Cart Subtotal: $0.00

Welcome Student!

CISSP: Certified Information Systems Security Professional

Click on image to zoom

Be the first to review this product

SKU# 198000

Availability: In stock

$399.00

$99.00

Secure shopping trustmarks

Quick Overview

CISSP: Certified Information Systems Security Professional

QuickCert Exam Pass Guarantee

QuickCert’s online IT training programs are guaranteed to get you certified – or we will pay for your make-up exam. Our quality online IT courseware, packed with instruction, exercises, practice exams and test simulators will ensure you pass the exam. Learn more.

Course Description

The CISSP: Certified Information Systems Security Professional Certification certification training package from QuickCert covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the ten domains of information system security knowledge.  

The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². (ISC)² promotes the CISSP exam as an aid to evaluating personnel performing information security functions.  Candidates for this exam are typically network security professionals and system administrators with at least four years of direct work experience in two or more of the ten test domains.  As the first ANSI ISO accredited credential in the field of information security, the Certified Information Systems Security Professional (CISSP) certification provides information security professionals with not only an objective measure of competence, but a globally recognized standard of achievement.

QuickCert's CISSP training course maps directly to the exam objectives and offers numerous features such as exam tips, case studies, and practice exams.  We are so certain our CISSP training course will provide you with the knowledge and skills you need to succeed, we guarantee you will pass your exam!

Not sure what course is right for you?
Contact one of our Career Advisors at 888.840.2378 for assistance.

Syllabus

Access Control

General Concepts
Authentication
Principles
Types and Categories
Reference Monitor
Techniques
Models
Passwords
Smart Cards
Biometrics
Access Control Systems
Administration
Residuals
Accountability
Summary

Telecommunications and Network Security

OSI Reference Model
ISO/OSI Layers and Characteristics
Topologies
LAN Access Methods
Wireless
System and Security Management
Internet Protocols and Security
Firewall Terms and Types
Web Security
Common Attacks
Remote Access Security
Summary

Information Security Governance and Risk Management

Key Concepts
Definitions
Key Concepts
Risk Management
Risk Assessment
Useful Formulas
3rd Party Governance
Information Classification
Roles and Responsibilities
Written Guidance
Policies and Standards
Employment Policies
Employee Education Programs
Change Management
Summary

Software Architecture and Design

Problems
Databases
Query Language
Object Oriented
Applications Beyond the Database
Definitions
Application System Development
Controls
Compiled vs. Interpreted
Vulnerabilities
Botnets
Summary

Cryptography

Definitions
Cryptanalysis Terms
Symmetric Encryption
Asymmetric Encryption
Hybrid Encryption
Public Key Infrastructures
Hash Functions
Digital Signatures
Protocol Based
Pretty Good Privacy
Cracking Techniques
Summary

Security Architecture and Design

Abstract Levels
Computer Hardware
Operating Systems
Processors
Types of Storage
Information Security Architecture
Open and Closed Systems
Access Controls
Architectural Foundation
Modes of Operation
Certification and Accreditation
Evaluation Criteria
Security Models
Summary

Operations Security

Threats in an Operating Environment
Control Categories
Accountability
Trusted Recovery
Management and Administrative Control
Due Care and Diligence
Hardware and Software Controls
Email and Fax
Privilege
Physical Access
Monitoring Techniques
Problem Management
Threats and Vulnerabilities
Defense in Depth
Summary

Business Continuity and Disaster Recovery

The Basics
Reasons for BCP
Key Concepts
Definitions
Business Continuity Life Cycle
Project Initiation
Business Impact Analysis
Assessing Risk
Recovery Strategies
Off-Site Requirements
Data Redundancy
System Backups
Plan Development
Testing and Maintenance
Stages in an Incident
Summary

Legal Requirements and Investigations

Ethics
Code of Ethics
Laws
Intellectual Property
Proprietary Rights
Liability
Computer Crime
Computer Crime Laws
Computer Investigation
Investigation Steps
Computer Forensics
Evidence Admissibility
Summary

Physical and Environmental Security

Physical Security
Crime Prevention
Site Design and Configuration
Boundary Protection
Computing Facility Requirements
Fire Prevention
Fire Suppression
Fire Classes
Media Protection
Access Controls
Physical Security
Summary
Course Summary

Instructor Bio

Dave B. Chronister
CISSP, C|HFI, MCSE, C|EH

As a Certified Ethical Hacker and Certified Forensic Investigator, Chronister possesses deep security expertise in some of the most heavily regulated industries including financial services and healthcare. Specifically, Sarbanes Oxley (SOX), Gramm-Leach-Bliley Act (GLBA), Payment Card Industries (PCI), and the Health Insurance Portability and Accountability Act (HIPAA).

During the course of his professional career, Chronister served as Architect for A.G Edwards' electronic messaging system - the largest Exchange Server deployment at the time. At Cybersource, he was the technical liaison to the various credit card organizations, developing their payment card compliance standards. Additionally, working with numerous medical and dental practices, Chronister served as Technical Advisor helping these practices meet HIPAA compliance. Recently, he served as Chief Technology Officer for a $700 million dollar bank holding company for over 5 years prior to starting Parameter Security.

Reviews
Write Your Own Review

You're reviewing: CISSP: Certified Information Systems Security Professional

  •  
    1 star
    2 stars
    3 stars
    4 stars
    5 stars
    Quality
    Price
    Value

* Required Fields

Free Demo