Certified Information Systems Security Professional (CISSP) 2015

80 Hours / 12 Months / Self-Paced

Course Overview:

The Certified Information Systems Security Professional (CISSP) 2015 course covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge.  

The new eight domains are:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². (ISC)² promotes the CISSP exam as an aid to evaluating personnel performing information security functions.  Candidates for this exam are typically network security professionals and system administrators with at least four years of direct work experience in two or more of the ten test domains.  As the first ANSI ISO accredited credential in the field of information security, the Certified Information Systems Security Professional (CISSP) certification provides information security professionals with not only an objective measure of competence, but a globally recognized standard of achievement. 

Course Outline:

Module 1 - The CISSP Exam

  • Course Introduction
  • CISSP Certification Goals
  • Security Professional Certification Value
  • Exam Common Body of Knowledge
  • Becoming a CISSP

Module 2 - Cryptography

  • Cryptography Concepts
  • History of Cryptography
  • Cryptosystem Features
  • Encryption Systems
  • Substitution Ciphers
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Message Integrity
  • Digital Signatures
  • Public Key Infrastructure
  • Trusted Platform Module
  • Encryption Communication Levels
  • E-Mail Security
  • Internet Security
  • Cryptography Attacks

Module 3 - Physical (Environmental) Security

  • Threat Mitigation Techniques
  • Geographical-Man Made and Political Threats
  • Site and Facility Design
  • Perimeter Security
  • Building and Internal Security
  • Secure Data Centers and Fire Detection Systems
  • Types of Power Issues
  • HVAC Guidelines
  • Equipment Security and Personal Security

Module 4 - Security Architecture and Design

  • Security Model Concepts
  • System Architecture
  • Computing Platforms
  • Virtual Computing and Security Services
  • System Components
  • Memory Concepts
  • Enforcing Process Security and Multitasking
  • System Security Architecture
  • Security Models and Modes
  • System Evaluation and Assurance Levels
  • Certification and Accreditation
  • Security Architecture Threats
  • Database Security and Distributed Systems Security

Module 5 - Access Control

  • Access Control Concepts
  • Identification and Authentication
  • Password Types and Management
  • Ownership-Character-Physiological-Behavioral Factors
  • Biometric Considerations
  • Authorization Concepts
  • User Accountability
  • Vulnerability Assessment
  • Penetration Testing and Threat Modeling
  • Access Control Categories-Types-Models and Administration
  • Provisioning Life Cycle and Access Control Monitoring
  • Access Control Threats

Module 6 - Software Development Security

  • System Development Life Cycle
  • Software Testing and Validation
  • Software Development Security Best Practices
  • Software Development Methods
  • Programming Languages
  • Database Architecture and Models
  • Database Interface Languages
  • Data Warehouse-Mining and Threats
  • Database and Application Access Control
  • Monitoring for Problems
  • Software Threats and Security

Module 7 - Information Security Governance and Risk Management

  • Principles and Terms
  • Security Frameworks and Methodologies
  • Risk Assessment
  • Asset Values-Vulnerabilities and Threats
  • Quantitative Risk Analysis
  • Safeguard Selection
  • Risk Management
  • Security Governance Components
  • Security Policies
  • Classification Life Cycle
  • Responsibilities and Roles
  • Personnel Security
  • Security Awareness Training

Module 8 - Telecommunications and Network Security

  • OSI and TCIP Models
  • IP Addressing
  • Transmission Methods
  • Types of Cabling
  • Network Topologies
  • Network Protocols and Services
  • Network Routing and Devices
  • Network Connection Types
  • Network Authentication
  • Wireless Technologies
  • WLAN Security Methods
  • Network Threats and Cabling Behaviors

Module 9 - Operation Security

  • Operation Security Concepts
  • Protecting Tangible and Intangible Assets
  • Asset and Media Management
  • Storage Options
  • Network and Resource Management
  • Incident Response and Change Management
  • Patch Management-Audit and Review
  • Threats and Preventative Measures
  • Trusted Paths-Trusted Recovery and System Hardening
  • Monitoring and Reporting

Module 10 - Business Continuity and Disaster Recovery

  • Business Continuity and Disaster Recovery Concepts
  • BIA Development
  • Business Continuity Planning
  • Preventive Controls
  • Recovery Strategies
  • Data Backup Types
  • Data Recovery Terms
  • Critical Teams and Duties
  • BCP Testing

Module 11 - Legal, Regulations and Investigations and Compliance

  • Digital Crime
  • Computer Crime Concepts
  • Major Legal Systems
  • Intellectual Property Law
  • Privacy
  • Liability
  • Incident Response
  • Forensic and Digital Investigations
  • Evidence
  • Security Professional Ethics
  • Course Outro

All necesary materials are included.

Certification(s):

This course prepares students to take the Certified Information Systems Security Professional (CISSP) 2015 certification exam.


System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended.
Hardware Requirements:
  • Minimum Pentium 400 Mhz CPU or G3 Macintosh. 1 GHz or greater CPU recommended.
  • 256MB RAM minimum. 1 GB RAM recommended.
  • 800x600 video resolution minimum. 1025x768 recommended.
  • Speakers/Headphones to listen to Dialogue steaming audio sessions.
  • A microphone to speak in Dialogue streaming audio sessions.
Operating System Requirements:
  • Windows Vista, 7, 8, 8.1, 9, 10
  • Mac OSX 10 or higher.
  • OpenSUSE Linux 9.2 or higher.
Web Browser Requirements:
  • Google Chrome is recommended.
  • Firefox 13.x or greater.
  • Internet Explorer 6.x or greater.
  • Safari 3.2.2 or greater.
Software Requirements:
  • Adobe Flash Player 6 or greater.
  • Oracle Java 7 or greater.
  • Adobe Reader 7 or greater.
Web Browser Settings:
  • Accept Cookies
  • Disable Pop-up Blocker.


** Outlines are subject to change, as courses and materials are updated. Software is not included with the purchase of the course, unless otherwise specified. Students are responsible for the purchase and installation of the necessary course software. **