Project Description

Certified Information Systems Security Professional

This Certified Information Systems Security Professional course is part of a series covering the ISC(2) Certified Information Systems Security Professional or CISSP. It covers risk management and authentication. It will look at risk from a negative perspective or the likelihood of something bad happening. Topics covered will be plans, programs and infrastructure providing the foundation for all other domains including access control, validating, and verifying the use of resources. Access control is the heartbeat of information security.

This course will talk about role access, layers of access, control characteristics, administrative controls and technical access. It will also cover architecture computer security concepts. Operations security is where all the theory and policies are put into action. Topics in this course will include administration responsibilities, redundancy and fault tolerance, and threats to operations. Also, an overview of cryptography and how it can be used in something like access will be discussed. It will cover symmetric and asymmetric cryptography and their history will be covered along with topics like Public key infrastructure, and various attacks. Also network and communication security will be discussed with topics including: network topologies, cabling and finally end with looking at network solutions. This course will discuss protocols and structures of communications transmitted across networks. OSI hierarchy and the devices that manage communications and how to protect them. It will cover ports, services and switches and how they must be secured and network based attacks to be prepared for.

This course will discuss protocols and structures of communications transmitted across networks. OSI hierarchy and the devices that manage communications and how to protect them. Malicious software exists in many forms. This course will cover many types of malware including worms, Trojans, viruses along with rootkits and back-doors. It then will cover business continuity, hot and cold sites, redundancy, and backups. It will look at specifics of how to recover from disasters and and how it ties into risk management. It covers incident management, types of laws and computer crimes and how to handle evidence, physical security and how to integrate with information security.

Finally, this course covers security fundamentals, risk management, threat modeling. governance, compliance, ethics, policies, and personnel security. When complete you’ll have a comprehensive understanding of how security integrates with all of these key areas of knowledge.

Course Outline(Certified Information Systems Security Professional) :

  1. Risk Definitions
  2. Risk Management
  3. Risk Assessment
  4. Responding to Risk
  5. Understanding Security
  6. Security Controls
  7. Roles and Responsibilities
  8. Human Resources
  9. Access Control Methodology
  10. Biometrics and Passwords
  11. Single Sign-on
  12. Intrusion Detection Systems
  13. Access Control Types
  14. More Access Control Types
  15. Information Classification
  16. Access Control Models
  17. Trusted Computing Base
  18. Protection Mechanisms
  19. Security Models
  20. Evaluation Criteria
  21. Admin Responsibilities
  22. Redundancy and Fault Tolerance
  23. Operational Issues
  24. Threats to Operations
  25. Cryptography Terms
  26. Historical Uses of Cryptography
  27. Cryptography Foundations
  28. Modern Cryptography
  29. Symmetric Algorithms
  30. Asymmetric Cryptography
  31. Public Key Infrastructure
  32. Cryptography and Attacks
  33. Network Communications Security
  34. Network Topologies
  35. Network Technologies and Cabling
  36. OSI Model
  37. Network Devices
  38. Network Security Sentries
  39. Protocols and Services
  40. Telephony
  41. VPN
  42. Wireless
  43. Network-Based Attacks
  44. Security Architecture
  45. Architectural Models
  46. Components and Threats
  47. Software Security Concerns
  48. Software Lifecycle Process
  49. Web Application Security
  50. Database Models
  51. Software Development
  52. Malware Attacks
  53. Project Initiation
  54. Business Impact Analysis
  55. Disaster Preparation
  56. Development Plan
  57. Emergency Response
  58. Incident Management
  59. Law
  60. Computer Crime
  61. Evidence Handling
  62. Physical Security
  63. Security and Risk Management
  64. Asset Security
  65. Security Engineering
  66. Communication and Network Security
  67. Identity and Access Management
  68. Security Assessment Testing
  69. Security Operations
  70. Software Development Security

Target Audience :

Developers and IT Professionals

Related Courses

Our Popular Courses

Upcoming Events

December 16 @ 8:00 am December 16 @ 5:00  pm Find out more