Laptop open to ctc academy

(ISC)² CISSP Certification

In this engaging and comprehensive online training course, you receive in-depth instruction covering all 8 of the CISSP domains.

Expert knowledge in these domains is critical in today's world of information technology. As you architect, design, and manage IT solutions, your extensive knowledge and expertise-proven by your CISSP certification-will enhance the security posture of your company or your clients.

We make it easier than ever to certify your team and meet requirements.

live-online

The (ISC)² CISSP Certification boot camp is live-online in a couple of different formats. Most camps are 1 to 2 weeks long. If you miss a day of the live-online, you can get access to the recording of that day that same night. You have access for 12 months of any live-online (ISC)² CISSP Certification boot camps.

on-demand

When you sign up for the (ISC)² CISSP Certification boot camp you get access to the previous live-online (ISC)² CISSP Certification boot camp along with all the study material, practice exams and access to the instructor so you can get started right away. You will have access for 12 months to all live-online and recorded (ISC)² CISSP Certification boot camps. Learn at your own pace whenever and wherever you want, even if you work full-time.

The Full Package

what's included

Our mission is to equip you and your team with everything you need to succeed, enhance your skills, and pass your (ISC)² CISSP Certification exam!

  • The hours needed to take the
    (ISC)² CISSP Certification
    exam
  • Flexible times on live-online boot camps
  • 12-month access to all live and on-demand content
  • Practice exams with unlimited attempts
  • Virtual labs and study guides
View all features
(ISC)² CISSP Certification
CISSP
why choose pmp?

pmp It adds value

CIO magazine ranked the PMP as the top project management certification in North America because it demonstrates you have the specific skills employers seek, dedication to excellence and the capacity to perform at the highest levels.

pmp delivers benefits

The median salary for project professionals in North America is 25% higher than those without it.

PMP proves you work smarter

It shows you have the skills to drive business results and increase your organization’s impact in the office and around the world.
Course
CISSP
Exam
CISSP
Hours to Complete
30.0
Formats Offered
[Live-online] [On-demand]
Vendor
(ISC)²

Skills Learned

After completing this online training course, students will be able to:
  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Who should attend?

This course is intended for:

CISSP certification aids job-seekers interested in positions such as Security Architect, Security Auditor, IT Director, Chief Information Security Officer, Network Architect, and more.  CISSP is an advanced security certification, as evidenced by its requirement of 5 years of full time experience in a security-related position.  Anyone seeking to enhance their current skillset in the security and provide evidence of competency in many areas of security should seek the CISSP certification.

Prerequisites

None, but we recommend that students have a CompTIA Security+ certification or have equivalent knowledge.

Course Outline

01. CISSP and the Exam
  • How to Prepare
  • Question Format Concepts
  • Exam Preparation

02. Security and Risk Management
  • Security Concepts
  • Governance
  • Information System
  • GEIT
  • Organizational Roles and Structure
  • Security Policy, Standards, Procedures and Guidelines
  • Personnel Security Policies and Procedures
  • Security Awareness Training and Education Program

03. Security Controls
  • Risk Management
  • Asset Management
  • Threat and Vulnerability Assessments
  • Qualitative and Quantitative Analysis
  • Security Controls
  • Data Management and Retention
  • Control Assessments
  • Continuous Improvement
  • Supply Chain Risk Management
  • Risk Maturity Models
  • Resource Provisioning

04. Security Architecture and Engineering
  • Security Design Principles
  • Security Models
  • Protection Mechanisms
  • Security Controls Based on System Requirements
  • Evaluation Standards for Trust and Assurance
  • Layered Defense

05. Identity and Access Management
  • Identity and Access Management
  • Identification
  • Authentication
  • Directory Services
  • Radius and TACACS+
  • Single Sign-On
  • Federated Identity Management, SAML, OAuth and OpenID
  • Open ID and WS Federated SSO
  • Cloud Based Identity Services

06. Authorization and Access Management Vulnerabilities Intro
  • Authorization
  • Mandatory and Discretionary Access Controls
  • Role Based Access Controls (RBAC)
  • Practices of Identity and Access Management
  • Access Control Attacks

07. Cryptography
  • Cryptography Introduction
  • Ciphers
  • Symmetric Key Cryptosystems (DES, AES, IDEA)
  • Asymmetric Key Cryptosystems (DH, RSA, ECC)
  • Hashing
  • Digital Signatures
  • Comparing Cryptographic Solutions

08. Computer Architecture and Application Development Intro
  • Digital Certificates
  • Public Key Infrastructure
  • Pretty Good Privacy
  • Privacy
  • Legal

09. Communication and Network Security
  • Protocols
  • The OSI Model
  • Layer 2 Ethernet
  • Protocol Data Units
  • TCP and UDP
  • Internet Protocol (IP)
  • IPv6
  • TCP / IP Communication
  • Routing

10. Physical Security
  • Crime Prevention Through Environmental Design
  • Physical Security Planning
  • Facility Management
  • Physical Controls
  • Technical Controls
  • Building Entry Points
  • Inside the Building
  • Physical Aspects of Networks
  • Computer Architecture

11. Security Operations
  • SDLC
  • SDLC Models
  • Database Management Systems (DBMS)
  • Operations and Maintenance
  • KPI’s and KRI’s
  • Security Assessments
  • Patch and Vulnerability Management
  • Planning for Incidents
  • Business Impact Analysis (BIA)
  • Business Continuity (BC)
  • Recovery Strategies
  • Testing the Plan

We're one of the leading IT certification
training and boot camp providers.

50,000+

certified students

250+

corporate partners

25

years of experience

Have a question?

Send us a message below and we will be more than happy to provide you with any information you need.
Name
Email
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.