CISSP - Certified Information Systems Security Professional

5.0
1 review
  • Really enjoyed this learning experience, so interesting.Everything straight forward, excellent tutor who is very helpful and supportive with clear, fair and speedy feedback.
    |

Course

Online

£ 190 VAT inc.

Call the centre

Description

  • Type

    Course

  • Methodology

    Online

  • Duration

    Flexible

This course offers you a solid foundation for the Certified Information Systems Security Professional (CISSP) exam. It provides you with the knowledge and skills to pass the CISSP certification, after which you'll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security.

Successful completion of the CISSP certification validates your experience, skills and commitment as an information security professional.

Important information

Price for Emagister users: We are offering a 20% discount this month for all enrolments that are paid in full and made online.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now closed

About this course


Key Topics

The CISSP course is divided into following topics:

Access Control
Telecommunications and Network Security
Information Security Governance and Risk Management
Software Architecture and Design
Cryptography
Security Architecture and Design
Operations Security
Business Continuity and Disaster Recovery
Legal Requirements and Investigations
Physical and Environmental Security
Course Summary

You must be a practicing security professional with at least five years' experience or with four years' experience and a recent IT or IS degree.

This CISSP - Certified Information Systems Security Professional 2015 course will prepare you for
following certification:

Certified Information Systems Security Professional

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Fill in your details to get a reply

We will only publish your name and question

Reviews

5.0
  • Really enjoyed this learning experience, so interesting.Everything straight forward, excellent tutor who is very helpful and supportive with clear, fair and speedy feedback.
    |
100%
4.6
excellent

Course rating

Recommended

Centre rating

Amanda

5.0
24/04/2015
What I would highlight: Really enjoyed this learning experience, so interesting.Everything straight forward, excellent tutor who is very helpful and supportive with clear, fair and speedy feedback.
Would you recommend this course?: Yes
*All reviews collected by Emagister & iAgora have been verified

This centre's achievements

2016

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 16 years

Subjects

  • Security
  • Systems
  • IT
  • IT Security
  • Information Systems
  • Information Security

Teachers and trainers (1)

Support Advisor

Support Advisor

Support Advisor

Course programme

Course OutlineHow is the Course Structured?

Access Control

  • General Concepts
  • Authentication
  • Principles
  • Types and Categories
  • Reference Monitor
  • Techniques
  • Models
  • Passwords
  • Smart Cards
  • Biometrics
  • Access Control Systems
  • Administration
  • Residuals
  • Accountability
  • Summary

Telecommunications and Network Security

  • OSI Reference Model
  • ISO/OSI Layers and Characteristics
  • Topologies
  • LAN Access Methods
  • Wireless
  • System and Security Management
  • Internet Protocols and Security
  • Firewall Terms and Types
  • Web Security
  • Common Attacks
  • Remote Access Security
  • Summary

Information Security Governance and Risk Management

  • Key Concepts
  • Definitions
  • Key Concepts
  • Risk Management
  • Risk Assessment
  • Useful Formulas
  • 3rd Party Governance
  • Information Classification
  • Roles and Responsibilities
  • Written Guidance
  • Policies and Standards
  • Employment Policies
  • Employee Education Programs
  • Change Management
  • Summary

Software Architecture and Design

  • Problems
  • Databases
  • Query Language
  • Object Oriented
  • Applications Beyond the Database
  • Definitions
  • Application System Development
  • Controls
  • Compiled vs. Interpreted
  • Vulnerabilities
  • Botnets
  • Summary

Cryptography

  • Definitions
  • Cryptanalysis Terms
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hybrid Encryption
  • Public Key Infrastructures
  • Hash Functions
  • Digital Signatures
  • Protocol Based
  • Pretty Good Privacy
  • Cracking Techniques
  • Summary

Security Architecture and Design

  • Abstract Levels
  • Computer Hardware
  • Operating Systems
  • Processors
  • Types of Storage
  • Information Security Architecture
  • Open and Closed Systems
  • Access Controls
  • Architectural Foundation
  • Modes of Operation
  • Certification and Accreditation
  • Evaluation Criteria
  • Security Models
  • Summary

Operations Security

  • Threats in an Operating Environment
  • Control Categories
  • Accountability
  • Trusted Recovery
  • Management and Administrative Control
  • Due Care and Diligence
  • Hardware and Software Controls
  • Email and Fax
  • Privilege
  • Physical Access
  • Monitoring Techniques
  • Problem Management
  • Threats and Vulnerabilities
  • Defense in Depth
  • Summary

Business Continuity and Disaster Recovery

  • The Basics
  • Reasons for BCP
  • Key Concepts
  • Definitions
  • Business Continuity Life Cycle
  • Project Initiation
  • Business Impact Analysis
  • Assessing Risk
  • Recovery Strategies
  • Off-Site Requirements
  • Data Redundancy
  • System Backups
  • Plan Development
  • Testing and Maintenance
  • Stages in an Incident
  • Summary

Legal Requirements and Investigations

  • Ethics
  • Code of Ethics
  • Laws
  • Intellectual Property
  • Proprietary Rights
  • Liability
  • Computer Crime
  • Computer Crime Laws
  • Computer Investigation
  • Investigation Steps
  • Computer Forensics
  • Evidence Admissibility
  • Summary

Physical and Environmental Security

  • Physical Security
  • Crime Prevention
  • Site Design and Configuration
  • Boundary Protection
  • Computing Facility Requirements
  • Fire Prevention
  • Fire Suppression
  • Fire Classes
  • Media Protection
  • Access Controls
  • Physical Security
  • Summary

Course Summary

Call the centre

CISSP - Certified Information Systems Security Professional

£ 190 VAT inc.