• Home
  • Course Catalog
  • Contact Us
  • Request info
    Contact Us
    First Name*
    Last Name*
    Email
    Phone
    Questions/Comments
    Lead Status
    Lead Source*
    Referral Information
    External Referrer
    Partner SMEC ID
    Enter text from the pic*

    Certified Information Systems Security Professional

    $2,995.00
    What would you do in the face of an actual information security problem? The Certified Information Systems Security Professional (CISSP) program is designed to ensure that you are equipped with the knowledge and skills to handle computer security for a company or client with a mastery of the ISC² Common Body of Knowledge. The CISSP credential has developed as the key certification for security professionals in government and industry. Corporations are seeking certified, experienced information security professionals to safeguard their information and assets. The CISSP® is considered the global standard that proves an individual's proficiency in several security disciplines.

    What would you do in the face of an actual information security problem? The Certified Information Systems Security Professional (CISSP) program is designed to ensure that you are equipped with the knowledge and skills to handle computer security for a company or client with a mastery of the ISC² Common Body of Knowledge. The CISSP credential has developed as the key certification for security professionals in government and industry. Corporations are seeking certified, experienced information security professionals to safeguard their information and assets. The CISSP® is considered the global standard that proves an individual's proficiency in several security disciplines. Security professionals consider the Certified Information Systems Security Professional (CISSP) to be the most desired certification to achieve. This complete program will explore each of the eight domains required for mastery. This program includes six fictional scenarios based on real-world challenges that cybersecurity professionals face. Each scenario is self-paced and contains interactive games, real-world examples, expert videos, quizzes, assessments, and focused instruction. This program also includes an assessment of students readiness to take ISC2's CISSP® Exam. It contains two 120-question practice exams, which cover The International Information System Security Certification Consortium's eight domains required for certification. Upon successful completion of this program, you will be prepared to sit for the CISSP certification exam. The certification exam is included in the program tuition!

    Outline

    CISSP Module 1 - Security and Risk Management
    • Confidentiality, Integrity and Availability
    • Security Governance
    • Effective Security Program
    • Compliance
    • Global Legal and Regulatory Issues
    • Manage Personnel Security
    • Risk Management Concepts
    • Threat Modeling
    • Acquisitions Strategy and Practice
    • Security Education

    CISSP Module 2 - Asset Security
    • Data Management
    • Data Standards
    • Longevity and Use
    • Asset Management
    • Protect Privacy
    • Ensure Appropriate Retention
    • Data Security Controls
    • Standards Selection
    • Classify Information

    CISSP Module 3 - Security Engineering
    • Fundamental Concepts of Security Models
    • Information Systems Security Evaluation Models
    • Vulnerabilities of Security Architecture
    • Vulnerabilities in Mobile Systems
    • Database Security
    • The Application and Use of Cryptography
    • Site and Faculty Design Considerations
    • Site Planning
    • Implementation and Operation of Facilities Security

    CISSP Module 4 - Communications and Network Security
    • Secure Network Architecture and Design
    • Implications of Multi-Layer Protocols
    • Converged Protocols
    • Wireless Security Issues
    • Securing Network Components
    • Secure Communication Channels
    • Remote Access
    • Scanning Techniques
    • Network Attacks

    CISSP Module 5 - Identity and Access Management
    • Physical and Logical Access to Assets
    • Identification and Authentication of People and Devices
    • Identity Management Implementation
    • Identity as a Service (IDaaS)
    • Integrate Third-Party Identity Services
    • Implement and Management Authorization Mechanisms
    • Prevent or Mitigate Access Control Attacks
    • Identity and Access Provisioning Lifecycle

    CISSP Module 6 - Security Assessment and Testing
    • Assessment and Test Strategies
    • Software Development
    • Log Reviews
    • Synthetic Transactions
    • Code Review and Testing
    • Negative Testing/Misuse Case Testing
    • Interface Testing
    • Collect Security Process Data
    • Internal and Third-Party Audits
    • SOC Reporting Options

    CISSP Module 7 - Security Operations
    • Investigations
    • Configuration Management
    • Foundational Security Operations Concepts
    • Resource Protection
    • Incident Response
    • Patch and Vulnerability Management
    • Change and Configuration Management
    • The Disaster Recovery Process
    • Test Plan Review
    • Access Control

    CISSP Module 8 - Security in the Software Development Life Cycle
    • Software Development Security Outline
    • Environment and Security Controls
    • Security of the Software Environment
    • Malware Protection
    • Maturity Models
    • Software Protection Mechanisms
    • Assess the Effectiveness of Software Security
    • Assess Software Acquisition Security

    Duration

    12 months

    Hours

    250

    Audience

    Cyber Security professionals have risen to the forefront of the Information Technology industry with the continued increase in security threats. The CISSP certification is an elite way to demonstrate your knowledge, advance your career and become a member of a community of security professionals leading the charge against cyber security threats. With this program you will show you have all it takes to design, engineer, implement and run an information security program. This program does not require any previous security experience and is the first step towards a career as a Security Consultant, Security Manager, Security Auditor, Security Analyst, Chief Information Security Officer, Director of Security, and much more! Note: To obtain full CISSP credential candidates must have a minimum of five years previous experience. Candidates unable to meet the previous experience requirement will be given Associate level status and will be required to complete the experience requirements before removing associate status.

    Certification

    This program includes CISSP Certification Practice Exams and a voucher for the CISSP Certification!
    The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
    The CISSP is ideal for those working in positions such as, but not limited to:
    Security Consultant
    Security Manager
    IT Director/Manager
    Security Auditor
    Security Architect
    Security Analyst
    Security Systems Engineer
    Chief Information Security Officer
    Director of Security
    Network Architect
    Note: To obtain full CISSP credential candidates must have a minimum of five years previous experience. Candidates unable to meet the previous experience requirement will be given Associate level status and will be required to complete the experience requirements before removing associate status.

    Language

    English

    Instructor

    Though this program is a self-paced program it is supported by an educational mentor. Educational mentors are subject matter experts who have years of experience in their field as well as the necessary educational training and credentials to work as an expert. The mentor is available to answer any questions a learner may have including questions on course content, course material, certifications, and even industry questions. Mentors also monitor the progress of learners to ensure training retention and program advancement. In eLearning, motivation is a key tool to success. Because of this, mentors provide encouraging comments, feedback, and coaching to motivate learners throughout the duration of the program to support completion and success!

    Requirements

    This program includes all required materials. The following textbooks/ebooks are included in this program:
    Official (ISC)2 Guide to the CISSP CBK by Adam Gordon

    WE-IT-75001

    Data sheet

    Certification included
    true
    Training Plan URL
    https://worldeducationllc.sharepoint.com/bizdev/acctmgmt/_layouts/15/guestaccess.aspx?docid=0c9ac2d327079497dafcf887fb77cbb1d&authkey=ASgcjCzHXWl4LyrbPzIL28M