Course : CISSP, IS Security, Certification Prep

CISSP, IS Security, Certification Prep

Download in PDF format Share this course by email 2


This training details security concepts for obtaining CISSP certification. It will prepare you to take the exam by covering the entire Common Body of Knowledge (CBK), the shared core security knowledge defined by the International Information Systems Security Certification Consortium (ISC)².


Inter
In-house
Custom

Practical course in person or remote class

Ref. CIS
Price : 3690 € E.T.
  5d - 35h00




This training details security concepts for obtaining CISSP certification. It will prepare you to take the exam by covering the entire Common Body of Knowledge (CBK), the shared core security knowledge defined by the International Information Systems Security Certification Consortium (ISC)².

Intended audience
IS security manager or any other person who plays a role in IS security policy.

Prerequisites
Basic knowledge of networks and operating systems as well as information security. Basic knowledge of auditing and business continuity standards.

Course schedule

IS security and the (ISC)²'s CBK

  • Information system security.
  • The why of CISSP certification.
  • Overview of the scope covered by the CBK.

Security management and operations security.

  • Security management practices. Writing policies, directives, procedures, and standards for security.
  • The security awareness program, management practices, risk management, etc.
  • Operations security: Preventive, detective, and corrective measures, roles and responsibilities of those involved.
  • Best practices, security when hiring, etc.

Architecture, security models, and access control

  • Architecture and security models: System architecture, theoretical informational security models.
  • System evaluation methods, operational security modes, etc.
  • Access control systems and methodologies. Categories and types of access controls.
  • Access to data and systems, intrusion prevention systems (IPS) and intrusion detection systems (IDS).
  • Audit trails, threats and attacks related to access control, etc.

Cryptography and development security

  • Cryptography. Concepts, symmetrical and asymmetrical cryptography.
  • Hash functions, public key infrastructure, etc.
  • Security of application and system developments. Databases, data warehouses.
  • The development cycle, object-oriented programming, expert systems, artificial intelligence, etc.

Telecom and network security

  • Telecom and network security. Basic concepts, TCP/IP model, network and security equipment.
  • Security protocols, attacks on networks, data backups, wireless technologies, VPNs, etc.

Continuity of business, laws, ethics, and physical security.

  • Continuity of operations and disaster recovery plan.
  • Business continuity plan, disaster recovery plan.
  • Emergency measures, training and awareness program, crisis communications, exercises and tests, etc.
  • Law, investigations, and ethics: Civil, criminal, and administrative law, intellectual property.
  • Legal framework of investigations, evidence admissibility rules, etc.
  • Physical security. Threats and vulnerabilities related to the environment of a place, scope of security.
  • Layout requirements, site monitoring, staff protection, etc.


Certification
To take the certification exam, you must register on the ISC2 website and submit an eligibility packet.

Customer reviews
4,3 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class