Telephone: 020 8840 4496

CISSP training for the CISSP Certification

Course: CISSP – Fast Track

Duration: 5 Days

Code: CISSP/082

See Course Schedule:
More Details
COURSE TITLE (COURSE CODE) No. of Days Mar 2014 Apr 2014 May 2014 Jun 2014 Jul 2014 Aug 2014 Sep 2014 Oct 2014 Nov 2014 Dec 2014
CISSP – CISSP Fast Track 5 03-07 07-11 28-02 02-06 14-18 04-08 01-05 06-10 03-07 01-05
Overview:
More Details

The Certified Information Systems Security Professional (CISSP) certification is a highly sought-after qualification by those making a career in IT security. Our CISSP Fast Track course is an intensive, in-depth, training program that has consistently achieved over 97% pass rates in the final CISSP examination. Delegates can be assured of our unconditional “guaranteed pass”. If you don’t pass your CISSP exam first time, you are welcome to re-sit the course for free.

Our delivery method uses the internationally recognised mind-mapping techniques to help the candidate assimilate and “fix” new information rapidly and repeatedly into their existing body of knowledge. Each student will get Net Security’s CISSP training kit, the most comprehensive training package available, including:

Our own up-to-date CISSP Manual
Full online CISSP training material for 4 months
Plus more additional training and learning materials when you attend

Objectives:
More Details
The goal of the course is to prepare professionals for the challenging CISSP examination by covering the syllabus defined in the (ISC)2 common body of knowledge.
Who should attend:
More Details
Experienced security professionals who want to expand their knowledge and gain an internationally recognized certification. Anyone with suitable experience can attend our course.
Syllabus:
More Details
The 10 CISSP Domains:

Access Control

A collection of mechanisms that work together to create security architecture to protect the assets of the information system.

Concepts/methodologies/techniques
Effectiveness
Attacks

Telecommunications and Network Security

Discusses network structures, transmission methods, transport formats and security measures used to provide availability, integrity and confidentiality.

Network architecture and design
Communication channels
Networking components
Network attacks

Information Security Governance and Risk Management

The identification of an organization’s information assets and the development, documentation and implementation of policies, standards, procedures and guidelines.

Security governance and policy
Information classification/ownership
Contractual agreements and procurement processes
Risk management concepts
Personnel security
Security education, training and awareness
Certification and accreditation

Software Development Security

Refers to the controls that are included within systems and applications software and the steps used in their development

Systems development life cycle (SDLC)
Application environment and security controls
Effectiveness of application security

Cryptography

The principles, means and methods of disguising information to ensure its integrity, confidentiality and authenticity

Encryption concepts
Digital signatures
Cryptanalytic attacks
Public Key Infrastructure (PKI)
Information hiding alternatives

Security Architecture and Design

Contains the concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity and availability

Fundamental concepts of security models
Capabilities of information systems (e.g. memory protection, virtualization)
Countermeasure principles
Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)

Operations Security

Used to identify the controls over hardware, media and the operators with access privileges to any of these resources

Resource protection
Incident response
Attack prevention and response
Preventative measures against attacks
Patch and vulnerability management

Business Continuity and Disaster Recovery Planning

Addresses the preservation of the business in the face of major disruptions to normal business operations

Business impact analysis
Recovery strategy
Disaster recovery process
Provide training

Legal, Regulations, Investigations and Compliance

Addresses computer crime laws and regulations; the investigative measures and techniques which can be used to determine if a crime has been committed and methods to gather evidence

Legal issues
Investigations
Forensic procedures
Compliance requirements/procedures

Physical (Environmental) Security

 
Addresses the threats, vulnerabilities and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information.

Site / facility design considerations
Perimeter security
Internal security
Facilities security