Certified Information Systems Security Pro (CISSP) 2015

Prepare for CISSP Certification

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.

A hand holding a digital icon of information.

Job Outlook for Computer and Information Security Analysts

According the Bureau of Labor Statistics the employment of information security analysts is expected to grow 31% during the next few years, which equals 40,900 new jobs.

The BLS also states that the average salary for these analysts is just under $104,000 per year with top earners making more than $163,000.

Course Objectives

Understand the basics of telecommunication and network security concepts, required components for minimizing security risks, securing channels of communication, and techniques for preventing and detecting network-based attacks.

Identify the key terms and processes of security operations and how to protect and control information processing assets in a centralized or distributed environment in this CISSP training.

Define and apply information security governance and Risk Management Framework including the policies, concepts, principles, structures and standards that are established for the protection of information assets and how to assess the effectiveness of that protection.

Gain the required skills to design the architecture and manage IT security in an enterprise environment through this authorized CISSP course.

Prerequisites and Requirements

There are no prerequisites for this course.

This course can be taken on either a PC or Mac.

Instructor

Brandon Smith

  • Module 1: Security and Risk Management
            1.1 Introduction
            1.2 CIA Triad Security Governance Part 1
            1.3 CIA Triad Security Governance Part 2
            1.4 Compliance Legal and Regulatory Issues Part 1
            1.5 Compliance Legal and Regulatory Issues Part 2
            1.6 Understanding Professional Ethics Part 1
            1.7 Understanding Professional Ethics Part 2
            1.8 Risk Management Part 1
            1.9 Risk Management Part 2
            1.10 Threat Modeling Acquisition Strategy and Practice Security Awareness and Training Part 1
            1.11 Threat Modeling Acquisition Strategy and Practice Security Awareness and Training Part 2

    Module 2: Asset Security
            2.1 Asset Security Part 1
            2.2 Asset Security Part 2

    Module 3: Security Engineering
            3.1 Engineering and Management of Security Part 1
            3.2 Engineering and Management of Security Part 2
            3.3 Engineering and Management of Security Part 3
            3.4 Engineering and Management of Security Part 4
            3.5 Engineering and Management of Security Part 5
            3.6 Engineering and Management of Security Part 6

    Module 4: Communication and Network Security
            4.1 Apply Secure Design Principles to Networks Part 1
            4.2 Apply Secure Design Principles to Networks Part 2
            4.3 Apply Secure Design Principles to Networks Part 3