Certified Information Systems Security Professional (CISSP)

Course

Online

Save 33%

Special Emagister price

£ 195 £ 295 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Developed and maintained by the International Information Systems Security Certification Consortium (ISC)2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK).

The CISSP course provides you with the knowledge and skills to pass the CISSP certification, after which you'll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security.

The great thing about our Certified Information Systems Security Professional (CISSP) course is that you are in charge of your start and finish date, with no deadline pressures!

We train our students to the very best standards, offering expert instructor-led training via our state of the art eLearning platform.

By achieving the Certified Information Systems Security Professional (CISSP) certification, you will create more career opportunities and be better positioned when applying for work.

Enrol today and prepare for a future you deserve.WHY STUDY WITH MY TRAINING ACADEMY?
Flexible training- study anytime, anywhere and from any device. Expert Instructor-Led Training Ðour courses are delivered by the finest instructors with a minimum of 15 years real-world experience and are subject matter experts in their field, which is why we have a 97.4% pass rate. Visual Demonstrations & Multimedia PresentationsÐ allows students to develop their skills based on real world scenarios explained by the instructor. Quizzes & Exam SimulatorsÐ custom practice exams to prepare students for their final exams. We offer practice quizzes after each module to ensure students are confident before proceeding to the next topic. Social Learning & NetworkingÐ world class learning management...

Important information

Price for Emagister users:

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

"Who Is This Course For?

Ideal for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.

By choosing online learning instead of a classroom based course, it eliminates the need for time away from work, saving you valuable time and money. It is ideal for those with tight schedules as our online courses give you 12 months unlimited access to all the course materials, so you can study at a pace that suits you. Allowing you to easily resume your studies whenever you have the time. All you need is internet connection to study, so you can study from the comfort of your home or any environment that suits you."

"Requirements

Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.

For the best viewing experience on our state-of-the-art eLearning platform we recommend an internet connection of 10Mbps or better. Please also use Google Chrome or Mozilla Firefox as your browser with Adobe Flash Player."

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Fire
  • Access Control
  • Business Continuity
  • Risk
  • Access
  • Risk Management
  • Governance
  • Information Systems
  • Network
  • Network security
  • Hacking
  • Data Protection
  • Ethics
  • Computer Engineering
  • Design
  • International
  • Systems
  • IT risk
  • IT Security
  • Network Training
  • Architecture Design
  • Data security
  • Computer Systems
  • IT Systems
  • Computer Science
  • Network Engineering
  • Computering

Course programme

"

Course Outline


Course Outline

Course Syllabus Access Control

  • General Concepts
  • Authentication
  • Principles
  • Types and Categories
  • Reference Monitor
  • Techniques
  • Models
  • Passwords
  • Smart Cards
  • Biometrics
  • Access Control Systems
  • Administration
  • Residuals
  • Accountability
  • Summary
Telecommunications and Network Security
  • OSI Reference Model
  • ISO/OSI Layers and Characteristics
  • Topologies
  • LAN Access Methods
  • Wireless
  • System and Security Management
  • Internet Protocols and Security
  • Firewall Terms and Types
  • Web Security
  • Common Attacks
  • Remote Access Security
  • Summary
Information Security Governance and Risk Management
  • Key Concepts
  • Definitions
  • Key Concepts
  • Risk Management
  • Risk Assessment
  • Useful Formulas
  • 3rd Party Governance
  • Information Classification
  • Roles and Responsibilities
  • Written Guidance
  • Policies and Standards
  • Employment Policies
  • Employee Education Programs
  • Change Management
  • Summary
Software Architecture and Design
  • Problems
  • Databases
  • Query Language
  • Object Oriented
  • Applications Beyond the Database
  • Definitions
  • Application System Development
  • Controls
  • Compiled vs. Interpreted
  • Vulnerabilities
  • Botnets
  • Summary
Cryptography
  • Definitions
  • Cryptanalysis Terms
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hybrid Encryption
  • Public Key Infrastructures
  • Hash Functions
  • Digital Signatures
  • Protocol Based
  • Pretty Good Privacy
  • Cracking Techniques
  • Summary
Security Architecture and Design
  • Abstract Levels
  • Computer Hardware
  • Operating Systems
  • Processors
  • Types of Storage
  • Information Security Architecture
  • Open and Closed Systems
  • Access Controls
  • Architectural Foundation
  • Modes of Operation
  • Certification and Accreditation
  • Evaluation Criteria
  • Security Models
  • Summary
Operations Security
  • Threats in an Operating Environment
  • Control Categories
  • Accountability
  • Trusted Recovery
  • Management and Administrative Control
  • Due Care and Diligence
  • Hardware and Software Controls
  • Email and Fax
  • Privilege
  • Physical Access
  • Monitoring Techniques
  • Problem Management
  • Threats and Vulnerabilities
  • Defence in Depth
  • Summary
Business Continuity and Disaster Recovery
  • The Basics
  • Reasons for BCP
  • Key Concepts
  • Definitions
  • Business Continuity Life Cycle
  • Project Initiation
  • Business Impact Analysis
  • Assessing Risk
  • Recovery Strategies
  • Off-Site Requirements
  • Data Redundancy
  • System Backups
  • Plan Development
  • Testing and Maintenance
  • Stages in an Incident
  • Summary
Legal Requirements and Investigations
  • Ethics
  • Code of Ethics
  • Laws
  • Intellectual Property
  • Proprietary Rights
  • Liability
  • Computer Crime
  • Computer Crime Laws
  • Computer Investigation
  • Investigation Steps
  • Computer Forensics
  • Evidence Admissibility
  • Summary
Physical and Environmental Security
  • Physical Security
  • Crime Prevention
  • Site Design and Configuration
  • Boundary Protection
  • Computing Facility Requirements
  • Fire Prevention
  • Fire Suppression
  • Fire Classes
  • Media Protection
  • Access Controls
  • Physical Security
  • Summary
Course Summary


Course Syllabus
Access Control
  • General Concepts
  • Authentication
  • Principles
  • Types and Categories
  • Reference Monitor
  • Techniques
  • Models
  • Passwords
  • Smart Cards
  • Biometrics
  • Access Control Systems
  • Administration
  • Residuals
  • Accountability
  • Summary

  • General Concepts

  • Authentication

  • Principles

  • Types and Categories

  • Reference Monitor

  • Techniques

  • Models

  • Passwords

  • Smart Cards

  • Biometrics

  • Access Control Systems

  • Administration

  • Residuals

  • Accountability

  • Summary

  • Telecommunications and Network Security
    • OSI Reference Model
    • ISO/OSI Layers and Characteristics
    • Topologies
    • LAN Access Methods
    • Wireless
    • System and Security Management
    • Internet Protocols and Security
    • Firewall Terms and Types
    • Web Security
    • Common Attacks
    • Remote Access Security
    • Summary

  • OSI Reference Model

  • ISO/OSI Layers and Characteristics

  • Topologies

  • LAN Access Methods

  • Wireless

  • System and Security Management

  • Internet Protocols and Security

  • Firewall Terms and Types

  • Web Security

  • Common Attacks

  • Remote Access Security

  • Summary

  • Information Security Governance and Risk Management
    • Key Concepts
    • Definitions
    • Key Concepts
    • Risk Management
    • Risk Assessment
    • Useful Formulas
    • 3rd Party Governance
    • Information Classification
    • Roles and Responsibilities
    • Written Guidance
    • Policies and Standards
    • Employment Policies
    • Employee Education Programs
    • Change Management
    • Summary

  • Key Concepts

  • Definitions

  • Key Concepts

  • Risk Management

  • Risk Assessment

  • Useful Formulas

  • 3rd Party Governance

  • Information Classification

  • Roles and Responsibilities

  • Written Guidance

  • Policies and Standards

  • Employment Policies

  • Employee Education Programs

  • Change Management

  • Summary

  • Software Architecture and Design
    • Problems
    • Databases
    • Query Language
    • Object Oriented
    • Applications Beyond the Database
    • Definitions
    • Application System Development
    • Controls
    • Compiled vs. Interpreted
    • Vulnerabilities
    • Botnets
    • Summary

  • Problems

  • Databases

  • Query Language

  • Object Oriented

  • Applications Beyond the Database

  • Definitions

  • Application System Development

  • Controls

  • Compiled vs. Interpreted

  • Vulnerabilities

  • Botnets

  • Summary

  • Cryptography
    • Definitions
    • Cryptanalysis Terms
    • Symmetric Encryption
    • Asymmetric Encryption
    • Hybrid Encryption
    • Public Key Infrastructures
    • Hash Functions
    • Digital Signatures
    • Protocol Based
    • Pretty Good Privacy
    • Cracking Techniques
    • Summary

  • Definitions

  • Cryptanalysis Terms

  • Symmetric Encryption

  • Asymmetric Encryption

  • Hybrid Encryption

  • Public Key Infrastructures

  • Hash Functions

  • Digital Signatures

  • Protocol Based

  • Pretty Good Privacy

  • Cracking Techniques

  • Summary

  • Security Architecture and Design
    • Abstract Levels
    • Computer Hardware
    • Operating Systems
    • Processors
    • Types of Storage
    • Information Security Architecture
    • Open and Closed Systems
    • Access Controls
    • Architectural Foundation
    • Modes of Operation
    • Certification and Accreditation
    • Evaluation Criteria
    • Security Models
    • Summary

  • Abstract Levels

  • Computer Hardware

  • Operating Systems

  • Processors

  • Types of Storage

  • Information Security Architecture

  • Open and Closed Systems

  • Access Controls

  • Architectural Foundation

  • Modes of Operation

  • Certification and Accreditation

  • Evaluation Criteria

  • Security Models

  • Summary

  • Operations Security
    • Threats in an Operating Environment
    • Control Categories
    • Accountability
    • Trusted Recovery
    • Management and Administrative Control
    • Due Care and Diligence
    • Hardware and Software Controls
    • Email and Fax
    • Privilege
    • Physical Access
    • Monitoring Techniques
    • Problem Management
    • Threats and Vulnerabilities
    • Defence in Depth
    • Summary

  • Threats in an Operating Environment

  • Control Categories

  • Accountability

  • Trusted Recovery

  • Management and Administrative Control

  • Due Care and Diligence

  • Hardware and Software Controls

  • Email and Fax

  • Privilege

  • Physical Access

  • Monitoring Techniques

  • Problem Management

  • Threats and Vulnerabilities

  • Defence in Depth

  • Summary

  • Business Continuity and Disaster Recovery
    • The Basics
    • Reasons for BCP
    • Key Concepts
    • Definitions
    • Business Continuity Life Cycle
    • Project Initiation
    • Business Impact Analysis
    • Assessing Risk
    • Recovery Strategies
    • Off-Site Requirements
    • Data Redundancy
    • System Backups
    • Plan Development
    • Testing and Maintenance
    • Stages in an Incident
    • Summary

  • The Basics

  • Reasons for BCP

  • Key Concepts

  • Definitions

  • Business Continuity Life Cycle

  • Project Initiation

  • Business Impact Analysis

  • Assessing Risk

  • Recovery Strategies

  • Off-Site Requirements

  • Data Redundancy

  • System Backups

  • Plan Development

  • Testing and Maintenance

  • Stages in an Incident

  • Summary

  • Legal Requirements and Investigations
    • Ethics
    • Code of Ethics
    • Laws
    • Intellectual Property
    • Proprietary Rights
    • Liability
    • Computer Crime
    • Computer Crime Laws
    • Computer Investigation
    • Investigation Steps
    • Computer Forensics
    • Evidence Admissibility
    • Summary

  • Ethics

  • Code of Ethics

  • Laws

  • Intellectual Property

  • Proprietary Rights

  • Liability

  • Computer Crime

  • Computer Crime Laws

  • Computer Investigation

  • Investigation Steps

  • Computer Forensics

  • Evidence Admissibility

  • Summary

  • Physical and Environmental Security
    • Physical Security
    • Crime Prevention
    • Site Design and Configuration
    • Boundary Protection
    • Computing Facility Requirements
    • Fire Prevention
    • Fire Suppression
    • Fire Classes
    • Media Protection
    • Access Controls
    • Physical Security
    • Summary

  • Physical Security

  • Crime Prevention

  • Site Design and Configuration

  • Boundary Protection

  • Computing Facility Requirements

  • Fire Prevention

  • Fire Suppression

  • Fire Classes

  • Media Protection

  • Access Controls

  • Physical Security

  • Summary

  • Course Summary
    "

    Certified Information Systems Security Professional (CISSP)

    Special Emagister price

    £ 195 £ 295 VAT inc.