This course will expand upon your knowledge by addressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.
Course Description
Welcome to Certified Information Systems Security Professional (CISSP)®: Second Edition. With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional.
This course will expand upon your knowledge by addressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.
The course offers a job-related approach to the security process, while providing the basic skills required to prepare for CISSP certification.
Objectives:
You will analyze a wide range of information systems security subjects that are organized into 10 domains for CISSP exam certification.
This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.
Through the study of all 10 CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam.
Additional CISSP certification requirements include a minimum of five years of direct professional work experience in one or more fields related to the 10 CBK security domains, or a college degree and four years of experience.
Prerequisites
It is highly recommended that students have certifications in Network+ or Security+, or possess equivalent professional experience upon entering CISSP training.
It will be beneficial if students have one or more of the following security-related or technology-related certifications or equivalent industry experience: MCSE, MCTS, MCITP, SCNP, CCNP, RHCE, LCE, CNE, SSCP ®, GIAC, CISA™, or CISM®.
Course Objectives
Upon successful completion of this course, students will be able to:
Analyze information systems access control.
Analyze security architecture and design.
Analyze network security systems and telecommunications.
Analyze information security management goals.
Analyze information security classification and program development.
Analyze risk management criteria and ethical codes of conduct.
Analyze application security.
Analyze cryptography characteristics and elements.
Analyze physical security.
Analyze operations security.
Apply business continuity and disaster recovery plans.
Identify legal issues, regulations, compliance standards, and investigation practices relating to information systems security.
The Training Institute of Washington, DC is focused on becoming the nation's leader in education and enterprise training solutions. In collaboration with our worldwide partners, we offer complete education program management solutions, including enrollment, certification, and project development and support.
Mission
The Training Institute of Washington, DC is dedicated to improving the way companies and individuals learn, use, and master technology through educational solutions that empower customers with choice, allowing them to determine when, where, and how they want their educational programs to be designed and delivered.
The Certified Information Systems Security Professional (CISSP) is the premier information security certification and is one of the toughest exams you can take.
The ISO 27001 Training helps participants to gain the necessary knowledge and expertise in ISO/IEC 27001 Information Security Management System.
Beginners are welcome and would start with our PC Technician Program and then move to Security+ to gain entry level information security positions. If a student already has some networking background or experience, they can move directly into the Security+ or the CISSP certification preparation pro...
You will control access to data and information systems using common access control best practices. You will discover how networks are designed for security, and the components, protocols, and services that allow telecommunications to occur in a secure manner.
This program aims to provide Computer Science students with the knowledge needed to develop Information Systems in a real-world setting.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy