CISSP Prep Course

Certified Information Systems Security Professional

Certification Description

Are you looking to accelerate your information security career? Differentiate yourself to employers and/or clients? The CISSP is an elite way to demonstrate your knowledge, advance your career, and join a community of like-minded cybersecurity leaders. It shows you have all it takes to design, engineer, implement, and run a successful information security program.

By taking the CISSP exam, you’ll have the chance to prove you have the technical and managerial knowledge necessary to effectively design, engineer, and manage the overall security posture of an organization.

Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program.

The CISSP exam evaluates your expertise across eight security domains. Think of the domains as topics you need to master based on your professional experience and education.

5-Days

Content Coverage

This course provides in-depth coverage of the eight domains required to pass the CISSP exam:

  • Security and Risk Management
  • Asset Security
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management (IAM)
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security
  • Security 101
  • Understand and Apply Security Concepts
  • Security Boundaries
  • Evaluate and Apply Security Governance Principles
  • Manage the Security Function
  • Security Policy, Standards, Procedures, and Guidelines
  • Threat Modeling
  • Supply Chain Risk Management
  • Personnel Security Policies and Procedures
  • Understand and Apply Risk Management Concepts
  • Social Engineering
  • Establish and Maintain a Security Awareness, Education, and Training Program
  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Analysis
  • Continuity Planning
  • Plan Approval and Implementation
  • Categories of Laws
  • Laws
  • State Privacy Laws
  • Compliance
  • Contracting and Procurement
  • Identifying and Classifying Information and Assets
  • Establishing Information and Asset Handling Requirements
  • Data Protection Methods
  • Understanding Data Roles
  • Using Security Baselines
  • Cryptographic Foundations
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Life Cycle
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Hybrid Cryptography
  • Applied Cryptography
  • Cryptographic Attacks
  • Secure Design Principles
  • Techniques for Ensuring CIA
  • Understand the Fundamental Concepts of Security Models
  • Select Controls Based on Systems Security Requirements
  • Understand Security Capabilities of Information Systems
  • Shared Responsibility
  • Data Localization and Data Sovereignty
  • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Client-Based Systems
  • Server-Based Systems
  • Industrial Control Systems
  • Distributed Systems
  • High-Performance Computing (HPC) Systems
  • Real‐Time Operating Systems
  • Internet of Things
  • Edge and Fog Computing
  • Embedded Devices and Cyber-Physical Systems
  • Microservices
  • Infrastructure as Code
  • Immutable Architecture
  • Virtualized Systems
  • Containerization
  • Mobile Devices
  • Essential Security Protection Mechanisms
  • Common Security Architecture Flaws and Issues
  • Apply Security Principles to Site and Facility Design
  • Implement Site and Facility Security Controls
  • Implement and Manage Physical Security
  • OSI Model
  • TCP/IP Model
  • Analyzing Network Traffic
  • Common Application Layer Protocols
  • Transport Layer Protocols
  • Domain Name System
  • Internet Protocol (IP) Networking
  • ARP Concerns
  • Secure Communication Protocols
  • Implications of Multilayer Protocols
  • Segmentation
  • Wireless Networks
  • Edge Networks
  • Satellite Communications
  • Cellular Networks
  • Content Distribution Networks (CDNs)
  • Secure Network Components
  • Protocol Security Mechanisms
  • Secure Voice Communications
  • Remote Access Security Management
  • Multimedia Collaboration
  • Monitoring and Management
  • Load Balancing
  • Manage Email Security
  • Virtual Private Network
  • Switching and Virtual LANs
  • Network Address Translation
  • Third-Party Connectivity
  • Switching Technologies
  • WAN Technologies
  • Fiber-Optic Links
  • Prevent or Mitigate Network Attacks
  • Controlling Access to Assets
  • The AAA Model
  • Implementing Identity Management
  • Managing the Identity and Access Provisioning Life Cycle
  • Comparing Access Control Models
  • Implementing Authentication Systems
  • Zero‐Trust Access Policy Enforcement
  • Understanding Access Control Attacks
  • Building a Security Assessment and Testing Program
  • Performing Vulnerability Assessments
  • Testing Your Software
  • Training and Exercises
  • Implementing Security Management Processes and Collecting Security Process Data
  • Apply Foundational Security Operations Concepts
  • Address Personnel Safety and Security
  • Provision Information and Assets Securely
  • Managed Services in the Cloud
  • Perform Configuration Management (CM)
  • Manage Change
  • Manage Patches and Reduce Vulnerabilities
  • Conducting Incident Management
  • Implementing Detection and Preventive Measures
  • Logging and Monitoring
  • Automating Incident Response
  • The Nature of Disaster
  • Understand System Resilience, High Availability, and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance
  • Investigations
  • Major Categories of Computer Crime
  • Ethics
  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehousing
  • Storage Threats
  • Understanding Knowledge-Based Systems
  • Malware
  • Malware Prevention
  • Application Attacks
  • Injection Vulnerabilities
  • Exploiting Authorization Vulnerabilities
  • Exploiting Web Application Vulnerabilities
  • Application Security Controls
  • Secure Coding Practices

Who Should Attend?

Follow On Certifications