CISSP: Certified Information Systems Security Professional

Overview

Price: USD $3,345.00
Duration: 5 Days
CPE Credits: 35
Course Number: SEC-308
CISSP

The following CISSP training seminar is an official five day, 35 CPE course offered to you by Intrinsec Security – an Authorized Training Partner of (ISC)².

Course Introduction

Led by an (ISC)² authorized instructor, this official CISSP training seminar provides a comprehensive review of information security concepts and industry best practices, covering all 8 domains of the CISSP Common Body of Knowledge (CBK).

The CISSP certification prep course will last for a total of five days. In this period, students will gain a comprehensive understanding of the deep technical and managerial knowledge and experience required to effectively design, engineer, and manage the overall security posture of an organization while protecting them from sophisticated attacks.

CISSP is an excellent course, and certification, for those hoping to gain the credibility and mobility to advance their current information security careers.

GROUP TRAINING

Certifications Training

AVAILABLE OPTIONS

OnSite Training
50-Day Training Bundle

What Comes With Registration?

  • Five Days of Official (ISC)² Training from an Authorized CISSP Instructor
  • Official (ISC)² CISSP Student Handbook
  • Official (ISC)² CISSP Courseware
  • Official (ISC)² CISSP Flashcards
  • Official (ISC)² CISSP Practice Exam
  • 60 Days of OnDemand Access to the Recordings of your CISSP Session (Video & Audio)
    • NOTE: for virtual training only

    Have any questions? Get an immediate answer with Intrinsec’s live chat!

CISSP Prerequisites

This official (ISC)² training seminar has no prerequisites and the scheduled dates below are open for registration.

NOTE: While this training program does not have any prerequisites, the CISSP certification does. Additional information on these prerequisites can be found below:

To qualify for the CISSP certification, you must have a minimum of five years of cumulative paid full-time work experience in two or more of the eight domains: (1) Security and Risk Management, (2) Asset Security, (3) Security Engineering, (4) Communications and Network Security, (5) Identity and Access Management, (6) Security Assessment and Testing, (7) Security Operations and (8) Software Development Security.

Course Outline

Domain 1: Security and Risk Management

The first domain reviewed in this official CISSP course addresses a broad spectrum of general information security and risk management topics beginning with coverage of the fundamental security principles of confidentiality, availability and integrity upon which all information security functions are based. The Security and Risk Management domain then builds upon these concepts in the areas of security governance and compliance.
 

Domain 1 Lessons
  • Confidentiality, Integrity and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures and Guidelines

Domain 2: Asset Security

Asset Security, within the context of the second CISSP domain, addresses the collection, handling and protection of information throughout its lifecycle.
 

Domain 2 Lessons
  • Information and Asset Classification
  • Ownership (ex. Data Owners, System Owners)
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements (ex. Markings, Labels, Storage)

Domain 3: Asset Security

Asset Security is the third domain reviewed in this course. It focuses on the implementation and management of security engineering processes by using secure design principles.
 

Domain 3 Lessons
  • Engineering Processes Using Secure Design Principles
  • Fundamental Concepts of Security Models
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-Based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security (Design and Implement)

Domain 4: Communications and Network Security

Domain 4 focuses on the network architecture, transmission methods, transport protocols, control devices, and the security measures used to maintain the confidentiality, integrity and availability of information transmitted over both private and public communication networks.
 

Domain 4 Lessons
  • Secure Network Architecture Designs (ex. IP & Non-IP Protocols, Segmentation)
  • Secure Network components
  • Secure Communication Channels
  • Network Attacks

Domain 5: Identify and Access Management

In Domain 5 of our CISSP training students review the identification and authorization of users, systems and services.
 

Domain 5 Lessons
  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-Party Identity Services (ex. On-Premise)
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle (ex. Provisioning Review)

Domain 6: Identify and Access Management

The Security Assessment and Testing domain focuses on the evaluation of information assets and associated infrastructure using various tools and techniques for the purposes of identifying and mitigating risk due to architectural issues, design flaws, configuration errors, hardware and software vulnerabilities, coding errors, and any other weaknesses that may affect an information systems ability to deliver its intended functionality in a secure manner. Additionally, students will also review the continuous validation of the application of organizational information security plans, policies, processes and procedures.
 

Domain 6 Lessons
  • Assessment and Test Strategies
  • Security Control Testing
  • Security Process Data (ex. Management and Operational Controls)
  • Test Outputs (ex. Automated, Manual)
  • Security Architectures Vulnerabilities

Domain 7: Security Operations

Domain 7, Security Operations, covers a broad range of topics involving the application of information security concepts and best practices to the operation of enterprises computing systems. This domain is practical in nature and intended to cover the tasks and situations that information security professionals are expected to perform or are presented with daily. It is also representative of the areas where security professionals spend most of their time so it is no surprise that the security operations domain is the largest in terms of individual topics on the CISSP examination.
 

Domain 7 Lessons
  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Domain 8: Software Development Security

The last domain in our CISSP course is Software Development Security; it involves the application of security concepts and best practices to production and development software environments.
 

Domain 8 Lessons
  • Security in the Software Development Lifecycle
  • Development Environments Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
(ISC)2 Logo for CCSP Page

Schedule

DateTimeLocationPriceRegister
Jun 12 - 16, 2017 9:00am - 5:00pm EST Live Online USD $3,345.00
Aug 28 - Sep 1, 2017 9:00am - 5:00pm EST Toronto, ON USD $3,345.00
Aug 28 - Sep 1, 2017 9:00am - 5:00pm EST Live Online USD $3,345.00
Oct 2 - 6, 2017 9:00am - 5:00pm EST Ottawa, ON USD $3,345.00
Oct 2 - 6, 2017 9:00am - 5:00pm EST Live Online USD $3,345.00
Nov 27 - Dec 1, 2017 9:00am - 5:00pm EST Herndon, VA. USD $3,345.00
Nov 27 - Dec 1, 2017 9:00am - 5:00pm EST Live Online USD $3,345.00
 

Request Group Training