Certified Information Systems Security Professional (CISSP) 2018

Hours: 80 / Access Length: 12 Months / Delivery: Online, Self-Paced
Retail Price: $1,895.00

Course Overview:

Gear up to prepare for the ISC2 CISSP certification exam with CISSP Third edition course. The comprehensive study guide provides complete coverage of all the objectives covered in the ISC2 CISSP exam and provides knowledge and skills on topics such as security capabilities of Information Systems, security architecture maintenance, vulnerabilities of security architectures, designs, solution elements, vulnerabilities in web-based systems, vulnerabilities in mobile systems, vulnerabilities in embedded devices, and a lot more. 

Upon the completion of this course, students will be prepared to take the Certified Information Systems Security Professional (CISSP) 2018 certification exam.

Course Outline:

Lesson 1: Introduction
  • The Goals of the CISSP Certification
  • The Value of the CISSP Certification
  • The Common Body of Knowledge
  • Steps to Becoming a CISSP
  • Facts About the CISSP Exam
  • About the CISSP Cert Guide, Third Edition
Lesson 2: Security and Risk Management
  • Security Terms
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Documentation
  • Business Continuity
  • Personnel Security Policies and Procedures
  • Risk Management Concepts
  • Geographical Threats
  • Threat Modeling
  • Security Risks in the Supply Chain
  • Security Education, Training, and Awareness
  • Review All Key Topics
Lesson 3: Asset Security
  • Asset Security Concepts
  • Identify and Classify Information and Assets
  • Information and Asset Ownership
  • Protect Privacy
  • Asset Retention
  • Data Security Controls
  • Information and Asset Handling Requirements
  • Review All Key Topics
Lesson 4: Security Architecture and Engineering
  • Engineering Processes Using Secure Design Principles
  • Security Model Concepts
  • System Security Evaluation Models
  • Certification and Accreditation
  • Control Selection Based upon Systems Security Requirements
  • Security Capabilities of Information Systems
  • Security Architecture Maintenance
  • Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Vulnerabilities in Web-Based Systems
  • Vulnerabilities in Mobile Systems
  • Vulnerabilities in Embedded Devices
  • Cryptography
  • Cryptographic Types
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Public Key Infrastructure
  • Key Management Practices
  • Message Integrity
  • Digital Signatures
  • Applied Cryptography
  • Cryptanalytic Attacks
  • Digital Rights Management
  • Site and Facility Design
  • Site and Facility Security Controls
  • Review All Key Topics
Lesson 5: Communication and Network Security
  • Secure Network Design Principles
  • IP Networking
  • Protocols and Services
  • Converged Protocols
  • Wireless Networks
  • Communications Cryptography
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks
  • Review All Key Topics
Lesson 6: Identity and Access Management (IAM)
  • Access Control Process
  • Physical and Logical Access to Assets
  • Identification and Authentication Concepts
  • Identification and Authentication Implementation
  • Identity as a Service (IDaaS) Implementation
  • Third-Party Identity Services Integration
  • Authorization Mechanisms
  • Provisioning Life Cycle
  • Access Control Threats
  • Prevent or Mitigate Access Control Threats
  • Review All Key Topics
Lesson 7: Security Assessment and Testing
  • Design and Validate Assessment and Testing Strategies
  • Conduct Security Control Testing
  • Collect Security Process Data
  • Analyze and Report Test Outputs
  • Conduct or Facilitate Security Audits
  • Review All Key Topics
Lesson 8: Security Operations
  • Investigations
  • Investigation Types
  • Logging and Monitoring Activities
  • Resource Provisioning
  • Security Operations Concepts
  • Resource Protection
  • Incident Management
  • Detective and Preventive Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery
  • Testing Disaster Recovery Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety and Security
  • Review All Key Topics
Lesson 9: Software Development Security
  • Software Development Concepts
  • Security in the System and Software Development Life Cycles
  • Security Controls in Development
  • Assess Software Security Effectiveness
  • Security Impact of Acquired Software
  • Secure Coding Guidelines and Standards
  • Review All Key Topics

All necessary course materials are included.


This course prepares students to take the Certified Information Systems Security Professional (CISSP) 2018 certification exam.

System Requirements:

System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended for the best experience.
Hardware Requirements:
  • CPU: 1 GHz or higher
  • RAM: 2 GB or higher
  • Resolution: 1280 x 720 or higher
  • Speakers / Headphones
  • Microphone (Webinar / Live Online sessions)
Operating System Requirements:
  • Microsoft Windows 7 or 10 (Home, Pro)
  • Mac OSX 10 or higher.
  • Latest Chrome OS
  • Latest Linux Distributions

NOTE: While we understand that our courses can be viewed on Android and iPhone devices, we do not recommend the use of these devices for our courses. The size of these devices do not provide a good learning environment for students taking online or live online based courses.

Web Browser Requirements:
  • Latest Google Chrome is recommended for the best experience.
  • Latest Mozilla FireFox
  • Latest Microsoft Edge
  • Latest Apple Safari
Basic Software Requirements (These are recommendations of software to use):
  • Office suite software (Microsoft Office, OpenOffice, or LibreOffice)
  • PDF reader program (Adobe Reader, FoxIt)
  • Courses may require other software that is denoted in the above course outline.

** The course outlines displayed on this website are subject to change at any time without prior notice. **