CISSP - Fast Track

Training

In London

Price on request

Description

  • Type

    Training

  • Location

    London

  • Start date

    Different dates available

This CISSP Fast Track course is an intensive, in-depth training program that has consistently achieved over 90% pass rates in the final CISSP examination.               

Facilities

Location

Start date

London
See map
EC2N

Start date

Different dates availableEnrolment now open
Different dates availableEnrolment now open
Different dates availableEnrolment now open
Different dates availableEnrolment now open
Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • IT
  • Security
  • IT Security
  • Access
  • Systems
  • Algorithms
  • IT Development
  • Access Control

Course programme

Description
This CISSP Fast Track course is an intensive, in-depth training program that has consistently achieved over 90% pass rates in the final CISSP examination.
Who is this course suitable for?
Experienced security professionals who want to expand their knowledge and gain an internationally recognized certification. Anyone with suitable experience can attend our course.
What does this course cover?
The delivery method uses the internationally recognised mind mapping techniques to help the candidate assimilate and "fix" new information rapidly and repeatedly into their own body of knowledge.
Each student will get a CISSP training kit, the most comprehensive training package available, including:
· CISSP Manual and
· Access to complete CISSP training online for a period of 3 months from the date of payment
The goal of the course is to prepare you for the challenging CISSP examination by covering the syllabus defined in the (ISC)2 common body of knowledge.

During the course you will learn:

The 10 CISSP Domains:
Security Management Practices
· Types of Security Controls
· Components of a Security Program
· Security Policies, Standards, Procedures, and Guidelines
· Risk Management and Analysis Threats,
· Vulnerabilities and Corresponding Administrative Controls
Access Control Systems and Methodology
· Identification, Authentication, and Authorization Techniques and Technologies
· Biometrics, Smart Cards, and Memory Cards
· Single Sign-On Technologies and Their Risks
· Discretionary versus Mandatory Access Control Models
· Rule-based and Role-based Access Control
· Object Reuse Issues and Social Engineering
· Specific Attacks and Countermeasures
Telecommunications, Networks, and Internet Security
· TCP\IP Suite
· LAN, MAN, and WAN
· Topologies and Technologies
· Cable Types and Issues
· Broadband versus Baseband
· Technologies
· Ethernet and Token Ring
· Network Devices
· Firewall Types and Architectures
· Dial-up and VPN Protocols
· DNS and NAT Network Services
· FDDI and SONET X.25, Frame Relay, and ATM
· Wireless LANs and Security Issues
· Cell Phone Fraud
· VoIP
· Types of Attacks
Cryptography
· Historical Uses of Cryptography
· Block and Stream Ciphers
· Explanation and Uses of Symmetric Key Algorithms
· Explanation and Uses of Asymmetric Key Algorithms
· Public Key Infrastructure Components
· Data Integrity Algorithms and Technologies
· IPSec, SSL, SSH, and PGP
· Secure Electronic Transactions
· Key Management
EnterpriseSecurity Architecture
· Critical Components of Every Computer
· Processes and Threads
· The OSI Model
· Operating System Protection Mechanisms
· Ring Architecture and Trusted Components
· Virtual Machines, Layering, and Virtual Memory
· Access Control Models
· Certification and Accreditation
· Covert Channels and Types of Attacks
· Buffer Overflows and Data
· Validation Attacks
Operations Security
· Operations Department Responsibilities Personnel and Roles
· Media Library and Resource Protection
· Types of Intrusion Detection Systems
· Vulnerability and Penetration Testing
· Facsimile Security
· RAID, Redundant Servers, and Clustering
Applications & Systems Development
· Software Development Models
· Prototyping and CASE Tools
· Object-Oriented Programming
· Middleware Technologies
· ActiveX, Java, OLE, and ODBC
· Database Models
· Relational Database Components
· CGI, Cookies, and Artificial Intelligence
· Different Types of Malware
Business Continuity Planning
· Roles and Responsibilities
· Liability and Due Care Issues
· Business Impact Analysis
· Identification of Different Types of Threats
· Development Process of BCP
· Backup Options
Law, Investigation, and Ethics
· Different Ethics Sets
· Computer Criminal Profiles
· Types of Crimes
· Liability and Due Care Topics
· Privacy Laws and Concerns
· Complications of Computer
· Crime Investigation
· Types of Evidence and How to Collect It
· Forensics
· Legal Systems
Physical Security
· Facility Location and Construction Issues
· Physical Vulnerabilities and Threats
· Hardware Metrics and Backup Options
· Electrical Power Issues and Solutions
· Fire Detection and Suppression
· Fencing, Lighting, and Perimeter Protection
· Physical Intrusion Detection Systems
Are there entry requirements?
This course is not for beginners. Delegates should already have a working knowledge of IT Security and practical experience of at least some of the following 10 domains..

Please note that even after successful completion of the exam, only those who can demonstrate 4 years of experience amongst the 10 domains will be granted the CISSP certification. Others will be able to call themselves CISSP Associate until they gain the 4 years of experience.
Additional info
Please note: the exam is not taken during this training course. It needs to be booked & paid for directly with the exam board, please contact us for more details.
Read what others have said about our training courses
What's included?
Our package includes lunch and refreshments, and full course materials.

Although the course is non-residential, we offer help finding appropriate hotels, close to the training venue. To take advantage of this offer, drop us an email after you book your course.

CISSP - Fast Track

Price on request