Certified Information Systems Security Professional – CISSP

5 Day Instructor Led Course – 35 Contact Hours

Center Benefits
Corporate Venue: Onsite or at NLP Tech for MA
International Curriculum
Certified Instructors
Computer Labs: 1 PC for each student
Exams: Prometric & VUE exams available (fees excluded)

Course Overview
Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification Consortium, commonly known as (ISC)². As of July 20, 2010, (ISC)² reports 67,744 members who hold the CISSP certification in 134 countries. In June, 2004, the CISSP was the first information security credential accredited by ANSI ISO/IEC Standard 17024:2003 accreditation, and, as such, has led industry acceptance of this global standard and its requirements. It is formally approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories. The CISSP has been adopted as a baseline for the U.S. National Security Agency’s ISSEP program.

Target Audience
The CISSP is appropriate for the mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs or Senior Security Engineers, etc.

CISSP® – Professional Experience Requirement:

Candidates must possess a minimum of five years of direct full-time security work experience in two or more of these 10 domains of the (ISC)² CISSP CBK®: Access Control / Application Security / Business Continuity and Disaster Recovery Planning

Cryptography / Information security Governance and Risk Management / Legal, regulations, Investigations and Compliance / Operations Security / Physical and environmental Security / Security Architecture and Design / Telecommunications and Network Security

Note: Effective January 1st 2012, professional work experience requirements for the CISSP will remain five years, but the domains will change.

Course Outline:

1. Access Control
2. Application Security
3. Plans for Disaster Recovery and Continuity of Business Continuity
4. Cryptography
5. Risk Management and Governance of Information security
6. Legal, regulations, Investigations and Compliance
7. Operations Security
8. Environmental and Physical Security
9. Architecture and Design for Security
10. Telecommunications and Network Security

Have a Question or
Need Information?