CISSP with Exam Preparation and review
CLASS DATE(s):
5/18/2020 - 5/22/2020
7/20/2020 - 7/24/2020

COURSE LENGTH: 5 Days

COURSE COST: $2995.00

COURSE TIMES: 9:00am - 4:30pm

Printable version of this course
print
Register for this course
register

COURSE OVERVIEW

Certified Information System Security Professional (CISSP) is one of the computer industry's most comprehensive and prestigious certification programs for assessing and maintaining security IT networking and management skills.

Information system security is a unique aspect of business, government, and society today. Professionals who work to protect and secure information systems need a unique set of qualifications, of which technical knowledge is only one component.

This certificate covers security theory and management principals at a high level. The program is taught by top security industry professionals with real world experience and a passion for sharing their experience and knowledge.

Although there are no hands-on computer exercises, this course will build a strong conceptual knowledge of security techniques and prepare students for the CISSP certification exam as well as build their skill sets to move forward in real world computing careers.

AUDIENCE AND PREREQUISITES

This training would be beneficial for individuals looking for IT job positions such as; Network Administrator, Windows Administrator, Windows System Engineer, Linux Administrator, Network Security Specialist, Information Security Manager or Chief Security Officer.

This course is designed for individuals who have Information Systems security background and wish to prepare for skills in the planning, management and/or administration of information security. Related experience must include a minimum of at least five years direct full-time security professional work experience in two or more of the ten domains.

  

*Course Cost listed does not include the cost of courseware or Exam. Please refer to your Invoice for the additional cost. If you have any questions, please contact us (learn@vtec.org or 207-775-0244).

This course to run is subject to minimum enrollment. This course may run as a virtual live on line class if the minimum enrollment has not been met. Exam Cost $ 699

COURSE TOPICS:


Security and Risk Management
Understand and Apply Concepts of Confidentiality, Integrity, and Availability
Apply Security Governance Principles
Compliance
Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
Understand Business Continuity Requirements
Contribute to Personnel Security Policies
Understand and Apply Risk Management Concepts
Understand and Apply Threat Modeling
Integrate Security Risk Considerations into Acquisitions Strategy and Practice
Establish and Manage Security Education, Training, and Awareness

Asset Security
Classify Information and Supporting Assets
Determine and Maintain Ownership
Protect Privacy
Ensure Appropriate Retention
Determine Data Security Controls
Establish Handling Requirements

Security Engineering
Implement and Manage an Engineering Life Cycle Using Security Design Principles
Understand Fundamental Concepts of Security Models
Select Controls and Countermeasures Based Upon Information Systems Security Standards
Understand the Security Capabilities of Information Systems
Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Assess and Mitigate Vulnerabilities in Web-based Systems
Assess and Mitigate Vulnerabilities in Mobile Systems
Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
Apply Cryptography
Apply Secure Principles to Site and Facility Design
Design and Implement Facility Security

Communications and Network Security
Apply Secure Design Principles to Network Architecture
Securing Network Components
Design and Establish Secure Communication Channels
Prevent or Mitigate Network Attacks

Identity and Access Management
Control Physical and Logical Access to Assets
Manage Identification and Authentication of People and Devices
Integrate Identity as a Service (IDaaS)
Integrate Third-Party Identity Services
Implement and Manage Authorization Mechanisms
Prevent or Mitigate Access Control Attacks
Manage the Identity and Access Provisioning Life Cycle

Security Assessment and Testing
Design and Validate Assessment and Test Strategies
Conduct Security Control Testing
Collect Security Process Data
Conduct or Facilitate Internal and Third-Party Audits

Security Operations
Understand and Support Investigations
Understand Requirements for Investigation Types
Conduct Logging and Monitoring Activities
Secure the Provisioning of Resources through Configuration Management
Understand and Apply Foundational Security Operations Concepts
Employ Resource Protection Techniques
Conduct Incident Response
Operate and Maintain Preventative Measures
Implement and Support Patch and Vulnerability Management
Participate in and Understand Change Management Processes
Implement Recovery Strategies
Implement Disaster Recovery Processes

.
Test Disaster Recovery Plan
Participate in Business Continuity Planning
Implement and Manage Physical Security
Participate in Personnel Safety

Software Development Security
Understand and Apply Security in the Software Development Life Cycle
Enforce Security Controls in the Development Environment
Assess the Effectiveness of Software Security
Assess Software Acquisition Security