New members: get your first 7 days of ITTutorPro Premium for free! Join for free

CISSP Certification

Course Description

CISSP Certification

The Certified Information Systems Security Professional (CISSP) is a globally recognized certification for information technology security professionals. Aligned with (ISC)² CBK 2018, our CISSP training covers all areas of IT security so you can become a strong information security professional.

CISSP Certification Course Overview

The CISSP certification training develops your expertise in defining the IT architecture and in designing, building, and maintaining a secure business environment using globally approved information security standards. The CISSP training covers industry best practices and prepares you for the CISSP certification exam held by (ISC)².

Eligibility

The CISSP course is the most globally recognized professional requirement in the IT Security domain. This CISSP training is best suited for those at the intermediate level of their career including; security consultants/managers, IT directors/managers, security auditors/architects, security system engineers, CIOs, and network architects.

Pre-requisites

To obtain your CISSP certification, you must have a minimum of five years of full-time professional work experience in two or more of the 8 domains of the CISSP – (ISC)² CBK 2018. A qualified individual with less than five years of experience will receive the (ISC)² associate title.

Share on:

Course Syllabus

Lesson 01 – Course Introduction

Course Introduction

Lesson 02 – Security and Risk Management

1.01 Security and Risk Management
1.02 Information Security Management
1.03 Security Controls
1.04 Information Security Management and Governance
1.05 Goals, Mission, and Objectives
1.06 Due Care
1.07 Security Policy
1.08 Compliance
1.09 Computer Crimes
1.10 Legal Systems
1.11 Intellectual Property (IP) Law
1.12 Privacy
1.13 General Data Protection Regulation
1.14 Security
1.15 Risk Analysis
1.16 Types of Risk Analysis
1.17 Security Control Assessment
1.18 Threat Modeling
1.19 Supply-Chain Risk Management
1.20 Third-Party Management
1.21 Business Continuity Planning
1.22 Business Continuity Planning Phases
1.23 Managing Personnel Security
1.24 Security Awareness Training
1.25 Program Effectiveness Evaluation
1.26 Key Takeaways
Knowledge Check

Lesson 03 – Asset Security

2.01 Asset Security
2.02 Information Classification
2.03 Data Classification
2.04 Data Life Cycle
2.05 Data Management
2.06 Different Roles
2.07 Data Remanence
2.08 Privacy
2.09 States of Data
2.10 Data Loss Prevention
2.11 Key Takeaways
Knowledge Check

Lesson 04 – Security Engineering

3.01 Introduction
3.02 Security Engineering
3.03 Security Architecture
3.04 Security Models
3.05 Evaluation Criteria
3.06 System Security
3.07 CPU
3.08 Memory
3.09 Security Mode
3.10 Cloud Computing
3.11 IOT
3.12 Industrial Control System (ICS)
3.13 Cryptography
3.14 Encryption Methods
3.15 DES
3.16 Asymmetric Cryptography
3.17 Public Key Infrastructure
3.18 Cryptanalysis
3.19 Key Management
3.20 Critical Path Analysis
3.21 Site Location
3.22 Fire
3.23 HVAC
3.24 Key Takeaways
Knowledge Check

Lesson 05 – Communications and Network Security

4.01 Introduction
4.02 Network Architecture and Design
4.03 IP Addressing
4.04 Network Protocols
4.05 Transmission Media
4.06 Firewall
4.07 Intrusion Detection System and Intrusion Prevention System
4.08 Network Access Control (NAC)
4.09 Content Delivery Network (CDN)
4.10 Networks
4.11 Software-Defined Networking (SDN)
4.12 Remote Access
4.13 Internet Security Protocol (IPsec)
4.14 Voice over Internet Protocol (VoIP)
4.15 Phreaking
4.16 Secure Access Protocols
4.17 Wireless Technologies
4.18 Network Attacks
4.19 Key Takeaways
Knowledge Check

Lesson 06 – Identity and Access Management

5.01 Identity and Access Management
5.02 Identity and Access Management
5.03 Identity Management
5.04 Biometrics
5.05 Passwords
5.06 Tokens
5.07 Memory Cards and Smart Cards
5.08 Access and Authorization Concepts
5.09 Identity Management Implementation
5.10 Kerberos
5.11 Access Control Types
5.12 Access Control Models
5.13 Access Control Tools and Techniques
5.14 Accountability
5.15 Access Control Monitoring
5.16 Identity Proofing
5.17 Markup Languages
5.18 Identity as a Service (IDaaS)
5.19 Key Takeaways
Knowledge Check

Lesson 07 – Security Assessment and Testing

6.01 Security Assessment and Testing
6.02 Security Assessment
6.03 Vulnerability Assessment
6.04 Penetration Testing
6.05 Audits
6.06 Log Management
6.07 Synthetic Transaction and Real Transaction
6.08 Testing
6.09 Software Testing
6.10 Interface
6.11 Key Performance Indicators (KPI)
6.12 Key Takeaways
Knowledge Check

Lesson 08 – Security Operations

7.01 Security Operations
7.02 Investigation
7.03 Forensic Investigation
7.04 Evidence
7.05 Electronic Discovery
7.06 Incident Management
7.07 Security Operations Management
7.08 Identity and Access Management
7.09 Assets
7.10 Malware
7.11 Management
7.12 Recovery and Backup
7.13 Disaster Recovery
7.14 Perimeter Security
7.15 Key Takeaways
Knowledge Check

Lesson 09 – Software Development Security

8.01 Software Development Security
8.02 Importance of Software Development Security
8.03 Programming Concepts
8.04 Systems Development Life Cycle
8.05 Application Program Interface
8.06 Software Security and Assurance
8.07 Database and Data Warehouse Environments
8.08 Knowledge Management
8.09 Web Application Environment
8.10 Security Threats and Attacks
8.11 Key Takeaways
Knowledge Check

$495.00

  • Vast selection of courses and labs Access
  • Unlimited access from all devices
  • Learn from industry expert instructors
  • Assessment quizzes and monitor progress
  • Vast selection of courses and labs Access
  • Blended Learning with Virtual Classes
  • Access to new courses every quarter
  • 100% satisfaction guarantee

You Will Get Certification After Completetion This Course.

Instructor Led Lectures
All IT Tutor Pro Formerly It Nuggets Courses replicate a live class experience with an instructor on screen delivering the course’s theories and concepts.These lectures are pre-recorded and available to the user 24/7. They can be repeated, rewound, fast forwarded.
Visual Demonstrations, Educational Games & Flashcards
IT Tutor Pro Formerly It Nuggets recognizes that all students do not learn alike and different delivery mediums are needed in order to achieve success for a large student base. With that in mind, we delivery our content in a variety of different ways to ensure that students stay engaged and productive throughout their courses.
Mobile Optimization & Progress Tracking
Our courses are optimized for all mobile devices allowing students to learn on the go whenever they have free time. Students can access their courses from anywhere and their progress is completely tracked and recorded.
Practice Quizzes And Exams
IT Tutor Pro Formerly It Nuggets Online’s custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. Students will have practice quizzes after each module to ensure you are confident on the topic you are learning.
World Class Learning Management System
IT Tutor Pro Formerly It Nuggets provides the next generation learning management system (LMS). An experience that combines the feature set of traditional Learning Management Systems with advanced functionality designed to make learning management easy and online learning engaging from the user’s perspective.

Frequently Asked Questions

How does online education work on a day-to-day basis?
Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.
Is online education as effective as face-to-face instruction?
Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.
Do employers accept online degrees?
All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.
Is online education more conducive to cheating?
The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.
How do I know if online education is right for me?
Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
What technical skills do online students need?
Our platform typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.
preloader