Programming & Development

Certified Information Systems Security Professional (CISSP)


In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives.

Who Should Attend
The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security.

Course Objectives
Upon successful completion of this course, students will be able to:
implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices.
evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices.
evaluate information systems acquisition, development, and implementation.
evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained.
define the protection policies used to promote the confidentiality, integrity, and availability of information assets.

Course Outline:

Security Governance Principles
Professional Ethics
Security Documentation
Risk Management
Threat Modeling
Business Continuity Plan Fundamentals
Acquisition Strategy and Practice
Personnel Security Policies
Security Awareness and Training
Asset Classification
Privacy Protection
Asset Retention
Data Security Controls
Secure Data Handling
Security in the Engineering Lifecycle
System Component Security
Security Models
Controls and Countermeasures in Enterprise Security
Information System Security Capabilities
Design and Architecture Vulnerability Mitigation
Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Cryptography Concepts
Cryptography Techniques
Site and Facility Design for Physical Security
Physical Security Implementation in Sites and Facilities
Organizational Security
The Application of Security Concepts
Information Classification
Security Program Development
Risk Management
Software Configuration Management
Software Controls
Database System Security
Ciphers and Cryptography
Symmetric-Key Cryptography
Asymmetric-Key Cryptography
Hashing and Message Digests
Email, Internet, and Wireless Security
Cryptographic Weaknesses
Physical Access Control
Physical Access Monitoring
Physical Security Methods
Facilities Security

Enroll in this course


Need Help Finding The Right Training Solution?

Our training advisors are here for you.