CISSP Certification Prep Course

This 2022 updated course is the most comprehensive review of information security concepts and industry best practices, focusing on the eight domains of the CISSP-CBK (Common Body of Knowledge) that...

Read More
$2,895 USD GSA  $2,771.03
Course Code 9803
Duration 5 days
Available Formats Virtual, Classroom
6322 Reviews star_rate star_rate star_rate star_rate star_half
Course Image

This 2022 updated course is the most comprehensive review of information security concepts and industry best practices, focusing on the eight domains of the CISSP-CBK (Common Body of Knowledge) that are covered in the CISSP exam. You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

In addition to a textbook, you will receive practice test questions with complete answer explanations and flashcards to help you prepare for certification.

Skills Gained

This course provides in-depth coverage of the eight domains required to pass the CISSP exam:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Who Can Benefit

  • Anyone whose position requires CISSP certification
  • Individuals who want to advance within their current computer security careers or migrate to a related career

Prerequisites

To be successful in this course, you should have a minimum of five years of experience working in IT Infrastructure and Cybersecurity.

  • Cybersecurity Foundations
  • CompTIA Security+ Certification Prep Course
  • Cybersecurity Specialization: Architecture and Policy
  • Cybersecurity Specialization: Governance, Risk, and Compliance

Course Details

Course Outline

  • Security Governance Through Principles and Policies
  • Personnel Security and Risk Management Concepts
  • Business Continuity Planning
  • Laws, Regulations, and Compliance
  • Protecting Security of Assets
  • Cryptography and Symmetric Key Algorithms
  • PKI and Cryptographic Applications
  • Principles of Security Models, Design, and Capabilities
  • Security Vulnerabilities, Threats, and Countermeasures
  • Physical Security Requirements
  • Secure Network Architecture and Components
  • Secure Communications and Network Attacks
  • Managing Identity and Authentication
  • Controlling and Monitoring Access
  • Security Assessment and Testing
  • Managing Security Operations
  • Preventing and Responding to Incidents
  • Disaster Recovery Planning
  • Investigations and Ethics
  • Software Development Security
  • Malicious Code and Application Attacks
Contact Us 1-800-803-3948
Contact Us
FAQ Get immediate answers to our most frequently asked qestions. View FAQs arrow_forward