CISSP: Certified Information Systems Security Professional Certification - September 21-25, 2020


September 21-25, 2020

Duration: 5 days

9:00am-5:00pm ET

ILT Location: Columbia, MD and Live Virtual Class

  • Overview

    Certified Information Systems Security Professional (CISSP) Certification was designed to recognize mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The certification is managed by the International Information Systems Security Certification Consortium (ISC)², to recognize individuals who have distinguished themselves as experienced, knowledgeable, and proficient information security practitioners. Certification can enhance a professional’s career and provide added credibility. CISSP is an approved certification for certain job classifications identified within DoD Directive 8570.

    This test preparation course covers the 8 domains of the CISSP CBK relevant to the corresponding professional certification exam:

    • Security and Risk Management
    • Asset Security
    • Security Engineering
    • Communications and Network Security
    • Identity and Access Management
    • Security Assessment and Testing
    • Security Operations
    • Software Development Security

    The course is specifically designed to maximize the prospect of passing the rigorous examination. Coverage includes all relevant exam topics, prioritization of areas where study should be focused, test taking strategies, and practice exam questions.

    The CISSP Certification examination consists of 250 multiple-choice questions. Candidates have up to 6 hours to complete the examination. For complete details on the certification requirements, visit (ISC)²’s CISSP Certification page.

  • Who Should Take This Course


    For IT security professionals with at least four years of work experience in the information security field.


    Our CompTIA Security+ Certification Preparation course, certification, or equivalent experience is recommended.

  • Course Outline

    Lesson 1: Information Systems Access Control
    Topic 1A: Data Access Principles
    Topic 1B: System Access and Authentication
    Topic 1C: Penetration Tests

    Lesson 2: Security Architecture and Design
    Topic 2A: Security Models
    Topic 2B: Security Modes
    Topic 2C: System Assurance

    Lesson 3: Network and Telecommunications Security
    Topic 3A: Data Network Design
    Topic 3B: Remote Data Access
    Topic 3C: Data Network Security
    Topic 3D: Data Network Management

    Lesson 4: Information Security Management Goals
     Topic 4A: Organizational Security
    Topic 4B: The Application of Security Concepts

    Lesson 5: Information Security Classification and Program Development
    Topic 5A: Information Classification
    Topic 5B: Security Program Development

    Lesson 6: Risk Management and Ethics
    Topic 6A: Risk Management
    Topic 6B: Ethics

    Lesson 7: Application Security
     Topic 7A: Software Configuration Management
    Topic 7B: Software Controls
    Topic 7C: Database System Security

    Lesson 8: Cryptography
     Topic 8A: Ciphers and Cryptography
    Topic 8B: Symmetric-Key Cryptography
    Topic 8C: Asymmetric-Key Cryptography
    Topic 8D: Hashing and Message Digests
    Topic 8E: Email, Internet, and Wireless Security
    Topic 8F: Cryptographic Weaknesses

    Lesson 9: Physical Security
     Topic 9A: Physical Access Control
    Topic 9B: Physical Access Monitoring
    Topic 9C: Physical Security Methods
    Topic 9D: Facilities Security

    Lesson 10: Operations Security
     Topic 10A: Operations Security Control
    Topic 10B: Operations Security Auditing and Monitoring
    Topic 10C: Operational Threats and Violations

    Lesson 11: Business Continuity and Disaster Recovery Planning
     Topic 11A: Business Continuity Plan Fundamentals
    Topic 11B: Business Continuity Plan Implementation
    Topic 11C: Disaster Recovery Plan Fundamentals
    Topic 11D: Disaster Recovery Plan Implementation

    Lesson 12: Legal, Regulations, Compliance, and Investigations
    Topic 12A: Computer Crime Laws and Regulations
    Topic 12B: Computer Crime Incident Response