(CISSP) Certified Information Systems Security Professional

STUDENTS ENROLLED
    Course Description The Official (ISC)2® CISSP® CBK® Review Seminar is the most comprehensive, complete review of information systems security concepts and industry best practices, and the only review course endorsed by (ISC)2. Review Seminars are held worldwide and conducted by (ISC)2-authorized instructors, each of whom is up-to-date on the latest information security-related developments and is an expert in the specific … READ MORE

    Course Description

    The Official (ISC)2® CISSP® CBK® Review Seminar is the most comprehensive, complete review of information systems security concepts and industry best practices, and the only review course endorsed by (ISC)2. Review Seminars are held worldwide and conducted by (ISC)2-authorized instructors, each of whom is up-to-date on the latest information security-related developments and is an expert in the specific domains.

    Audience profile

    IT professionals seeking to enhance their careers and gain credibility as information security specialists

    Objectives

    Best-practice information security management practices, including IS technical skills, risk management and business continuity planning.

    • Access control and physical security
    • Cryptography
    • Security architecture for applications and networks.

    Pre-requisites

    The Official (ISC)2 CISSP CBK Review Seminar offers a high-level review of the main topics and identifies areas that students need to study and includes:

    • Post-Seminar Self-Assessment
    • 100% up-to-date material
    • Contributions from CISSPs, (ISC)2 Authorized Instructors and subject matter experts
    • An overview of the scope of the information security field

    Outline

    Lesson 1: Information Security and Risk Management
    Information Security Management
    Security Awareness Training and Education
    Risk Management
    Ethics
    Lesson 2: Access Control
    Definitions and Key Concepts
    Information Classification
    Access Control Categories and Types
    Access Control Threats
    Access to Systems/Data
    Access Control Technologies
    Assurance Mechanisms
    Lesson 3: Cryptography
    Key Concepts and Definitions
    History
    Encryption Systems
    Symmetric and Asymmetric Algorithms
    Message Integrity Controls
    Digital Signatures
    Management of Cryptographic Systems
    Threats and Attacks
    Lesson 4: Physical Security
    Definitions and Key Concepts
    Site Location
    Layered Defense Model
    Infrastructure Support Systems
    Equipment Protection
    Lesson 5: Security Architecture and Design
    Components and Principles
    System Security Techniques
    Hardware
    Software
    Security Models and Architecture Theory
    Security Evaluation Methods and Criteria
    Lesson 6: Business Continuity Planning and Disaster Recovery Planning
    Project Scope Development and Planning
    Business Impact Analysis
    Emergency Assessment
    Continuity and Recovery Strategy
    Plan Design and Development
    Implementation
    Restoration
    Plan Management
    Lesson 7: Telecommunications and Network Security
    Key Concepts and Definitions
    Networks
    Protocols
    Remote Access
    Network Components
    Telephony
    Lesson 8: Application Security
    System Lifecycle Security
    Application Environment and Security Controls
    Programming Languages and Tools
    Databases and Data Warehouses
    Applications Systems Threats and Vulnerabilities
    Applications Security Controls
    Lesson 9: Operations Security
    Resource Protection
    Change Control Management
    Physical Security Controls
    Privileged Entity Control
    Lesson 10: Legal, Regulations, Compliance and Investigation
    Major Legal Systems
    Legal Concepts
    Regulatory Issues
    Investigation
    Computer Forensics

    LESS

    Course Reviews

    No Reviews found for this course.

    TAKE THIS COURSE
    • course Hours: 40
    • course price: EGP
    • Course Dates: