• Product Library
  • School Locator

    Certified Information Systems Security Professional

    This assessment-rich Certified Information Systems Security Professional (CISSP) program is ideal for IT professionals interested in IS security. Throughout the course, you’ll be provided the knowledge and skills necessary to manage cybersecurity with command over ISC² Common Body of Knowledge. During this course: • You’ll study the eight domains required for proficiency in IS security. • You’ll learn using six different scenarios based on real-world cybersecurity problems. • All the scenarios are self-paced and include interactive games, expert videos, assessments, quizzes, real-world problems, and focused instruction.

    Program Name

    Certified Information Systems Security Professional

    Program Code

    WE-IT-75001

    Website Short Description

    This assessment-rich Certified Information Systems Security Professional (CISSP) program is ideal for IT professionals interested in IS security. Throughout the course, you’ll be provided the knowledge and skills necessary to manage cybersecurity with command over ISC² Common Body of Knowledge.
    During this course:
    • You’ll study the eight domains required for proficiency in IS security.
    • You’ll learn using six different scenarios based on real-world cybersecurity problems.
    • All the scenarios are self-paced and include interactive games, expert videos, assessments, quizzes, real-world problems, and focused instruction.
    After successful completion of this program, you will be able to:
    • Understand control systems and their methodology
    • Comprehend security models architecture
    • Develop business continuity and disaster recovery plans
    • Understand critical aspects of security practices and management
    • Analyze key concepts of telecommunications and network security
    • Understand the role of monitoring, auditing, and detection in IS
    • Apply the practical steps for a digital forensics’ investigation
    • Understand the software development life cycle
    • Comprehend the role of databases in information security
    • Identify various software-based and network attacks

    Get certified!
    After completing this course, you’ll be prepared to take the CISSP exam. The certification exam fee is already included in the tuition fee of the course!

    Duration

    12 months

    Hours

    250

    Language

    English

    Prerequisites

    While there are no specific prerequisites for this course, it is recommended that students have a comfortable familiarity with computers and the internet, and will benefit if they have some knowledge of IT operations.

    Outline

    CISSP Module 1 - Security and Risk Management
    • Confidentiality, Integrity and Availability
    • Security Governance
    • Effective Security Program
    • Compliance
    • Global Legal and Regulatory Issues
    • Manage Personnel Security
    • Risk Management Concepts
    • Threat Modeling
    • Acquisitions Strategy and Practice
    • Security Education

    CISSP Module 2 - Asset Security
    • Data Management
    • Data Standards
    • Longevity and Use
    • Asset Management
    • Protect Privacy
    • Ensure Appropriate Retention
    • Data Security Controls
    • Standards Selection
    • Classify Information

    CISSP Module 3 - Security Engineering
    • Fundamental Concepts of Security Models
    • Information Systems Security Evaluation Models
    • Vulnerabilities of Security Architecture
    • Vulnerabilities in Mobile Systems
    • Database Security
    • The Application and Use of Cryptography
    • Site and Faculty Design Considerations
    • Site Planning
    • Implementation and Operation of Facilities Security

    CISSP Module 4 - Communications and Network Security
    • Secure Network Architecture and Design
    • Implications of Multi-Layer Protocols
    • Converged Protocols
    • Wireless Security Issues
    • Securing Network Components
    • Secure Communication Channels
    • Remote Access
    • Scanning Techniques
    • Network Attacks

    CISSP Module 5 - Identity and Access Management
    • Physical and Logical Access to Assets
    • Identification and Authentication of People and Devices
    • Identity Management Implementation
    • Identity as a Service (IDaaS)
    • Integrate Third-Party Identity Services
    • Implement and Management Authorization Mechanisms
    • Prevent or Mitigate Access Control Attacks
    • Identity and Access Provisioning Lifecycle

    CISSP Module 6 - Security Assessment and Testing
    • Assessment and Test Strategies
    • Software Development
    • Log Reviews
    • Synthetic Transactions
    • Code Review and Testing
    • Negative Testing/Misuse Case Testing
    • Interface Testing
    • Collect Security Process Data
    • Internal and Third-Party Audits
    • SOC Reporting Options

    CISSP Module 7 - Security Operations
    • Investigations
    • Configuration Management
    • Foundational Security Operations Concepts
    • Resource Protection
    • Incident Response
    • Patch and Vulnerability Management
    • Change and Configuration Management
    • The Disaster Recovery Process
    • Test Plan Review
    • Access Control

    CISSP Module 8 - Security in the Software Development Life Cycle
    • Software Development Security Outline
    • Environment and Security Controls
    • Security of the Software Environment
    • Malware Protection
    • Maturity Models
    • Software Protection Mechanisms
    • Assess the Effectiveness of Software Security
    • Assess Software Acquisition Security

    Audience

    Cyber Security professionals have risen to the forefront of the Information Technology industry with the continued increase in security threats. The CISSP certification is an elite way to demonstrate your knowledge, advance your career and become a member of a community of security professionals leading the charge against cyber security threats. With this program you will show you have all it takes to design, engineer, implement and run an information security program. This program does not require any previous security experience and is the first step towards a career as a Security Consultant, Security Manager, Security Auditor, Security Analyst, Chief Information Security Officer, Director of Security, and much more! Note: To obtain full CISSP credential candidates must have a minimum of five years previous experience. Candidates unable to meet the previous experience requirement will be given Associate level status and will be required to complete the experience requirements before removing associate status.

    Certification

    This program includes CISSP Certification Practice Exams and a voucher for the CISSP Certification!
    The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
    The CISSP is ideal for those working in positions such as, but not limited to:
    Security Consultant
    Security Manager
    IT Director/Manager
    Security Auditor
    Security Architect
    Security Analyst
    Security Systems Engineer
    Chief Information Security Officer
    Director of Security
    Network Architect
    Note: To obtain full CISSP credential candidates must have a minimum of five years previous experience. Candidates unable to meet the previous experience requirement will be given Associate level status and will be required to complete the experience requirements before removing associate status.

    Instructor Description

    Though this program is a self-paced program it is supported by an educational mentor. Educational mentors are subject matter experts who have years of experience in their field as well as the necessary educational training and credentials to work as an expert. The mentor is available to answer any questions a learner may have including questions on course content, course material, certifications, and even industry questions. Mentors also monitor the progress of learners to ensure training retention and program advancement. In eLearning, motivation is a key tool to success. Because of this, mentors provide encouraging comments, feedback, and coaching to motivate learners throughout the duration of the program to support completion and success!

    Required Materials

    All required reference materials are provided with this program. Technical requirements:

    Internet Connection
    • Broadband or High-Speed (DSL, Cable, Wireless)
    Hardware Requirements
    • Processor - 2GHz Processor or Higher
    • Memory - 1 GB RAM Minimum Recommended

    Software Requirements
    • Operating Systems - Windows 7, 8 or 10; Mac OS x 10 or higher
    • Microsoft Office 2007, 2010 or 2013 or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
    • Internet Browsers - Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
    • Adobe PDF Reader

    Reviews

    No customer reviews for the moment.

    Write your review