This course provides in-depth coverage of the eight domains required to pass the CISSP exam:
Security and Risk Management
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Software Development Security
Who Should Attend?
Anyone whose position requires CISSP certification
Individuals who want to advance within their current computer security careers or migrate to a related career
CompTIA Security+ Certification Prep Course
Cybersecurity Specialization: Architecture and Policy
Cybersecurity Specialization: Governance, Risk, and Compliance
What You Will Learn:
1. Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)
Understand and Apply Concepts of Confidentiality, Integrity, and Availability
Apply Security Governance Principles
Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
Understand Business Continuity Requirements
Contribute to Personnel Security Policies
Understand and Apply Risk Management Concepts
Understand and Apply Threat Modeling
Integrate Security Risk Considerations into Acquisitions Strategy and Practice
Establish and Manage Security Education, Training, and Awareness
2. Asset Security (Protecting Security of Assets)
Classify Information and Supporting Assets
Determine and Maintain Ownership
Ensure Appropriate Retention
Determine Data Security Controls
Establish Handling Requirements
3. Security Engineering (Engineering and Management of Security)
Implement and Manage an Engineering Life Cycle Using Security Design Principles
Understand Fundamental Concepts of Security Models
Select Controls and Countermeasures Based Upon Information Systems Security Standards
Understand the Security Capabilities of Information Systems
Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Assess and Mitigate Vulnerabilities in Web-based Systems
Assess and Mitigate Vulnerabilities in Mobile Systems
Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
Apply Secure Principles to Site and Facility Design
Design and Implement Facility Security
4. Communications and Network Security (Designing and Protecting Network Security)
Apply Secure Design Principles to Network Architecture
Securing Network Components
Design and Establish Secure Communication Channels
Prevent or Mitigate Network Attacks
5. Identity and Access Management (Controlling Access and Managing Identity)
Control Physical and Logical Access to Assets
Manage Identification and Authentication of People and Devices
Integrate Identity as a Service (IDaaS)
Integrate Third-Party Identity Services
Implement and Manage Authorization Mechanisms
Prevent or Mitigate Access Control Attacks
Manage the Identity and Access Provisioning Life Cycle
6. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
Design and Validate Assessment and Test Strategies
Conduct Security Control Testing
Collect Security Process Data
Conduct or Facilitate Internal and Third-Party Audits
Secure the Provisioning of Resources through Configuration Management
Understand and Apply Foundational Security Operations Concepts
Employ Resource Protection Techniques
Conduct Incident Response
Operate and Maintain Preventative Measures
Implement and Support Patch and Vulnerability Management
Participate in and Understand Change Management Processes
Implement Recovery Strategies
Implement Disaster Recovery Processes
Test Disaster Recovery Plan
Participate in Business Continuity Planning
Implement and Manage Physical Security
Participate in Personnel Safety
8. Software Development Security (Understanding, Applying, and Enforcing Software Security)
Understand and Apply Security in the Software Development Life Cycle
Enforce Security Controls in the Development Environment
Assess the Effectiveness of Software Security
Assess Software Acquisition Security
View More View More
This course is the most comprehensive review of information security concepts and industry best practices, and focuses on the eight domains of the CISSP CBK (Common Body of Knowledge) that are covered in the CISSP exam. You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.
The CISSP exam is challenging, but the benefits are immense. Due to its comprehensive breadth, CISSP is the de facto certification to show competence in cyber roles. It’s also one of the top-paying certifications in IT.
This course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.
This class is independent of and not affiliated with (ISC)2.
RELATED CERTIFICATIONS CISSP - Certified Information Systems Security Professional
* Terms and conditions may apply. Learn more about our Microsoft training exclusives by contacting email@example.com
Live Virtual: Get engaging and impactful live, instructor-led training, regardless of your location.
Our Virtual Classroom Live online training format combines premium skills development technologies and our industry-leading instructors, content, exercises and peer collaboration to ensure that you get the highest quality professional development experience possible. Gain the skills and expertise that matter from the convenience of your home, work or wherever you have an Internet connection.
Engage with your instructor and fellow students via a learning platform and course material designed to ensure a stimulating and productive skills development experience.
Choose from sessions across a variety of time zones for training options that suit your schedule. Save time, money and effort without sacrificing learning quality by accessing our expert-led online training from the convenience of your home, office or anywhere with an Internet connection.
Attend from your PC, Mac or any iOS/Android tablet or smartphone. Connect with the class through your device audio or via toll-free phone number†, depending on available technologies and your interaction preferences.
Gain core knowledge and experience to successfully implement and manage security programs and prepare for the CISSP certification.