Certified Information Systems Security Professional (CISSP)
Who Should Attend
The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security.
Upon successful completion of this course, students will be able to:
implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices.
evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices.
evaluate information systems acquisition, development, and implementation.
evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained.
define the protection policies used to promote the confidentiality, integrity, and availability of information assets.
Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training
Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling
Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities
Organizational Security The Application of Security Concepts
Information Classification Security Program Development
Risk Management Ethics
Software Configuration Management Software Controls Database System Security
Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses
Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security
Enroll in this course
Select a start date for your 5 Day course
This course begins at 9:00 Eastern
And ends at 17:00 Eastern
Questions About This Course?
Need Help Finding The Right Training Solution?
Our training advisors are here for you.