CISSP: Certified Information Systems Security Professional

Overview

Price: USD $3,345.00
Duration: 5 Days
CPE Credits: 35
Course Number: SEC-308
CISSP

This Certified Information Systems Security Professional (CISSP) training seminar is a five day, 35 CPE course offered to you by Intrinsec Security – an official training provider of (ISC)².

Intrinsec’s official CISSP training program is a vendor-neutral cyber security knowledge course which provides students with a comprehensive review of the deep technical and managerial knowledge and experience required to effectively design, engineer, and manage the overall security posture of an organization while protecting them from sophisticated attacks. CISSP is the ideal course, and credential, for professionals hoping to acquire the credibility and mobility to advance their current information security careers.

Every CISSP course that Intrinsec provides is authorized by (ISC)² as an Official Training Seminar for the CISSP CBK (Common Body of Knowledge). This ensures students only receive Official (ISC)² content that is identified as up-to-date and relevant. Additionally, every training seminar Intrinsec provides for this course is led by a qualified CISSP instructor who is authorized by (ISC)².

Outline & Objectives

The material reviewed throughout this official training seminar focuses on the 8 domains within (ISC)²’s Common Body of Knowledge (CBK) for the CISSP.

Additional information about this course can be found in this section.

Domain 1: Security and Risk Management

The first domain reviewed in this official CISSP course addresses a broad spectrum of general information security and risk management topics beginning with coverage of the fundamental security principles of confidentiality, availability and integrity upon which all information security functions are based. The Security and Risk Management domain then builds upon these concepts in the areas of security governance and compliance.
 

CISSP Domain 1 Lessons
  • Confidentiality, Integrity and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures and Guidelines

Domain 2: Asset Security

Asset Security, within the context of the second CISSP domain, addresses the collection, handling and protection of information throughout its lifecycle.
 

CISSP Domain 2 Lessons
  • Information and Asset Classification
  • Ownership (ex. Data Owners, System Owners)
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements (ex. Markings, Labels, Storage)

Domain 3: Asset Security

Domain 3 of our official CISSP training seminar focuses on the implementation and management of security engineering processes by using secure design principles.
 

CISSP Domain 3 Lessons
  • Engineering Processes Using Secure Design Principles
  • Fundamental Concepts of Security Models
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-Based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security (Design and Implement)

Domain 4: Communications and Network Security

Domain 4 focuses on the network architecture, transmission methods, transport protocols, control devices, and the security measures used to maintain the confidentiality, integrity and availability of information transmitted over both private and public communication networks.
 

CISSP Domain 4 Lessons
  • Secure Network Architecture Designs (ex. IP & Non-IP Protocols, Segmentation)
  • Secure Network components
  • Secure Communication Channels
  • Network Attacks

Domain 5: Identify and Access Management

In Domain 5 of our CISSP training students review the identification and authorization of users, systems and services.
 

CISSP Domain 5 Lessons
  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-Party Identity Services (ex. On-Premise)
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle (ex. Provisioning Review)

Domain 6: Identify and Access Management

The Security Assessment and Testing domain focuses on the evaluation of information assets and associated infrastructure using various tools and techniques for the purposes of identifying and mitigating risk due to architectural issues, design flaws, configuration errors, hardware and software vulnerabilities, coding errors, and any other weaknesses that may affect an information systems ability to deliver its intended functionality in a secure manner. Additionally, students will also review the continuous validation of the application of organizational information security plans, policies, processes and procedures.
 

CISSP Domain 6 Lessons
  • Assessment and Test Strategies
  • Security Control Testing
  • Security Process Data (ex. Management and Operational Controls)
  • Test Outputs (ex. Automated, Manual)
  • Security Architectures Vulnerabilities

Domain 7: Security Operations

Domain 7, Security Operations, covers a broad range of topics involving the application of information security concepts and best practices to the operation of enterprises computing systems. This domain is practical in nature and intended to cover the tasks and situations that information security professionals are expected to perform or are presented with daily. It is also representative of the areas where security professionals spend most of their time so it is no surprise that the security operations domain is the largest in terms of individual topics on the CISSP examination.
 

CISSP Domain 7 Lessons
  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Domain 8: Software Development Security

The last domain in our CISSP course is Software Development Security; it involves the application of security concepts and best practices to production and development software environments.
 

CISSP Domain 8 Lessons
  • Security in the Software Development Lifecycle
  • Development Environments Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact

What Comes With Registration?

Intrinsec’s CISSP students are provided with a wide range of benefits designed to maximize their cyber security training experience. The following CISSP features are included with registration:
 

  • Five (5) Days of Official (ISC)² Training from an Authorized CISSP Instructor
  • Official (ISC)² Guide to the CISSP CBK Student Handbook
  • Official (ISC)² CISSP Courseware
  • Official (ISC)² CISSP Interactive Flashcards
  • Official (ISC)² CISSP Practice Assessment
  • Practical Experience with Realistic Scenario Based Learning Activities
  • 60 Days of OnDemand Access to the Recordings of your CISSP Session (Video & Audio)
    • NOTE: for virtual training only

    *CISSP Exam Voucher Available for Additional Cost ($599 USD)*

CISSP Prerequisites

Any interested student can register for this course.

However, CISSP training is not intended for beginners. This is because of the courseware and training, both are packed with advanced concepts and practices. Because of this, we recommend for students to meet the same experience requirements (ISC)² requires for their CISSP certification candidates. Specific details can be found below:

To qualify for the CISSP certification, you must have a minimum of five years of cumulative paid full-time work experience in two or more of the eight domains: (1) Security and Risk Management, (2) Asset Security, (3) Security Engineering, (4) Communications and Network Security, (5) Identity and Access Management, (6) Security Assessment and Testing, (7) Security Operations and (8) Software Development Security.

What does (ISC)² say about us?

 

“Intrinsec Security is one of our trusted official training providers within Canada and the United States. Their dedication to providing professionals and enterprises with our certification training programs has certainly helped with our progression in inspiring a safe and secure cyber world.”

Why Intrinsec?

Trusted Advisors in the Cyber Security Space

We don’t just train, we advise. That’s why professionals and enterprises trust Intrinsec with their professional development in cyber security. It’s our niche and in all honesty, it’s what we do best. We’re happy to provide you with the most honest and appropriate information for your situation.

Professional Development Programs that are Risk Free

We’re so confident you’ll be satisfied with our CISSP training that we don’t mind putting our money where our mouth is; if a student is unsatisfied during the first morning of training, we’ll give them a 100% refund, regardless of the reason. For example…

  • The course isn’t what you expected? Refund.
  • Our instructor is humming that annoyingly catchy song you had just managed to forget? Refund.

Schedule

DateTimeLocationPriceRegister
Apr 24 - 28, 2017 9:00am - 5:00pm EST Toronto, ON USD $3,345.00
May 22 - 26, 2017 9:00am - 5:00pm EST Live Online USD $3,345.00
Jun 12 - 16, 2017 9:00am - 5:00pm EST Live Online USD $3,345.00
Aug 28 - Sep 1, 2017 9:00am - 5:00pm EST Toronto, ON USD $3,345.00
Oct 2 - 6, 2017 9:00am - 5:00pm EST Ottawa, ON USD $3,345.00
Nov 27 - Dec 1, 2017 9:00am - 5:00pm EST Herndon, VA. USD $3,345.00
 

Request Group Training