Language: English
Short Description: The CISSP® Exam Prep Course prepares test-takers for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP® certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024. As security breaches outpace the available pool of security experts, the need for information security professionals with proper certifications will continue to grow. Among other titles, obtaining the CISSP® certification prepares one for a position as a Security Analyst, Chief Information Security Officer, or as a Security Architect.
This course contains two 120-question practice exams, which cover The International Information System Security Certification Consortium's eight domains:
Asset Security
Communications and Network Security
Identity and Access Management
Security and Risk Management
Security Assessment and Testing
Security Engineering
Security Operations
Software Development Security
Instructor Description: This course is completely self-paced. Learners are provided access to the learner support helpdesk where they can ask any questions relating to the experience or curriculum.
Requirements
This program includes all required materials.
Hide Syllabus
Lesson 1
Learning Outcomes:
Discuss the foundational concepts of information security, such as the CIA triad
Know the different information security frameworks
Explain information security training and education
Discuss the information life cycle
Explain how information and data are classified
Learn about data and information privacy
Understand system and computer architecture
Explain and compare symmetric and asymmetric cryptography
Learn about physical security risks and mitigation
Compare different types of networks
Contrast the OSI model with the TCP/IP Model
Identify and differentiate among network, routing, and data link protocols
Describe the functions of common networking devices and how wireless networks work
Evaluate different identification methods and technologies
Assess and test various security controls
Describe business continuity and disaster recovery plans
Understand the role of security operations
Identify trusted recovery techniques
Relate the steps required in effective incident management
Discuss the role of auditing, monitoring, and detection in information security
Learn the steps of a digital forensics investigation
Explain the software development life cycle
Discuss the role of databases in information security
Recognize several software-based and network attacks
Hide Syllabus