Certified Information Systems Security Professional – CISSP
5 Day Instructor Led Course – 35 Contact Hours
Center Benefits
Corporate Venue: Onsite or at NLP Tech for MA
International Curriculum
Certified Instructors
Computer Labs: 1 PC for each student
Exams: Prometric & VUE exams available (fees excluded)
Course Overview
Certified Information Systems Security Professional (CISSP) is an independent
information security certification governed by the not-for-profit International
Information Systems Security Certification Consortium, commonly known as
(ISC)². As of July 20, 2010, (ISC)² reports 67,744 members who hold the CISSP
certification in 134 countries. In June, 2004, the CISSP was the first
information security credential accredited by ANSI ISO/IEC Standard 17024:2003
accreditation, and, as such, has led industry acceptance of this global standard
and its requirements. It is formally approved by the U.S. Department of Defense
(DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM)
categories. The CISSP has been adopted as a baseline for the U.S. National
Security Agency’s ISSEP program.
Target Audience
The CISSP is appropriate for the mid- and senior-level managers who are working
toward or have already attained positions as CISOs, CSOs or Senior Security
Engineers, etc.
Prerequisites
CISSP® – Professional Experience Requirement:
Candidates must possess a minimum of five years of direct full-time security work experience in two or more of these 10 domains of the (ISC)² CISSP CBK®: Access Control / Application Security / Business Continuity and Disaster Recovery Planning
Cryptography / Information security Governance and Risk Management / Legal, regulations, Investigations and Compliance / Operations Security / Physical and environmental Security / Security Architecture and Design / Telecommunications and Network Security
Note: Effective January 1st 2012, professional work experience requirements for the CISSP will remain five years, but the domains will change.
Course Outline:
Introduction
1. Access Control
2. Application Security
3. Plans for Disaster Recovery and Continuity of Business Continuity
4. Cryptography
5. Risk Management and Governance of Information security
6. Legal, regulations, Investigations and Compliance
7. Operations Security
8. Environmental and Physical Security
9. Architecture and Design for Security
10. Telecommunications and Network Security