Certified information Systems Security Professional(CISSP) Bootcamp

Similar documents
E-guide CISSP Prep: 4 Steps to Achieve Your Certification

Course Outline. CISSP - Certified Information Systems Security Professional

E-guide Getting your CISSP Certification

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

CISA Training.

CyberVista Certify cybervista.net

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

COURSE BROCHURE CISA TRAINING

Shon Harris s Newly Updated CISSP Materials

EXAM PREPARATION GUIDE

Ingram Micro Cyber Security Portfolio

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

CompTIA Cybersecurity Analyst+

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

CISSP* CBK (ISC) GUIDE TO THE. OFFICIAL (ISCf. \Xjfl^J Taylor &. Francis Group ' Boca Raton London New York. CRC Press THIRD EDITION

Free Cissp Official Isc2 Practice Tests By Mike Chapple

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

Certified Information Security Manager (CISM) Course Overview

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Practitioner Certificate in Business Continuity Management (PCBCM) Course Description. 10 th December, 2015 Version 2.0

Information Technology Education and Training For the Lifelong Learner. Program Catalog. Effective 9/1/2016

EXAM PREPARATION GUIDE

Certification Exam Outline Effective Date: April 2018

CompTIA Mobility+ Certification

SY CompTIA Security+ Course Outline. SY CompTIA Security+ 31 Oct

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more.

Application for Certification

BCM Program Development

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

SECURITY TRAINING SECURITY TRAINING

CCNA Cybersecurity Operations. Program Overview

RISK MANAGEMENT Education and Certification

Solutions Technology, Inc. (STI) Corporate Capability Brief

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

CISA EXAM PREPARATION - Weekend Program

Cybersecurity Auditing in an Unsecure World

INFORMATION SYSTEMS AUDITOR EXAM PREPARATION COURSE NICOSIA LIVE ON-LINE. 1 P a g e

EXAM PREPARATION GUIDE

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032

Information & Communication Technologies. Certification & Professional Qualification Training Programs

THE OFFICIAL (ISC)2 GUIDE TO THE CCSP CBK FROM SYBEX DOWNLOAD EBOOK : THE OFFICIAL (ISC)2 GUIDE TO THE CCSP CBK FROM SYBEX PDF

EU General Data Protection Regulation (GDPR) Achieving compliance

EXAM PREPARATION GUIDE

BRING EXPERT TRAINING TO YOUR WORKPLACE.

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

building for my Future 2013 Certification

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

Core Solutions of Microsoft Exchange Server 2013

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Workforce Certification

ISSEP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

CompTIA IT Fundamentals:

Information Technology General Control Review

Drive Your Career Forward IIA Certifications and Qualifications

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

Certified Information Systems Auditor (CISA)

Drive Your Career Forward IIA Certifications and Qualifications

Building the Cybersecurity Workforce. November 2017

Cyber Security Program

Cyber Security. Foundation+Practitioner. The ideal introduction for anyone who wants to get a good handle on Cyber Security

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

Associate in Science and Bachelor of Science in Information Technology

CCISO Blueprint v1. EC-Council

Responsibilities of the Contracting Government

Forensics and Active Protection

Disaster Recovery and Business Continuity Planning (Mile2)

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Information Systems Security Certificate Program

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

locuz.com SOC Services

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

EXAM PREPARATION GUIDE

TEL2813/IS2820 Security Management

Certified Ethical Hacker V9

ISC2 EXAM - CISSP. Certified Information Systems Security Professional. Buy Full Product.

Reasons to Become CISSP Certified. Keith A. Watson, CISSP CERIAS

Information Systems and Tech (IST)

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Twilio cloud communications SECURITY

PECB Certified ISO Lead Auditor. Master the Audit of Occupational Health and Safety Management System (OHSMS) based on ISO 45001

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

EXAM PREPARATION GUIDE

So you want to be a Certified Quality Engineer?

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

A+ Certification. Course Description. Course Objectives. 9300; 5 Days, Instructor-led

Cloud Security. Copyright Ramesh Nagappan. All rights reserved.

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

CERTIFICATION TRAINING - ISC2

HCISPP HealthCare Information Security and Privacy Practitioner

Transcription:

Certified information Systems Security Professional(CISSP) Bootcamp Length: 5 days Format: Bootcamp Time: Day About This Course Official CISSP training draws from a comprehensive, up-to-date, global common body of knowledge thatensures you have a deep knowledge and understanding of new threats, technologies, regulations, standards,and practices. CISSP training covers the 8 domains you'll be tested on in the exam. This course will expand upon your knowledge by addressing the essential elements of the eight domains thatcomprise a Common Body of Knowledge (CBK) for information systems security professionals. The courseoffers a job-related approach to the security process, while providing a framework to prepare for CISSPcertification. Certified Information Systems Security Professional (CISSP) is the premier certification for today's informationsystems security professional. It remains the premier certification because the sponsoring organization, theinternational Information Systems Security Certification Consortium, Inc. (ISC)2, regularly updates the test byusing subject matter experts (SMEs) to make sure the material and the questions are relevant in today'ssecurity environment. By defining eight security domains that comprise a CBK, industry standards for theinformation systems security professional have been established. The skills and knowledge you gain in thiscourse will help you master the eight CISSP domains and ensure your credibility and success within theinformation systems security field. Required Exams CISSP Certification exam Audience Profile This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, orinstructors, including network or security analysts and engineers, network administrators, information securityspecialists, and risk management professionals, who are pursuing CISSP training and certification to acquire thecredibility and mobility to advance within their current computer security careers or to migrate to a relatedcareer. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate Page 1/5

theirknowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certificationexam. Course Objectives In this course, you will identify and reinforce the major security subjects from the eight domains of the CISSP CBK. You will: * Analyze components of the Security and Risk Management domain. * Analyze components of the Asset Security domain. * Analyze components of the Security Engineering domain. * Analyze components of the Communications and Network Security domain. * Analyze components of the Identity and Access Management domain. * Analyze components of the Security Assessment and Testing domain. * Analyze components of the Security Operations domain. * Analyze components of the Software Development Security domain. Outline Lesson 1: Security and Risk ManagementTopic A: Security Governance Principles Topic B: Compliance Topic C: Professional Ethics Topic D: Security Documentation Topic E: Risk Management Topic F: Threat Modeling Topic G: Business Continuity Plan Fundamentals Topic H: Acquisition Strategy and Practice Topic I: Personnel Security Policies Topic J: Security Awareness and Training Lesson 2: Asset SecurityTopic A: Asset Classification Page 2/5

Topic B: Privacy Protection Topic C: Asset Retention Topic D: Data Security Controls Topic E: Secure Data Handling Lesson 3: Security EngineeringTopic A: Security in the Engineering Lifecycle Topic B: System Component Security Topic C: Security Models Topic D: Controls and Countermeasures in Enterprise Security Topic E: Information System Security Capabilities Topic F: Design and Architecture Vulnerability Mitigation Topic G: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Topic H: Cryptography Concepts Topic I: Cryptography Techniques Topic J: Site and Facility Design for Physical Security Topic K: Physical Security Implementation in Sites and Facilities Lesson 4: Communications and Network SecurityTopic A: Network Protocol Security Topic B: Network Components Security Topic C: Communication Channel Security Topic D: Network Attack Mitigation Lesson 5: Identity and Access ManagementTopic A: Physical and Logical Access Control Topic B: Identification, Authentication, and Authorization Topic C: Identity as a Service Topic D: Authorization Mechanisms Page 3/5

Topic E: Access Control Attack Mitigation Lesson 6: Security Assessment and TestingTopic A: System Security Control Testing Topic B: Software Security Control Testing Topic C: Security Process Data Collection Topic D: Audits Lesson 7: Security OperationsTopic A: Security Operations Concepts Topic B: Physical Security Topic C: Personnel Security Topic D: Logging and Monitoring Topic E: Preventative Measures Topic F: Resource Provisioning and Protection Topic G: Patch and Vulnerability Management Topic H: Change Management Topic I: Incident Response Topic J: Investigations Topic K: Disaster Recovery Planning Topic L: Disaster Recovery Strategies Topic M: Disaster Recovery Implementation Lesson 8: Software Development SecurityTopic A: Security Principles in the System Lifecycle Topic B: Security Principles in the Software Development Lifecycle Topic C: Database Security in Software Development Page 4/5

Topic D: Security Controls in the Development Environment Topic E: Software Security Effectiveness Assessment Page 5/5