CISSP: Certified Information Systems Security Professional
Led by an (ISC)² authorized instructor, this official CISSP training seminar provides a comprehensive review of information security concepts and industry best practices, covering all 8 domains of the CISSP Common Body of Knowledge (CBK).
The CISSP certification prep course will last for a total of five days. In this period, students will gain a comprehensive understanding of the deep technical and managerial knowledge and experience required to effectively design, engineer, and manage the overall security posture of an organization while protecting them from sophisticated attacks.
CISSP is an excellent course, and certification, for those hoping to gain the credibility and mobility to advance their current information security careers.
What Comes With Registration?
- Five Days of Official (ISC)² Training from an Authorized CISSP Instructor
- Official (ISC)² CISSP Student Handbook
- Official (ISC)² CISSP Courseware
- Official (ISC)² CISSP Flashcards
- Official (ISC)² CISSP Practice Exam
- 60 Days of OnDemand Access to the Recordings of your CISSP Session (Video & Audio)
- NOTE: for virtual training only
Have any questions? Get an immediate answer with Intrinsec’s live chat!
This official (ISC)² training seminar has no prerequisites and the scheduled dates below are open for registration.
NOTE: While this training program does not have any prerequisites, the CISSP certification does. Additional information on these prerequisites can be found below:
To qualify for the CISSP certification, you must have a minimum of five years of cumulative paid full-time work experience in two or more of the eight domains: (1) Security and Risk Management, (2) Asset Security, (3) Security Engineering, (4) Communications and Network Security, (5) Identity and Access Management, (6) Security Assessment and Testing, (7) Security Operations and (8) Software Development Security.
Domain 1: Security and Risk Management
The first domain reviewed in this official CISSP course addresses a broad spectrum of general information security and risk management topics beginning with coverage of the fundamental security principles of confidentiality, availability and integrity upon which all information security functions are based. The Security and Risk Management domain then builds upon these concepts in the areas of security governance and compliance.
Domain 1 Lessons
- Confidentiality, Integrity and Availability Concepts
- Security Governance Principles
- Legal and Regulatory Issues
- Professional Ethics
- Security Policies, Standards, Procedures and Guidelines
Domain 2: Asset Security
Asset Security, within the context of the second CISSP domain, addresses the collection, handling and protection of information throughout its lifecycle.
Domain 2 Lessons
- Information and Asset Classification
- Ownership (ex. Data Owners, System Owners)
- Protect Privacy
- Appropriate Retention
- Data Security Controls
- Handling Requirements (ex. Markings, Labels, Storage)
Domain 3: Asset Security
Asset Security is the third domain reviewed in this course. It focuses on the implementation and management of security engineering processes by using secure design principles.
Domain 3 Lessons
- Engineering Processes Using Secure Design Principles
- Fundamental Concepts of Security Models
- Security Evaluation Models
- Security Capabilities of Information Systems
- Security Architectures, Designs, and Solution Elements Vulnerabilities
- Web-Based Systems Vulnerabilities
- Mobile Systems Vulnerabilities
- Embedded Devices and Cyber-Physical Systems Vulnerabilities
- Site and Facility Design Secure Principles
- Physical Security (Design and Implement)
Domain 4: Communications and Network Security
Domain 4 focuses on the network architecture, transmission methods, transport protocols, control devices, and the security measures used to maintain the confidentiality, integrity and availability of information transmitted over both private and public communication networks.
Domain 4 Lessons
- Secure Network Architecture Designs (ex. IP & Non-IP Protocols, Segmentation)
- Secure Network components
- Secure Communication Channels
- Network Attacks
Domain 5: Identify and Access Management
In Domain 5 of our CISSP training students review the identification and authorization of users, systems and services.
Domain 5 Lessons
- Physical and Logical Assets Control
- Identification and Authentication of People and Devices
- Identity as a Service
- Third-Party Identity Services (ex. On-Premise)
- Access Control Attacks
- Identity and Access Provisioning Lifecycle (ex. Provisioning Review)
Domain 6: Identify and Access Management
The Security Assessment and Testing domain focuses on the evaluation of information assets and associated infrastructure using various tools and techniques for the purposes of identifying and mitigating risk due to architectural issues, design flaws, configuration errors, hardware and software vulnerabilities, coding errors, and any other weaknesses that may affect an information systems ability to deliver its intended functionality in a secure manner. Additionally, students will also review the continuous validation of the application of organizational information security plans, policies, processes and procedures.
Domain 6 Lessons
- Assessment and Test Strategies
- Security Control Testing
- Security Process Data (ex. Management and Operational Controls)
- Test Outputs (ex. Automated, Manual)
- Security Architectures Vulnerabilities
Domain 7: Security Operations
Domain 7, Security Operations, covers a broad range of topics involving the application of information security concepts and best practices to the operation of enterprises computing systems. This domain is practical in nature and intended to cover the tasks and situations that information security professionals are expected to perform or are presented with daily. It is also representative of the areas where security professionals spend most of their time so it is no surprise that the security operations domain is the largest in terms of individual topics on the CISSP examination.
Domain 7 Lessons
- Investigations Support and Requirements
- Logging and Monitoring Activities
- Provisioning of Resources
- Foundational Security Operations Concepts
- Resource Protection Techniques
- Incident Management
- Preventative Measures
- Patch and Vulnerability Management
- Change Management Processes
- Recovery Strategies
- Disaster Recovery Processes and Plans
- Business Continuity Planning and Exercises
- Physical Security
- Personnel Safety Concerns
Domain 8: Software Development Security
The last domain in our CISSP course is Software Development Security; it involves the application of security concepts and best practices to production and development software environments.
Domain 8 Lessons
- Security in the Software Development Lifecycle
- Development Environments Security Controls
- Software Security Effectiveness
- Acquired Software Security Impact
|Jun 12 - 16, 2017||9:00am - 5:00pm EST||Live Online||USD $3,345.00|
|Aug 28 - Sep 1, 2017||9:00am - 5:00pm EST||Toronto, ON||USD $3,345.00|
|Aug 28 - Sep 1, 2017||9:00am - 5:00pm EST||Live Online||USD $3,345.00|
|Oct 2 - 6, 2017||9:00am - 5:00pm EST||Ottawa, ON||USD $3,345.00|
|Oct 2 - 6, 2017||9:00am - 5:00pm EST||Live Online||USD $3,345.00|
|Nov 27 - Dec 1, 2017||9:00am - 5:00pm EST||Herndon, VA.||USD $3,345.00|
|Nov 27 - Dec 1, 2017||9:00am - 5:00pm EST||Live Online||USD $3,345.00|