CISSP (Certified Information Systems Security Professional) (CYSE8030)

Rising Hands

CISSP (Certified Information Systems Security Professional)

Description:

You will analyze a wide range of information systems security subjects that are organized into 10 domains for CISSP exam certification. Through the study of all 10 CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. The CISSP exam is intentionally difficult and should not be taken lightly. Even students with years of security experience should assume that they will have additional study time after class. Because the domains are so varied, it is unlikely that any one student will have experience in all 10 domains. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in one or more fields related to the 10 CBK security domains, or a college degree and four years of experience.

Duration:

4 days

Level:

Intermediate

Who Should Attend?

This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.

Credits:

3.5 CEUs

Learning Outcomes:

  • Analyze information systems access control.
  • Analyze security architecture and design.
  • Analyze network security systems and telecommunications.
  • Analyze information security management goals.
  • Analyze information security classification and program development.
  • Analyze risk management criteria and ethical codes of conduct.
  • Analyze software development security.
  • Analyze cryptography characteristics and elements.
  • Analyze physical security. Analyze operations security.
  • Apply Business Continuity and Disaster Recovery Plans.
  • Identify legal issues, regulations, compliance standards, and investigation practices relating to information systems security.

Available only for Private Group Training

Bring This Class To My Location

Get in Touch!

questions icon

Have a Question?

We're here to help. Send us an email or call us at 1 (888) 744-4723