CISSP On-Demand: CISSP Certified Information Systems Security Professional Course Outline
***This is an On-Demand (self-study)Course, 180-day 24/7 access via the internet***
(Applicable State and Local taxes may be added for On-Demand purchases, depending on your location.)
You may take this course at any time and from any device, provided you have internet access. Note: The 180-day course access period begins at time of purchase.
About This Course
The Online On-Demand (self-study) training course includes expert lectures, PowerPoint visuals, demonstrations, lab exercises, quizzes,and a study guide. You may take this course at any time and from any device, provided you have internet access.
Course Overview
This course will teach students about security and risk management, asset security,security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security.
Target Student
This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, managers and executives interested in proving their knowledge across a wide array of security practices and principals. It is highly recommended that students have obtained CompTIA® Network+® or Security+® certifications, or possess equivalent professional experience upon entering CISSP training.
Certification Exam
Upon request, ONLC will include a practice test with this course. An exam voucher is NOT included with this course. Students need to purchase exam voucher on their own.
Do you Still Prefer a Live, Instructor-led Class?
Already know CISSP On-Demand is not right for you? We also offer this same course content in a live, instructor-led format. For more details, click on the links below:
CISSP: Certified Information System Security Professional
Duration
This course includes 12h 33m of video presentation plus practice labs.
Course Outline
Topic 1: Course Introduction
Course Introduction
Domain 1 - Security and Risk Management
Professional Ethics
Security Concepts
Security Governance Principles
Security Function
Policy, Standards, Procedures, and Guidelines
Personnel Security
Risk Management Concepts
Threat Modeling
Supply Chain Risk Management
Business Continuity Planning
Compliance, Legal, and Regulatory Issues
Domain 2 - Asset Security
Asset Identification and Classification
Asset Ownership and Handling Requirements
Asset and Data Management
Security Controls and Compliance Requirements
Domain 3 - Security Architecture and Engineering
Fundamental Security Engineering Processes and Secure Design Principles
Security Models
Controls Selection
Security Capabilities of Information Systems
Vulnerability Management in Security Architectures, Designs, and Solution Elements
Cryptographic Concepts, Solutions and Attacks
Site and Facility Selection, Design, and Security Controls
Domain 4 - Communication and Network Security
Secure Network Architecture and Design
Models, Devices, and Protocols
Secure Communications Design and Technologies
Domain 5 - Identity and Access Management
Physical and Logical Access Control
Authentication Methods
Identity, Federation, and Third-Party Identity Services
Access Control Models
Identity and Access Lifecycle
Authentication Systems
Access Control Attacks
Protection Methods
Domain 6 - Security Assessment and Testing
Security Assessments, Tests, and Audit Strategies
Security Control Testing
Security Processes Data Collection and Reporting
Security Audits
Domain 7 - Security Operations
Foundational Security Operations Concepts
Personnel Safety and Security
Provisioning Resources
Configuration, Change, Patch, and Vulnerability Management
Detective and Preventive Measures
Logging and Monitoring
Developing, Testing, Implementing, and Maintaining BCP and DRP
Investigations and Ethics
Domain 8 - Software Development Security
Systems Development Controls
Programming Languages and Concepts
Security Controls in Software Development
Secure Coding Standards and Guidelines
Software Testing, Assurance, and Vulnerabilities
Course Review
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
View outline in Word
GCISSP