovery Planning
    3. Possible Threats
    4. Business Impact Analysis
    5. Roles and Responsibilities
    6. Backups and Offsite Facilities
  5. Cryptography
    1. History of cryptography
    2. Cryptography components and their relationships
    3. Government involvement in cryptography
    4. Symmetric and asymmetric key cryptosystems
    5. Public key infrastructure (PKI) concepts and mechanisms
    6. Hashing algorithms and uses
    7. Types of attacks on cryptosystems
  6. Physical Security
    1. Administrative, technical and physical controls pertaining to physical security
    2. Facility location, construction and management
    3. Physical security risks, threats and countermeasures
    4. Electrical issues and countermeasures
    5. Fire Prevention, detection and suppression
    6. Authenticating individuals and intrusion detection
  7. Telecommunication, Network and Internet Security
    1. TCP/IP Suite
    2. Cabling and data transmission types
    3. LAN and WAN technologies
    4. Network devices and service
    5. Telecommunication protocols and devices
    6. Remote access methods and technologies
    7. Fault tolerance mechanisms
  8. Law, Investigations, Ethics
    1. Ethics, pertaining to security professionals and best practices
    2. Computer crimes and computer laws
    3. Motivations and profiles of attackers
    4. Computer crime investigation process and evidence collection
    5. Incident handling procedures
    6. Different types of evidence
    7. Laws and acts put into effect to fight computer crime
  9. Applications Security and System Development
    1. Different types of software controls and implementation
    2. Database concepts and security issues
    3. Data warehousing and data mining
    4. Software life cycle development processes
    5. Change control concepts
    6. Object oriented programming components
    7. Expert systems and artificial intelligence
  10. Computer Operations Security
    1. Operations responsibilities
    2. Configuration management
    3. Media access protection
    4. System recovery
    5. Facsimile security
    6. Intrusion detection systems
    7. Attack types
Class Materials

Each student in our Live Online and our Onsite classes receives a comprehensive set of materials, including course notes and all the class examples.

Preparing for Class

No cancelation for low enrollment

Certified Microsoft Partner

Registered Education Provider (R.E.P.)

GSA schedule pricing

74,642

Students who have taken Live Online Training

15,220

Organizations who trust Webucator for their training needs

100%

Satisfaction guarantee and retake option

9.41

Students rated our trainers 9.41 out of 10 based on 5,191 reviews

Contact Us or call 1-877-932-8228