Certified Information Systems Security Professional (CISSP)
Course
Online
Description
-
Type
Course
-
Level
Intermediate
-
Methodology
Online
-
Duration
12 Months
-
Start date
Different dates available
-
Online campus
Yes
-
Delivery of study materials
Yes
-
Support service
Yes
-
Virtual classes
Yes
Completion Certificate awarded upon completion to show employers your new skills
Free upgrade on to our state of the art platform
Career Advice available on completion
12 Months unlimited Access
Certified Information Systems Security Professional (CISSP)
Developed and maintained by the International Information Systems Security Certification Consortium (ISC)2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK).
The CISSP course provides you with the knowledge and skills to pass the CISSP certification, after which you’ll have the ability to manage, operate, develop and plan an effective network security infrastructure.
This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security.
Facilities
Location
Start date
Start date
About this course
Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.
Exam Information
CISSP exams are booked through Isaca (Please use the link below to locate your nearest testing centre)
Reviews
Subjects
- Fire
- Risk
- International
- Information Systems
- Network
- Network security
- Network Training
- IT risk
- Systems
- Design
Course programme
Access Control
- General Concepts
- Authentication
- Principles
- Types and Categories
- Reference Monitor
- Techniques
- Models
- Passwords
- Smart Cards
- Biometrics
- Access Control Systems
- Administration
- Residuals
- Accountability
- Summary
- OSI Reference Model
- ISO/OSI Layers and Characteristics
- Topologies
- LAN Access Methods
- Wireless
- System and Security Management
- Internet Protocols and Security
- Firewall Terms and Types
- Web Security
- Common Attacks
- Remote Access Security
- Summary
- Key Concepts
- Definitions
- Key Concepts
- Risk Management
- Risk Assessment
- Useful Formulas
- 3rd Party Governance
- Information Classification
- Roles and Responsibilities
- Written Guidance
- Policies and Standards
- Employment Policies
- Employee Education Programs
- Change Management
- Summary
- Problems
- Databases
- Query Language
- Object Oriented
- Applications Beyond the Database
- Definitions
- Application System Development
- Controls
- Compiled vs. Interpreted
- Vulnerabilities
- Botnets
- Summary
- Definitions
- Cryptanalysis Terms
- Symmetric Encryption
- Asymmetric Encryption
- Hybrid Encryption
- Public Key Infrastructures
- Hash Functions
- Digital Signatures
- Protocol Based
- Pretty Good Privacy
- Cracking Techniques
- Summary
- Abstract Levels
- Computer Hardware
- Operating Systems
- Processors
- Types of Storage
- Information Security Architecture
- Open and Closed Systems
- Access Controls
- Architectural Foundation
- Modes of Operation
- Certification and Accreditation
- Evaluation Criteria
- Security Models
- Summary
- Threats in an Operating Environment
- Control Categories
- Accountability
- Trusted Recovery
- Management and Administrative Control
- Due Care and Diligence
- Hardware and Software Controls
- Email and Fax
- Privilege
- Physical Access
- Monitoring Techniques
- Problem Management
- Threats and Vulnerabilities
- Defence in Depth
- Summary
- The Basics
- Reasons for BCP
- Key Concepts
- Definitions
- Business Continuity Life Cycle
- Project Initiation
- Business Impact Analysis
- Assessing Risk
- Recovery Strategies
- Off-Site Requirements
- Data Redundancy
- System Backups
- Plan Development
- Testing and Maintenance
- Stages in an Incident
- Summary
- Ethics
- Code of Ethics
- Laws
- Intellectual Property
- Proprietary Rights
- Liability
- Computer Crime
- Computer Crime Laws
- Computer Investigation
- Investigation Steps
- Computer Forensics
- Evidence Admissibility
- Summary
- Physical Security
- Crime Prevention
- Site Design and Configuration
- Boundary Protection
- Computing Facility Requirements
- Fire Prevention
- Fire Suppression
- Fire Classes
- Media Protection
- Access Controls
- Physical Security
- Summary
Certified Information Systems Security Professional (CISSP)