Nabídka tohoto termínu kurzu již není aktuální. Podobné kurzy naleznete zde.

CISSP® – Certified Information Systems Security Professional Self-Paced Training

Základní info

Popis kurzu

The Official (ISC)² CISSP CBK Training Seminar is the most comprehensive review of information security concepts and industry best practices, and covers the 8 domains of the CISSP CBK (Common Body of Knowledge). Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The goal of this content is to provide students with the core knowledge necessary to be a successful security professional in this day and age. This training course will help candidates review and refresh their information security knowledge in pursuit of the CISSP exam.


Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, and open/closed questions. This interactive learning technique is based on sound adult learning theories.


This program is comprised of a total of eight domain and includes:


Note: Student materials are provided in electronic format only (PDF).


The Official (ISC)² CISSP CBK Training Seminar is the most comprehensive review of information security concepts and industry best practices, and covers the 8 domains of the CISSP CBK (Common Body of Knowledge). Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The goal of this content is to provide students with the core knowledge necessary to be a successful security professional in this day and age. This training course will help candidates review and refresh their information security knowledge in pursuit of the CISSP exam.


Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, and open/closed questions. This interactive learning technique is based on sound adult learning theories.


This program is comprised of a total of eight domain and includes:


Note: Student materials are provided in electronic format only (PDF).

Určeno pro

The course is intended for professionals who have at least five years of recent full-time security professional work experience in two or more of the eight domains of the (ISC)² Certified Information System Security Professional® (CISSP) Common Body of Knowledge® (CBK). The CISSP CBK defines recommended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight (8) CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam.

Obsah kurzu

After completing this course, you will be able to:


  • Understand and apply fundamental concepts and methods related to the fields of information technology and security.

  • Align overall organizational operational goals with security functions and implementations.

  • Understand how to protect assets of the organization as they go through their lifecycle.

  • Understand the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.

  • Implement system security through the application of security design principals and the application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures.

  • Understand the importance of cryptography and the security services it can provide in today’s digital and information age.

  • Understand the impact of physical security elements on information system security and apply secure design principals to evaluate or recommend appropriate physical security protections.

  • Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function.

  • List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7.

  • Identify standard terms for applying physical and logical access controls to environments related to their security practice.

  • Appraise various access control models to meet business security requirements.

  • Name primary methods for designing and validating test and audit strategies that support business requirements.

  • Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures.

  • Recognize risks to an organization’s operational endeavors, and assess specific threats, vulnerabilities, and controls.

  • Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it, and identify which security control(s) are appropriate for the development environment, and assess the effectiveness of software security.

Studijní materiály

V angličtině

CISSP® – Certified Information Systems Security Professional Self-Paced Training

Vybraný termín:

 Praha

Cena

Kontaktovat dodavatele


Kontrola proti spamu. Kolik je čtyři a pět ? Součet zapište číslicemi.