Price: $2,299.00

Course Number: 9016
Length: 4 Days
College Credits: 3
Continuing Education Credits: 6
Print Friendly, PDF & Email

 Why should you choose TONEX for your CISSP Training?

CISSP Training Course by TONEX: Our interactive, accelerated learning program prepares you for the CISSP exam. For experienced professionals in the computer security field who are responsible for developing the information security policies, standards, and procedures and managing their implementation across an organization.

This certification is the premier credential for security professionals pursuing higher levels of recognition and responsibility in the industry, and is seen as a requirement for many technical, mid-management, and senior management positions.

CISSP examination consists of multiple choice questions, covering topics such as Access Control Systems, Cryptography, and Security Management Practices, and is administered by the International Information Systems Security Certification Consortium or (ISC)2.

CISSP Certification

Learn CISSP Certification with our hands-on instructor-led or online training with hands-on exercises  case studies and simulations.

Candidates for this exam are typically network security professionals and system administrators with at least 3 years of direct work experience in one or more of the 10 test domains.

CISSP training course maps to the exam objectives and offers numerous features such as exam tips, case studies, and practice exams.

Review the CISSP Domains and Ebhance your Knowledge. CISSP CBK Training Seminar will cover all topics in the test including:

  • Access Control Systems and Methodology
  • Telecommunications and Network Security
  • Security Management and Practices
  • Applications and Systems Development Security
  • Cryptography
  • Security Architecture and Models
  • Operations Security
  • Business Continuity Planning and Disaster Recovery Planning
  • Law, Investigation, and Ethics
  • Physical Security
  • Study and Exam Prep Tips

 

All Our CISSP Certification Courses:
CISSP: Certified Information Systems Security Professional – 5 days
Security professionals consider the Certified Information Systems Security Professional (CISSP) to be the most desired certification to achieve. More than 200,000 have taken the exam, and there are more than 70,000 CISSPs worldwide. This course is updated to cover changes made to the CISSP Body of Knowledge in 2012. It also provides additional advice on how to pass each section of the exam. With expanded coverage of key areas, it also includes a full-length, 250-question practice exam.

 

Who Should Attend

Security Professionals who are interested in understanding the concepts that are covered in the CISSP® exam as determined by ISC2.Managers who want to understand the critical areas of network securitySystem, Security, and Network Administrators that want to understand the pragmatic applications of the CISSP® 10 Domains

Objectives

Our interactive, accelerated learning program prepares you for the CISSP exam. For experienced professionals in the computer security field who are responsible for developing the information security policies, standards, and procedures and managing their implementation across an organization. This certification is the premier credential for security professionals pursuing higher levels of recognition and responsibility in the industry, and is seen as a requirement for many technical, mid-management, and senior management positions. Upon completion of this program, you'll learn:
  • Learn what you need to know to master the CISSP security technology
  • Master Information Security skills by experts & get CISSP certified
  • How to identify and correctly answer the any type of CISSP questions
  • Important key test-taking tips for the CISSP exam
  • Proven techniques for scoring high on the CISSP exam
  • Important aspects of Security Policy development and Security Management Practices
  • The goal of this course is to bring the CISSP® 10 domains of knowledge to life. By explaining important topics with stories, examples, and case studies, the practical workings of this information can be discovered.
This training program will prepare you for the CISSP exam by covering key exam objectives and the great breadth of information found in the 10 Domains of the Common Body of Knowledge:
  • Security Basics
  • Access Control Systems and Methodologies
  • Security Architecture and Models
  • Disaster Recovery and Business Continuity Planning
  • Security Management Practices
  • Law, Investigation, and Ethics
  • Physical Security
  • Operations Security
  • Cryptography
  • Telecommunications and Network Security
  • Application and System Development

Outline

Access Control Systems and Methodology
  • Introduction
  • Accountability
  • Access Control Techniques
  • Access Control Administration
  • Access Control Models
  • Identification and Authentication Techniques
  • Access Control Methodologies
  • Methods of Attacks
  • Monitoring
  • Penetration Testing Case Study
Telecommunications and Network Security
  • Introduction
  • The Open Systems Interconnection Model (OSI 7-Layer Stack)
  • Network Characteristics and Topologies
  • Network Topologies
  • LAN Devices
  • WAN Technologies
  • Providing Remote Access Capabilities
  • Networking Protocols
  • Protecting the Integrity, Availability, and Confidentiality of Network Data
  • Fault Tolerance and Data Restoration
Security Management and Practices
  • Introduction
  • Defining Security Principles
  • Security Management Planning
  • Risk Management and Analysis
  • Policies, Standards, Guidelines, and Procedures
  • Examining Roles and Responsibility
  • Management Responsibility
  • Understanding Protection Mechanisms
  • Classifying Data
  • Employment Policies and Practices
  • Managing Change Control
Applications and Systems Development Security
  • Introduction
  • Software Applications and Issues
  • Attacking Software
  • Understanding Malicious Code
  • Implementing System Development Controls
  • Using Coding Practices That Reduce System Vulnerability
Cryptography
  • Introduction
  • Uses of Cryptography
  • Cryptographic Concepts, Methodologies, and Practices
  • PKI and Key Management
  • Methods of Attack
  • Case Study
Security Architecture and Models
  • Introduction
  • Requirements for Security Architecture and Models
  • Security Models
  • Security System Architecture
  • Information System Security Standards
  • Common Criteria
  • IPSec
  • Case Study
Operations Security
  • Introduction
  • Examining the Key Roles of Operations Security
  • The Roles of Auditing and Monitoring
  • Developing Countermeasures to Threats
  • The Role of Administrative Management
  • Concepts and Best Practices
  • Case Study
Business Continuity Planning and Disaster Recovery Planning
  • Introduction
  • What Are the Disasters That Interrupt Business Operation?
  • Quantifying the Difference Between DRP and BCP
  • Examining the Business Continuity Planning Process
  • Defining Disaster Recovery Planning
  • Developing a Backup Strategy
  • Case Study
Law, Investigation, and Ethics
  • Introduction
  • Fundamentals of Law
  • Criminal Law and Computer Crime
  • Computer Security Incidents
  • Legal Evidence
  • Computer Forensics
  • Computer Ethics
  • Case Study
Physical Security
  • Introduction
  • Classifying Assets to Simplify Physical Security Discussions
  • Vulnerabilities
  • Selecting, Designing, Constructing, and Maintaining a Secure Site
  • Tape and Media Library Retention Policies
  • Document (Hard-Copy) Libraries
  • Waste Disposal
  • Physical Intrusion Detection
  • Case Study
Study and Exam Prep Tips
  • Practice Exam
  • Exam Questions
  • Domain 1, Access Control
  • Domain 2, Network Security and Telecommunications
  • Domain 3, Security Management and Practices
  • Domain 4, Applications and Systems Development Security
  • Domain 5, Cryptography
  • Domain 6, Security Architecture and Models
  • Domain 7, Operations Security
  • Domain 8, Business Continuity Planning and Disaster Recovery Planning
  • Domain 9, Law, Investigation, and Ethics

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.