Master the essential skills for protecting digital assets and networks with our CISSP certification course, tailored for IT security professionals seeking to enhance their qualifications and expertise.
EnrollDesign robust information security strategies aligned with best practices.
Implement comprehensive risk management and compliance techniques.
Understand diverse cryptographic methods and their applications.
Develop and manage disaster recovery and business continuity plans.
Information security is part of every IT professional’s job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Planning, implementing, enforcing, or even removing security are tasks we all do to keep users and systems safe. Performing these tasks properly and in alignment with industry best practices is critical to virtually every technology role, from decision maker to developer to operator. This scenario-based course focuses on computer security as an applied process across job roles and industries. The course also helps to prepare students for achieving the Certified Information Systems Security Professional (CISSP) certification. CISSP is widely regarded as the most valuable vendor-neutral credential a computer security professional can hold. It is frequently identified as a prerequisite for security jobs across all industries including security design, implementation, maintenance, policy development, and management of secured systems, process/procedures, policies, applications and networks. This course is primarily for Information Technology Security Professionals who want to advance their security certifications such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH), and related courses. This course also covers most of the knowledge required to prepare for the Systems Security Certified Practitioner (SSCP) certification exam.
Security Principles and the Principle of Least
Confidentiality
Integrity
Availability
Identification, Authentication, Authorization, Access, and Accounting
Authentication Techniques and Standards
Access Control Models
Access Control Methods and Implementations
Access Control Accounting and Auditing
Fundamental Principles of Security
Confidentiality
Integrity
Availability
Balancing the Security Principles
Security vs. Usability vs. Cost
Security Definitions
Types of Security Controls
Security Frameworks
ISO/IEC 27001
COSO
COBIT
Process Management
Security Management
Risk Management
Risk Assessment and Analysis
Asset Classification
Data Classification
Risk Mitigation Strategies
Policies
Standards
Guidelines
Baselines
Procedures
Executive Leadership in Risk Management
Implementing Governance and Compliance Strategies
Computer System Architecture
Operating System Security Architecture
Application Security Architecture
System Security Models
Security Architecture Evaluation and Certification
Trusted Computer System Evaluation Criteria (TCSEC, or Orange Book)
Common Criteria for Information Technology Security Evaluation (ISO/IEC 15408)
System Testing and Certification
Standards and Best Practices
Planning for Incidents
The Business Continuity Process
Implementing A Disaster Recovery Plan
Overview of Cryptography
The History of Cryptography (Without Math)
The Use of Cryptography (With Math)
Symmetric Key (Shared Secret Key) Cryptography
Diffie-Hellman Key Agreement
Asymmetric Key (Public – Private Key) Cryptography
Digital Signature (Hash) Cryptography
Implementing All Types of Cryptography in Cryptosystems
Public Key Infrastructure (PKI) and Certificates
Encrypted VPN Tunnels
Digitally Signed Documents and Email
Encrypting Data At Rest and In Transit
The Complexity of Cybercrime
Regions
Laws
Law Enforcement
Privacy Laws
Intellectual Privacy Laws
Eavesdropping and Workplace Spying Laws
Legal Liability and Security Compliance
Conducting a Security Investigation
Ethics of Information Security
The Role of Operations in Information Security
Personnel Management and Administration
Planning System Security
Implementing and Maintaining System Security
Applying Controls
System Hardening
Trusted Recovery
Configuration Management
Change Control Process
Change Control Documentation
Change Control Compliance and Auditing
Vulnerability Assessment
Continuous Security Lifecycle
The Importance of Physical Security in Information Security
Planning Physical Security
Identifying and Protecting Assets
Internal Physical Security Threats and Controls
Perimeter Physical Security Threats and Controls
External Physical Security Threats and Controls
Security as a Part of Software Development
System Development Lifecycle
Secure Software Development Lifecycle
Software Development Models
Change Control and Update Management
Cloud Computing
Web and Mobile Applications
Database Management and Security
Malicious Software
Viruses
Trojan Horses
Worms
Rootkits
Backdoors
The Open Systems Interconnect Model
TCP/IP Security
IPv4 Security and Threats
IPv6 Security and Threats
Network Cabling Types and Security
Network Devices
Hubs
Switches
Routers
Bridges
Gateways
Security Network Devices
Firewalls and Content Filters
Proxy Servers
Intrusion Detection Systems
Intrusion Prevention Systems
Firewalls
WAN Security
Dial-Up Network Security
Virtual Private Network (VPN) Security
Internet Protocol Security (IPsec)
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier