Certified Information Systems Security Professional (CISSP)

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Course Description
Developed and maintained by the International Information Systems Security Certification Consortium (ISC)2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK).
The CISSP course provides you with the knowledge and skills to pass the CISSP certification, after which you'll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security.
Entry Requirement
Candidates must have a minimum of 5 years cumulative paid full-time work experience in two or more of the 8 domains:
Security and Risk Management
Asset Security
Security Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security
Candidates may receive a one-year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list, thus requiring four years of direct full-time professional security work experience in 2 or more of the 8 domains of the CISSP CBK.
Don't have the experience? Become an Associate of (ISC)² by successfully passing the CISSP exam. You'll have 6 years to earn your experience to become a CISSP.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Requirements
Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.
For the best viewing experience on our state-of-the-art eLearning platform we recommend an internet connection of 10Mbps or better. Please also use Google Chrome or Mozilla Firefox as your browser with Adobe Flash Player.

Certification Details
In order to earn your certification, you’ll have to sit an exam after completing your course with us. To prepare you for your exam, we provide interactive quizzes after each module and a mock exam at the end of your course to ensure you’re fully prepared for the real thing. Once you’ve passed with at least 85%, you’ll be ready to book your exam as a private candidate.
Booking your exam is pretty simple, just purchase your exam voucher and schedule your exam. To make life easier, we can help you find an appropriate exam centre and give you all the information you need to secure your place.
Please note that the exam fees aren’t included in the course price.
Got a question about exams? Contact one of our course advisors. We’re happy to help!

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Fire
  • Risk
  • Access
  • Risk Management
  • Information Systems
  • Testing
  • Network
  • Network security
  • Design
  • International
  • Systems
  • Full Time
  • IT risk
  • Network Training

Course programme

Access Control

  • General Concepts
  • Authentication
  • Principles
  • Types and Categories
  • Reference Monitor
  • Techniques
  • Models
  • Passwords
  • Smart Cards
  • Biometrics
  • Access Control Systems
  • Administration
  • Residuals
  • Accountability
  • Summary
Telecommunications and Network Security
  • OSI Reference Model
  • ISO/OSI Layers and Characteristics
  • Topologies
  • LAN Access Methods
  • Wireless
  • System and Security Management
  • Internet Protocols and Security
  • Firewall Terms and Types
  • Web Security
  • Common Attacks
  • Remote Access Security
  • Summary
Information Security Governance and Risk Management
  • Key Concepts
  • Definitions
  • Key Concepts
  • Risk Management
  • Risk Assessment
  • Useful Formulas
  • 3rd Party Governance
  • Information Classification
  • Roles and Responsibilities
  • Written Guidance
  • Policies and Standards
  • Employment Policies
  • Employee Education Programs
  • Change Management
  • Summary
Software Architecture and Design
  • Problems
  • Databases
  • Query Language
  • Object Oriented
  • Applications Beyond the Database
  • Definitions
  • Application System Development
  • Controls
  • Compiled vs. Interpreted
  • Vulnerabilities
  • Botnets
  • Summary
Cryptography
  • Definitions
  • Cryptanalysis Terms
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hybrid Encryption
  • Public Key Infrastructures
  • Hash Functions
  • Digital Signatures
  • Protocol Based
  • Pretty Good Privacy
  • Cracking Techniques
  • Summary
Security Architecture and Design
  • Abstract Levels
  • Computer Hardware
  • Operating Systems
  • Processors
  • Types of Storage
  • Information Security Architecture
  • Open and Closed Systems
  • Access Controls
  • Architectural Foundation
  • Modes of Operation
  • Certification and Accreditation
  • Evaluation Criteria
  • Security Models
  • Summary
Operations Security
  • Threats in an Operating Environment
  • Control Categories
  • Accountability
  • Trusted Recovery
  • Management and Administrative Control
  • Due Care and Diligence
  • Hardware and Software Controls
  • Email and Fax
  • Privilege
  • Physical Access
  • Monitoring Techniques
  • Problem Management
  • Threats and Vulnerabilities
  • Defence in Depth
  • Summary
Business Continuity and Disaster Recovery
  • The Basics
  • Reasons for BCP
  • Key Concepts
  • Definitions
  • Business Continuity Life Cycle
  • Project Initiation
  • Business Impact Analysis
  • Assessing Risk
  • Recovery Strategies
  • Off-Site Requirements
  • Data Redundancy
  • System Backups
  • Plan Development
  • Testing and Maintenance
  • Stages in an Incident
  • Summary
Legal Requirements and Investigations
  • Ethics
  • Code of Ethics
  • Laws
  • Intellectual Property
  • Proprietary Rights
  • Liability
  • Computer Crime
  • Computer Crime Laws
  • Computer Investigation
  • Investigation Steps
  • Computer Forensics
  • Evidence Admissibility
  • Summary
Physical and Environmental Security
  • Physical Security
  • Crime Prevention
  • Site Design and Configuration
  • Boundary Protection
  • Computing Facility Requirements
  • Fire Prevention
  • Fire Suppression
  • Fire Classes
  • Media Protection
  • Access Controls
  • Physical Security
  • Summary
Course Summary

Certified Information Systems Security Professional (CISSP)

Price on request