Certified Information Systems Security Professional (CISSP)

With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will expand upon your knowledge by addressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing the basic skills required to prepare for CISSP certification.

Description

ISC2You will control access to data and information systems using common access control best practices. You will discover how networks are designed for security, and the components, protocols, and services that allow telecommunications to occur in a secure manner. Next, you will learn about the principles of security management and how to manage risk as part of a comprehensive information security management program. You will explore applications and systems development security controls. Then, you will learn how to perform cryptography and how to secure system architecture. You will examine operations security and the appropriate controls and best practices to use to keep operations secure. You will learn how to perform business continuity planning and apply physical security to protect organizational assets and resources. Finally, you will explore law, investigations, and ethics with respect to information systems security and computer forensics.

Target audience

Students pursuing CISSP training want to establish themselves as credible computer security professionals through a study of all 10 CISSP Common Body of Knowledge domains. Validating this knowledge is the goal of certification; therefore, students attending this training should also meet the requirements needed to sit for the CISSP certification exam. These include four years of direct professional work experience in one or more fields related to 10 CBK security domains, or a college degree and three years of experience. Check with (ISC)2 for the most up-to-date requirements. New certifications have emerged and will continue to emerge from (ISC)2, which may cause changes to base requirements.

Prerequisites

Students should have certifications in A+, Network+, or Security+, or possess equivalent professional experience. Students may have one or more of the following certifications or equivalent experience: MCSE, SCNP, CCNP, RHCE, LCE, CNE, SSCP, SANS, or GIAC.

Similar courses

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management - making it an important stepping stone of an IT security career.

More Information

The Certified Professional Ethical Hacker course is the introductory training to mile2's line of penetration testing courses and certifications.

More Information

The Certified Associate in Project Management (CAPM) is a globally recognized credential that demonstrates your ability to work as a project management professional. This online course is designed to equip you with the foundational knowledge and skills needed to successfully pass the CAPM exam and launch your project management career!

More Information

When a business is hit by a natural disaster, cyber crime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in the vendor neutral Certified Disaster Recovery Engineer certification course.

More Information

The Certified Information Systems Security Manager certification course is designed to teach towards and certify a information systems professional high standard of excellence in following areas:

More Information

The Certified Information Systems Security Officer course is designed for forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on information security

More Information

The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting.

More Information

The mile2 Certified Security Sentinel training is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

The Certified Vulnerability Assessor course trains students to be proficient in conducting vulnerability assessments The vendor-neutral Certified Vulnerability Assessor certification course helps students understand the importance of vulnerability assessments by providing intricate knowledge and skills in the Vulnerability Assessment arena.

More Information

This workshop helps the student to definitively understand the customer need using various interviewing techniques and templates.

More Information

Looking to boost your project management skills? Join our PMP Certification event online! Learn the ins and outs of project management, from planning to execution, all from the comfort of your home. Our expert instructors will guide you through the process, helping you ace the PMP exam. Don't miss this opportunity to advance your career and become a certified project management pro.

More Information

Get Certified at your own pace with these Mile 2 Cyber Security Ultimate Self-Study and Certification Bundles.Everything you need to pass 1 mile2 certification on your own time and at your own pace!

More Information

The training course provides the pillars, tools and resources required for the effective implementation of a performance management framework.

More Information

- Understand the logic of strategy planning at every level of the organization; - Become familiar with an easy-to-use toolkit for every step of the strategy planning process; - Be ready to transfer the knowledge accumulated into your organization.

More Information

-Expand your knowledge and skills in strategy management; -Get a toolkit to assist you every step of the strategy execution process; -Avoid common pitfalls in strategy execution organization.

More Information

> Improve Customer Service team’s performance; > Deliver responsive and engaging services; > Gain the recognition, loyalty and advocacy of your external and internal customers.

More Information

> Improve the performance of your company; > Ensure excellence in achieving organizational strategic objectives through a rigorous cascading process; > Attain the company’s desired state of evolution.

More Information

This course is designed to help candidates prepare for sitting the ISACA CISM certification examination. By taking this course and obtaining CISM certification, your experience and skills in supporting the information security needs of your organization will be validated. Securing the organization’s information is a critical business objective in today’s business environment. The information that an organization depends on to be successful can be at risk from numerous sources. By effectively managing inform

More Information

In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives.

More Information