Official (ISC)² CBK Training Seminar for CISSP Course Summary
Leadership and operations
This course is designed for information security professionals with deep technical and managerial knowledge and experience to effectively design, design and manage an organization's overall security system. This training course provides a comprehensive overview of information system security concepts and industry best practices covering the following eight CISSP Common Body of Knowledge (CBK) areas.®
Course features vary by delivery method and include:
- Official (ISC)² learning materials delivered via classroom book and instructor-led online instructor, and LMS for self-study.
- Authorized Instructor (ISC) Instruction² (In-class and Instructor-Led Online Class only)
- Authorized Teacher Support (ISC)² (for self-study only))
- Peer-to-peer discussions (in-class and online instructor-led only)
- Learning activities including case studies and applied scenario throughout the course
- Interactive flash cards
- Post-course assessment
- Glossary
- Who must attend
The course is ideal for those working in positions such as but not limited to:
- Information Technology Director
- Information Security Director
- Technical Director
- Compliance manager/specialist
- Security Director
- Information Architect
- IT Specialist/Director/Manager
- Information Manager/Information Risk Manager or Consultant
- Security Administrator
- Architect/Security Analyst
- Security Consultant
- security manager
- Security engineer / Security engineer
Course program:
Chapter 1: Information Security Environment
Chapter 2: Security of Information Assets
Chapter 3: Identity and Access Management
Chapter 4: Architecture and Design of Security Systems
Chapter 5: Communication and Network Security
Chapter 6: Software Development Security
Chapter 7: Security Assessment and Testing
Chapter 8: Security Operations
Chapter 9: Putting it all together
Chapter 10: CISSP Certification Information
Note: Throughout this course, exam areas may be covered in several chapters. The course includes a table indicating where the objectives of the exam plan are covered within the course. Unique icons are also used in course materials to identify exam plan goals.
Course Objectives:
At the end of this course students will be able to:
- Apply fundamental concepts and methods related to the fields of information technology and security
- Aligning the organization's overall operational goals with security functions and implementations
- Determine how to protect your organization's assets as they go through their lifecycle
- Using the concepts, principles, frameworks, and standards used to design, implement, monitor, and secure operating systems, hardware, networks, applications, and controls used to provide varying levels of confidentiality, integrity, and availability
- Application of security design principles to select appropriate measures to address vulnerabilities present in common types and architectures of information systems
- Explain the importance of cryptography and the security services it can provide in today's digital and information age
- Assessment of physical security elements depending on the needs of the information system
- Evaluation of the elements that make up communication and network security, in accordance with the needs for information security
- Using the concepts and architecture that define related technologies and systems and implementation protocols at the levels of the Open Systems Interconnection (OSI) model 1-7 to meet information security needs
- Determine appropriate access control models to meet business security requirements
- Applying physical and logical access control models to meet information security needs
- Delineation of the main methods for developing and validating test and audit strategies that support information security requirements
- Apply appropriate security controls and countermeasures to optimize the organization's operational function and capability
- Risk assessment of information systems for the operational activities of the organization
- Identify appropriate controls to address specific threats and vulnerabilities
- Application of information systems security concepts to reduce the risk of software and system vulnerabilities throughout the life cycle of systems