CISSP: Certified Information Systems Security Professional 2015

Select currency

CISSP: Certified Information Systems Security Professional 2015
Test scorm
Enquire Now

The CISSP: Certified Information Systems Security Professional Certification certification training package from covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge.  

The new eight domains are:

read more

Module 1 - The CISSP Exam

  • Course Introduction
  • CISSP Certification Goals
  • Security Professional Certification Value
  • Exam Common Body of Knowledge
  • Becoming a CISSP

Module 2 - Cryptography

  • Cryptography Concepts 
  • History of Cryptography 
  • Cryptosystem Features
  • Encryption Systems
  • Substitution Ciphers
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Message Integrity
  • Digital Signatures
  • Public Key Infrastructure
  • Trusted Platform Module
  • Encryption Communication Levels
  • E-Mail Security 
  • Internet Security
  • Cryptography Attacks

Module 3 - Physical (Environmental) Security

  • Threat Mitigation Techniques
  • Geographical-Man Made and Political Threats
  • Site and Facility Design
  • Perimeter Security
  • Building and Internal Security
  • Secure Data Centers and Fire Detection Systems
  • Types of Power Issues
  • HVAC Guidelines
  • Equipment Security and Personal Security

Module 4 - Security Architecture and Design

  • Security Model Concepts
  • System Architecture
  • Computing Platforms
  • Virtual Computing and Security Services
  • System Components
  • Memory Concepts
  • Enforcing Process Security and Multitasking 
  • System Security Architecture
  • Security Models and Modes
  • System Evaluation and Assurance Levels
  • Certification and Accreditation
  • Security Architecture Threats
  • Database Security and Distributed Systems Security

Module 5 - Access Control

  • Access Control Concepts
  • Identification and Authentication
  • Password Types and Management
  • Ownership-Character-Physiological-Behavioral Factors
  • Biometric Considerations
  • Authorization Concepts
  • User Accountability
  • Vulnerability Assessment
  • Penetration Testing and Threat Modeling
  • Access Control Categories-Types-Models and Administration
  • Provisioning Life Cycle and Access Control Monitoring 
  • Access Control Threats

Module 6 - Software Development Security

  • System Development Life Cycle
  • Software Testing and Validation
  • Software Development Security Best Practices
  • Software Development Methods
  • Programming Languages
  • Database Architecture and Models
  • Database Interface Languages
  • Data Warehouse-Mining and Threats
  • Database and Application Access Control 
  • Monitoring for Problems
  • Software Threats and Security

Module 7 - Information Security Governance and Risk Management

  • Principles and Terms
  • Security Frameworks and Methodologies
  • Risk Assessment
  • Asset Values-Vulnerabilities and Threats
  • Quantitative Risk Analysis
  • Safeguard Selection
  • Risk Management
  • Security Governance Components
  • Security Policies
  • Classification Life Cycle
  • Responsibilities and Roles
  • Personnel Security
  • Security Awareness Training

Module 8 - Telecommunications and Network Security

  • OSI and TCIP Models
  • IP Addressing
  • Transmission Methods
  • Types of Cabling
  • Network Topologies
  • Network Protocols and Services
  • Network Routing and Devices
  • Network Connection Types
  • Network Authentication
  • Wireless Technologies
  • WLAN Security Methods
  • Network Threats and Cabling Behaviors

Module 9 - Operation Security

  • Operation Security Concepts
  • Protecting Tangible and Intangible Assets
  • Asset and Media Management
  • Storage Options
  • Network and Resource Management
  • Incident Response and Change Management
  • Patch Management-Audit and Review
  • Threats and Preventative Measures
  • Trusted Paths-Trusted Recovery and System Hardening
  • Monitoring and Reporting

Module 10 - Business Continuity and Disaster Recovery

  • Business Continuity and Disaster Recovery Concepts
  • BIA Development
  • Business Continuity Planning
  • Preventive Controls
  • Recovery Strategies
  • Data Backup Types
  • Data Recovery Terms
  • Critical Teams and Duties
  • BCP Testing

Module 11 - Legal, Regulations and Investigations and Compliance

  • Digital Crime
  • Computer Crime Concepts
  • Major Legal Systems
  • Intellectual Property Law
  • Privacy
  • Liability
  • Incident Response
  • Forensic and Digital Investigations
  • Evidence
  • Security Professional Ethics
  • Course Outro
  1. CISSP - Module 1
6
Start
Becoming a CISSP
  1. CISSP - Module 2
7
Start
Cryptography
8
Start
Cryptography Concepts
8
Start
Cryptography Concepts
9
Start
History of Cryptography
10
Start
Cryptosystem Features
11
Start
Encryption Systems
11
Start
Encryption Systems
12
Start
Substitution Ciphers
13
Start
Symmetric Algorithms
13
Start
Symmetric Algorithms
14
Start
Asymmetric Algorithms
15
Start
Message Integrity
16
Start
Digital Signatures
17
Start
Public Key Infrastructure
17
Start
Public Key Infrastructure
18
Start
Trusted Platform Module
19
Start
Encryption Communication Levels
20
Start
E-MAil Security
21
Start
Internet Security
22
Start
Cryptography Attacks
  1. CISSP - Module 3
23
Start
Physical (Environmental) Security
24
Start
Threat Mitigation Techniques
25
Start
Geographical-Man Made and Political Threats
26
Start
Site and Facility Design
27
Start
Perimeter Security
28
Start
Building and Internal Security
29
Start
Secure Data Centers and Fire Detection Systems
30
Start
Types of Power Issues
31
Start
HVAC Guidelines

this is test comment by superadmin

by

Teacher seems like a nice guy, but this course is basically a talking head reading slides straight out of a textbook with seemingly no real world applications.

by David Moore