Discover Classes. Earn 10% Rewards.

Certified Information Systems Security Professional is unfortunately unavailable

Thankfully we have 1 other CISSP Class for you to choose from. Check our top choice below or see all classes for more options.

Certified Information Systems Security Professional

Technical Institute of America @ Virtual Classroom

Become a cybersecurity expert with the nation's leading provider of CISSP certification training. Join thousands of successful students and unlock exclusive resources and networking opportunities with an (ISC)² membership. Prove your skills, advance your career, and earn the salary you deserve with the Technical Institute of America.

(632) All levels 18 and older
$1,499

5 sessions

Attend
+14990 pts
Gift it!
See all CISSP classes Online

Certified Information Systems Security Professional

  • Intermediate
  • 18 and older
  • $2,995
  • Earn 29,950 reward points
  • Price Lock Guarantee
  • Live, Interactive Online Classroom
  • 40 hours over 5 sessions
Certified Information Systems Security Professional
Sold Out

Start Dates (0)

  • $2,995
  • 40 hours over 5 sessions
Showing 10 of 0

Class Description

Description

What you'll learn in this cissp training:

The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the information security market. CISSP validates an information security professional’s deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization.

In this course, you gain the foundational knowledge to fully prepare for the (ISC)2® Certified Information Systems Security Professional (CISSP®) exam, including a comprehensive understanding of the CISSP CBK 8 domains also covers the broad spectrum of topics and ensure its relevancy across all disciplines in the field of information security.

CISSP CBK 8 domains:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Course Objectives:
The CISSP exam is rigorous, covering eight security domains essential for the protection of information systems, corporations and national infrastructures. Understanding that security is an enterprise wide problem, these domains provide the candidate with a broad understanding of the technical, managerial and human factors that must coordinate effectively to keep information and systems secure. These domains include:

The Eight Domains of the CISSP CBK (Common Body of Knowledge)

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Audience:

The CISSP is ideal for those working in roles such as:

  • Security Consultant
  • Security Analyst
  • Security Manager
  • Security Auditor
  • Security Architect
  • IT Director/Manager
  • Director of Security
  • Network Architect
  • Security Systems Engineer
  • Chief Information Security Officer

Prerequisite:
Candidates must have a minimum of 5 years cumulative paid full-time work experience in 2 or more of the 8 domains of the CISSP CBK. Earning a 4-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy 1 year of the required experience. Education credit will only satisfy 1 year of experience.

A candidate that doesn’t have the required experience to become a CISSP may become an Associate of (ISC)² by successfully passing the CISSP examination. The Associate of (ISC)² will then have 6 years to earn the 5 years required experience

Course Outline

1. Security Management Practices

  • Types of Security Controls
  • Components of a Security Program
  • Security Policies, Standards, Procedures, and Guidelines
  • Risk Management and Analysis
  • Information Classification
  • Employee Management Issues
  • Threats, Vulnerabilities and Corresponding Administrative Controls

2. Access Control Systems and Methodology

  • Identification, Authentication, and Authorization Techniques and Technologies
  • Biometrics, Smart Cards, and Memory Cards
  • Single Sign-On Technologies and Their Risks
  • Discretionary versus Mandatory Access Control Models
  • Rule-based and Role-based Access Control
  • Object Reuse Issues and Social Engineering
  • Emissions Security Risks and Solutions
  • Specific Attacks and Countermeasures

3. Cryptography

  • Historical Uses of Cryptography
  • Block and Stream Ciphers
  • Explanation and Uses of Symmetric Key Algorithms
  • Explanation and Uses of Asymmetric Key Algorithms
  • Public Key Infrastructure Components
  • Data Integrity Algorithms and Technologies
  • IPSec, SSL, SSH, and PGP
  • Secure Electronic Transactions
  • Key Management
  • Attacks on Cryptosystems

4. Physical Security

  • Facility Location and Construction Issues
  • Physical Vulnerabilities and Threats
  • Doors, Windows, and Secure Room Concerns
  • Hardware Metrics and Backup Options
  • Electrical Power Issues and Solutions
  • Fire Detection and Suppression
  • Fencing, Lighting, and Perimeter Protection
  • Physical Intrusion Detection Systems

5. Enterprise Security Architecture

  • Critical Components of Every Computer
  • Processes and Threads
  • The OSI Model
  • Operating System Protection Mechanisms
  • Ring Architecture and Trusted Components
  • Virtual Machines, Layering, and Virtual Memory
  • Access Control Models
  • Orange Book, ITSEC, and Common Criteria
  • Certification and Accreditation
  • Covert Channels and Types of Attacks
  • Buffer Overflows and Data Validation Attacks
  • 6. Law, Investigation, and Ethics
  • Different Ethics Sets
  • Computer Criminal Profiles
  • Types of Crimes
  • Liability and Due Care Topics
  • Privacy Laws and Concerns
  • Complications of Computer Crime Investigation
  • Types of Evidence and How to Collect It
  • Forensics
  • Legal Systems

7. Telecommunications, Networks, and Internet Security

  • TCP\IP Suite
  • LAN, MAN, and WAN Topologies and Technologies
  • Cable Types and Issues
  • Broadband versus Baseband Technologies
  • Ethernet and Token Ring
  • Network Devices
  • Firewall Types and Architectures
  • Dial-up and VPN Protocols
  • DNS and NAT Network Services
  • FDDI and SONET
  • X.25, Frame Relay, and ATM
  • Wireless LANs and Security Issues
  • Cell Phone Fraud
  • VoIP
  • Types of Attacks

8. Business Continuity Planning

  • Roles and Responsibilities
  • Liability and Due Care Issues
  • Business Impact Analysis
  • Identification of Different Types of Threats
  • Development Process of BCP
  • Backup Options and Technologies
  • Types of Offsite Facilities
  • Implementation and Testing of BCP

9. Applications & Systems Development

  • Software Development Models
  • Prototyping and CASE Tools
  • Object-Oriented Programming
  • Middleware Technologies
  • ActiveX, Java, OLE, and ODBC
  • Database Models
  • Relational Database Components
  • CGI, Cookies, and Artificial Intelligence
  • Different Types of Malware

10. Operations Security

  • Operations Department Responsibilities
  • Personnel and Roles
  • Media Library and Resource Protection
  • Types of Intrusion Detection Systems
  • Vulnerability and Penetration Testing
  • Facsimile Security
  • RAID, Redundant Servers, and Clustering?

Remote Learning

This course is available for "remote" learning and will be available to anyone with access to an internet device with a microphone (this includes most models of computers, tablets). Classes will take place with a "Live" instructor at the date/times listed below.

Upon registration, the instructor will send along additional information about how to log-on and participate in the class.

Refund Policy

We are saving your seat! In order to provide you with the highest quality training at the best price, we ask that you abide by our cancellation policy. You may cancel a class without a cancellation charge up to 10 business days prior to the class start date. If you cancel less than 10 business days prior to the class start date, then QuickStart will charge you the full amount of the class. You will have the option to reschedule the class at no additional fee - on a space available basis only. If you are unable to reschedule the class because of personal reasons or QuickStart no longer offers the class, no refund will be provided. QuickStart asks that you notify us as soon as possible if you need to reschedule a class.

Similar Classes

Benefits of Booking Through CourseHorse

  • Booking is safe. When you book with us your details are protected by a secure connection.
  • Lowest price guaranteed. Classes on CourseHorse are never marked up.
  • This class will earn you 29950 points. Earn 10% back in reward points!

Questions & Answers (0)

Get quick answers from CourseHorse and past students.

QuickStart

QuickStart exists to create world-class technologists by personalizing and individualizing training to address the massive skills gap in the IT industry. Through 20 years of research and data analysis, we’ve learned that a modern learner prefers to learn through multiple modalities such as self-paced...

Read more about QuickStart

CourseHorse Approved

This school has been carefully vetted by CourseHorse and is a verified Online educator.

QuickStart

Give This Course as a Gift Card

  • Thousands of classes
  • No expiration
  • Unique and memorable gifts for any occasion
  • Personalized
  • Explore a passion, gain a new skill, discover a new hobby, engage in a memorable experience
  • Instant delivery
  • Lock in a price with the Inflation Buster Gift Card Price Adjuster™

Buy a Gift Card

Book this Class as a Group Event

Booking this class for a group? Find great private group events

Or see all Professional Group Events

Explore group events and team building activities ranging from cooking, art, escape rooms, trivia, and more.

  • Price Lock Guarantee

    Secure your booking now and we'll match any price drop within 48 hours across all booking platforms, ensuring you never miss out on savings!

  • Earn 10% Reward Points

    Maximize your savings with every purchase. Unlock rewards on every transaction, ensuring you get the most value out of your experience!

  • No Added Fees

    Enjoy hassle-free transactions without worrying about additional charges. With us, what you see is what you pay - no surprises!

  • Curated Courses

    Discover a curated selection of courses handpicked by experts in the field. Dive into quality content that suits your learning needs and interests!

CourseHorse Gift Cards

  • Creative & unique gift for any occasion
  • Thousands of classes & experiences
  • No expiration date
  • Instant e-delivery (or choose a date)
  • Add a personalized message
  • Lock in a price with the Inflation Buster Gift Card Price Adjuster™
Buy a Gift Card
gift card with the CourseHorse logo gift card with the CourseHorse logo
Loading...