Network Training - Course Details

CISSPPC CISSP Prep Course

Network Training Course Description:
Systems Security Professional (CISSP) exam preparationcourse will help get you there. Get instruction from our experts with real-worldexperience as you cover all the material you need to prepare for the (ISC)2CISSP exam.
Network Training Course Duration:
5 DAYS
Network Training Course Target Audience:
IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers, and other security professionals whose positions require CISSP certification.
Network Training Course Prerequisite:
Systems administration experience, familiarization with TCP/IP, and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in ourSecurity+ Prep Course.
Course Content:

  • 1. Introduction

    • Course Overview
    • CISSP Candidate Requirements
    • CISSP Exam Review

  • 2. Security Operations

    • Operation Security Principles, Techniques, and Mechanisms
    • Principles and Practices of Good Security
    • Resource Protection Mechanisms and Techniques
    • Attacks and Prevention Methods

  • 3. Access Control

    • Authentication
    • Authorization
    • Accountability
    • Threats to Access Control

  • 4. Cryptography

    • History of Cryptography
    • Symmetric Encryption
    • Asymmetric Encryption
    • Hashing and Digital Signatures
    • Public Key Infrastructure
    • Cryptographic Attacks

  • 5. Security Architecture and Design

    • Computer Architecture
    • Rings of Protection
    • Security Models
    • System Evaluation

  • 6. Telecommunications and Network Security

    • The OSI Model
    • The TCP/IP Model
    • WAN Protocols
    • Routing
    • Wireless Systems
    • Fault Tolerance

  • 7. Disaster Recovery and Business Continuity Planning

    • Disaster Recovery Planning
    • Business Impact Analysis
    • Business Continuity Planning
    • Backup and Off-Site Facilities
    • Testing Contingency Plans

  • 8. Legal, Regulations, Compliance, and Investigations

    • Laws and Ethics
    • Computer Crime
    • Incident Response and Forensics

  • 9. Software Development Security

    • Database Security
    • System Development
    • Software Development Methods
    • Threats and Vulnerabilities

  • 10. Information Security Governance and Risk Management

    • Security Management
    • Risk Analysis
    • Classification Controls

  • 11. Physical (Environmental) Security

    • Threats to Physical Security
    • Administrative Controls
    • Environmental and Safety Controls
    • Physical and Technical Controls

  • 12. Test Review and Preparation

    • Test Review
    • Test Registration
    • Test Preparation
    • Certification Maintenance