Knowledge Transfer Microsoft Certified Training Partner CTEC
Knowledge Transfer is a Microsoft Certified Gold Partner
Microsoft Certified Gold Training Partner
Search for a Course Topic:
Public Courses
Corporate Services & Training
 

 

 



 Course Search
Keyword
Course #
State

 Training Delivery
 
Training Delivery
Custom Curriculum
Course List
 
 Main Menu
 
Home
View Courses
Site Index
 
 


(ISC) CISSP - 6 Days Overview




  • 1. Security and Risk Management 

  • (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)

    • Understand and Apply Concepts of Confidentiality, Integrity, and Availability

    • Apply Security Governance Principles

    • Compliance

    • Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context

    • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines

    • Understand Business Continuity Requirements

    • Contribute to Personnel Security Policies

    • Understand and Apply Risk Management Concepts

    • Understand and Apply Threat Modeling

    • Integrate Security Risk Considerations into Acquisitions Strategy and Practice

    • Establish and Manage Security Education, Training, and Awareness



  • 2. Asset Security

  • (Protecting Security of Assets)

    • Classify Information and Supporting Assets

    • Determine and Maintain Ownership

    • Protect Privacy

    • Ensure Appropriate Retention

    • Determine Data Security Controls

    • Establish Handling Requirements



  • 3. Security Engineering 

  • (Engineering and Management of Security)

    • Implement and Manage an Engineering Life Cycle Using Security Design Principles

    • Understand Fundamental Concepts of Security Models

    • Select Controls and Countermeasures Based Upon Information Systems Security Standards

    • Understand the Security Capabilities of Information Systems

    • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements

    • Assess and Mitigate Vulnerabilities in Web-based Systems

    • Assess and Mitigate Vulnerabilities in Mobile Systems

    • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems

    • Apply Cryptography

    • Apply Secure Principles to Site and Facility Design

    • Design and Implement Facility Security



  • 4. Communications and Network Security

  • (Designing and Protecting Network Security)

    • Apply Secure Design Principles to Network Architecture

    • Securing Network Components

    • Design and Establish Secure Communication Channels

    • Prevent or Mitigate Network Attacks



  • 5. Identity and Access Management 

  • (Controlling Access and Managing Identity)

    • Control Physical and Logical Access to Assets

    • Manage Identification and Authentication of People and Devices

    • Integrate Identity as a Service (IDaaS)

    • Integrate Third-Party Identity Services

    • Implement and Manage Authorization Mechanisms

    • Prevent or Mitigate Access Control Attacks

    • Manage the Identity and Access Provisioning Life Cycle



  • 6. Security Assessment and Testing

  • (Designing, Performing, and Analyzing Security Testing)

    • Design and Validate Assessment and Test Strategies

    • Conduct Security Control Testing

    • Collect Security Process Data

    • Conduct or Facilitate Internal and Third-Party Audits



  • 7. Security Operations 

  • (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

    • Understand and Support Investigations

    • Understand Requirements for Investigation Types

    • Conduct Logging and Monitoring Activities

    • Secure the Provisioning of Resources through Configuration Management

    • Understand and Apply Foundational Security Operations Concepts

    • Employ Resource Protection Techniques

    • Conduct Incident Response

    • Operate and Maintain Preventative Measures

    • Implement and Support Patch and Vulnerability Management

    • Participate in and Understand Change Management Processes

    • Implement Recovery Strategies

    • Implement Disaster Recovery Processes

    • Test Disaster Recovery Plan

    • Participate in Business Continuity Planning

    • Implement and Manage Physical Security

    • Participate in Personnel Safety



  • 8. Software Development Security 

  • (Understanding, Applying, and Enforcing Software Security)

    • Understand and Apply Security in the Software Development Life Cycle

    • Enforce Security Controls in the Development Environment

    • Assess the Effectiveness of Software Security

    • Assess Software Acquisition Security



  • Saturday Review

    • Official Training Camp Value-Add Exam Review

    • Official CISSP Certification Exam (Onsite)




 

View Printer Friendly Page

Course Schedule
  Start Date  City  Price  
 7/17/2017
 $5995
Enroll
 9/18/2017
 $5995
Enroll
 11/13/2017
 $5995
Enroll

To Inquire About Future Classes

Request a class date

if one is not scheduled.



Comments on the Course

  • WE LIMIT OUR CLASS SIZES TO 12 STUDENTS - THIS ALLOWS FOR MORE ATTENTION FROM THE INSTRUCTOR, MORE SPACE FOR STUDENTS TO WORK AND MORE FOCUSED ENVIRONMENT.