Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP)
5 Day Instructor Led


If you are ready to take your security career to the next level, Ultimate Knowledge's Certified Information Systems Security Professional (CISSP) training and certification boot camp will help get you there. You will receive instruction from our experts who possess in-depth, real-world experience as you cover all the material you need to be fully prepared for the (ISC)2 CISSP exam. Our comprehensive CISSP exam prep tools contain the industry's most relevant, up-to-date information and includes summary charts, insightful data, and practice exams. Along with our CISSP training and certification custom course material, you will receive a free copy of Shon Harris' CISSP Certification All-in-One Exam Guide, 5th Edition and a CISSP Practice Exams Book (All-in-One).

Certified Information Systems Security Professional (CISSP) Prerequisites
Systems administration experience, familiarization with TCP/IP, and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in our Security+ Prep Course. Security+ Prep Course

What You'll Get in Certified Information Systems Security Professional (CISSP)
Expert Level Instruction
Shon Harris All-In-One Book
CISSP Practice Exams (All-in-One) Book
Ultimate Knowledge Institute Award Winning CISSP Student Workbook
Daily Homework Questions (Over 600 Questions)
Daily Quiz Questions (Over 600 Questions)
Handy Reference Charts and Tables
Flash Cards
Course Related Readings (Reinforcement)
Daily Exercises to Reinforce Memory Recall - Cognitive Core

What You'll Learn in Certified Information Systems Security Professional (CISSP)
In-depth coverage of the ten domains required to pass the CISSP exam:

Operations Security
Information Security and Risk Management
Physical (Environmental) Security
Cryptography
Access Control
Security Architecture and Design
Telecommunications and Network Security
Business Continuity and Disaster Recovery Planning
Application Security
Legal, Regulations, Compliance, and Investigations

Certified Information Systems Security Professional (CISSP) Certification
(ISC)2 requires exam candidates to have a minimum of five years of relevant work experience in two or more of the ten domains, four years of work experience with an applicable college degree, or a credential from the (ISC)2-approved list.

The CISSP certification requires successfully passing the CISSP exam (administered by (ISC)2) and having met the experience requirements.

Certified Information Systems Security Professional (CISSP) Outline

1. Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)

  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
  • Apply Security Governance Principles
  • Compliance
  • Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
  • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
  • Understand Business Continuity Requirements
  • Contribute to Personnel Security Policies
  • Understand and Apply Risk Management Concepts
  • Understand and Apply Threat Modeling
  • Integrate Security Risk Considerations into Acquisitions Strategy and Practice
  • Establish and Manage Security Education, Training, and Awareness

2. Asset Security (Protecting Security of Assets)

  • Classify Information and Supporting Assets
  • Determine and Maintain Ownership
  • Protect Privacy
  • Ensure Appropriate Retention
  • Determine Data Security Controls
  • Establish Handling Requirements

3. Security Engineering (Engineering and Management of Security)

  • Implement and Manage an Engineering Life Cycle Using Security Design Principles
  • Understand Fundamental Concepts of Security Models
  • Select Controls and Countermeasures Based Upon Information Systems Security Standards
  • Understand the Security Capabilities of Information Systems
  • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Assess and Mitigate Vulnerabilities in Web-based Systems
  • Assess and Mitigate Vulnerabilities in Mobile Systems
  • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Apply Cryptography
  • Apply Secure Principles to Site and Facility Design
  • Design and Implement Facility Security

4. Communications and Network Security (Designing and Protecting Network Security)

  • Apply Secure Design Principles to Network Architecture
  • Securing Network Components
  • Design and Establish Secure Communication Channels
  • Prevent or Mitigate Network Attacks

5. Identity and Access Management (Controlling Access and Managing Identity)

  • Control Physical and Logical Access to Assets
  • Manage Identification and Authentication of People and Devices
  • Integrate Identity as a Service (IDaaS)
  • Integrate Third-Party Identity Services
  • Implement and Manage Authorization Mechanisms
  • Prevent or Mitigate Access Control Attacks
  • Manage the Identity and Access Provisioning Life Cycle

6. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)

  • Design and Validate Assessment and Test Strategies
  • Conduct Security Control Testing
  • Collect Security Process Data
  • Conduct or Facilitate Internal and Third-Party Audits

7. Security Operations (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

  • Understand and Support Investigations
  • Understand Requirements for Investigation Types
  • Conduct Logging and Monitoring Activities
  • Secure the Provisioning of Resources through Configuration Management
  • Understand and Apply Foundational Security Operations Concepts
  • Employ Resource Protection Techniques
  • Conduct Incident Response
  • Operate and Maintain Preventative Measures
  • Implement and Support Patch and Vulnerability Management
  • Participate in and Understand Change Management Processes
  • Implement Recovery Strategies
  • Implement Disaster Recovery Processes
  • Test Disaster Recovery Plan
  • Participate in Business Continuity Planning
  • Implement and Manage Physical Security
  • Participate in Personnel Safety

8. Software Development Security (Understanding, Applying, and Enforcing Software Security)

  • Understand and Apply Security in the Software Development Life Cycle
  • Enforce Security Controls in the Development Environment
  • Assess the Effectiveness of Software Security
  • Assess Software Acquisition Security


Get More Information
* Denotes a required field.

Courses
Social Media Security Training
Schedule
Get a quote

Training
Training Effectiveness Assurance
Compliance Management Framework
Mentoring & Student Support Process
Department of Defense Training and 8570.1 Compliance


Testimonials
About Us

UKI Recognized as 2013
IT Training Mover & Shaker

2013 IT Training Mover & Shaker

Upcoming Public Course Dates

Nothing Scheduled
please check back soon

Hit many things I didn't know and they were all presented with ease of understanding. Best class I've ever taken! The instructor was amazingly easy to learn from and very patient when the students didn't understand something. Made everything very interesting; a master of his profession. Sean Sturgill 2d Marine Division


...by the way a true testament to the OUTSTANDING training I received from UKI. I passed my CISSP exam. The instructor is a one of a kind, and your training prepared me very well. Greatly appreciated. ITC(SW/AW) Jason W. Sabater, CISSP USS CURTIS WILBUR (DDG 54) CC DIV LCPO Information Assurance Manager


We were pleased with your course (CISSP) and, obviously, the final results. I'll certainly pass that word on to our DISA HEADQUARTERS/NNWC folks who coordinate these efforts. I'm a believer. Thanks again. V/R Skip Thaeler Navy Certifying Authority DISA HEADQUARTERS 5.0.9 San Diego, CA




UKI Twitter Feed

We Provide Expert Instruction in the Following Courses:
Certified Information Systems Security Professional (CISSP) Certification Training | CCNA v3.0 - CCNA Routing and Switching Boot Camp Certification Training | REDHAT Linux Essentials - RH033 Certification Training | Fiber Optic Installer Certification Training | CompTIA A+ Certification Training | CompTIA Linux+ Certification Training | Interconnecting Cisco Network Devices Part 1 (ICND1) Certification Training | Interconnecting Cisco Networking Devices, Part 2 (ICND2) Certification Training | Enterprise Wi-Fi Fundamentals (CWTS) Certification Training | Certified Information Security Manager (CISM) Certification Training | Systems Security Certified Practitioner (SSCP) Certification Training | Architecting on AWS Certification Training | UKI Social Media Security Professional (SMSP) - Online Only Certification Training | Certified Ethical Hacker (CEH) Certification Training | ITIL® Foundation Certification Training | Installing and Configuring Windows Server 2012 (M20410) Certification Training | Certified Authorization Professional (CAP) Certification Training | UKI Social Media Engineering & Forensics Professional (SMEFP) Certification Training | RedHat Linux System Administration Foundations Certification Training | CCNP Voice Certification Training | Certified Information Systems Auditor (CISA) Certification Training | CCNA Voice Certification Training | Computer Hacking Forensic Investigator (CHFI) Certification Training | Certified Security Analyst/LPT (ECSA) Certification Training | CISSP - Information Systems Security Engineering Professional (ISSEP) Certification Training | MCITP: Enterprise and Server Administrator Certification Training | MCTS: Windows 7 Desktop Administrator 70-680 Certification Training | UKI Social Media Security Professional (SMSP) Certification Training | CCNP Certification Training | Administering Microsoft Windows Server 2012 (M20411) Certification Training | Implementing Desktop Application Environments (M20416) Certification Training | Configuring Advanced Windows Server 2012 Services (M20412) Certification Training | Designing and Implementing a Server Infrastructure on Windows 2012 (M20413) Certification Training | CCNA Security Certification Training | Certified Wireless Network Administrator Certification Training | UKI Social Media Management & Governance Professional (SMMGP) Certification Training | UKI Social Media Governance Certification Training | Core Solutions of Microsoft Exchange Server 2013 (20341B) Certification Training | TSHOOT - Troubleshooting and Maintaining Cisco IP Networks v2.0 Certification Training | Oracle 12c Database Administration I Certification Training | Oracle 12c Security Administration Certification Training | Core Solutions of Microsoft SharePoint Server 2013 (20331B) Certification Training | CompTIA Project+ Certification Training | Certified Incident Handler (ECIH) Certification Training | CompTIA Security+ SY0-401 Certification Training | UKI Social Media Security Hybrid Training Course Certification Training | Deploying and Managing Windows 10 Using Enterprise Services (20697-2B) Certification Training | Implementing an Advanced Server Infrastructure (M20414) Certification Training | MCSA: Windows Server 2012 Boot Camp Certification Training | Advanced Solutions of Microsoft SharePoint Server 2013 (20332B) Certification Training | Server Virtualization with Windows Server Hyper-V and System Center (20409B) Certification Training | Planning and Deploying System Center 2012 Configuration Manager (10748C) Certification Training | FireEye Enterprise Incident Response with MIR Certification Training | Security Operations on AWS Certification Training | Advanced VMware vSphere Design, Optimize, & Manage Certification Training | Project Management Professional (PMP) Certification Training | Avaya Aura® Communication Manager Administration Certification Training | CompTIA Advanced Security Practitioner (CASP) CAS 002 Certification Training | Implementing Cisco IOS Network Security 3.0 (IINS) Certification Training | Quick SharePoint 2013 Maintenance for the Part-Time Administrator Certification Training | CompTIA Network+ (N10-006) Certification Training | Security Design and Solutions, Network Security Design, Conduct a Security Assessment and Host Security Certification Training | Cyber Vanguard Series-Cyber Strike Certification Training | Cyber Vanguard Series- Enterprise Guardian Certification Training | CompTIA Cloud+ Certification Training | ITIL ® Service Strategy Certification Training | CISSP - Information Systems Security Architecture Professional (ISSAP) Certification Training | Certified Cloud Security Professional (CCSP) Certification Training | Cyber Vanguard Series- Cyber Storm Assault Tactics Certification Training | Risk Management Framework for DoD - Fundamentals Certification Training | SharePoint 2013 Site Collection and Site Administration (55033A) Certification Training | Programming in HTML5 with JavaScript and CSS3 Certification Training | Risk Management Framework for DoD - Deep Dive Certification Training | Developing Websites Using IBM Web Content Manager 8.5 Certification Training | FireEye Advanced MIR Certification Training | Splunk 6 Knowledge Objects Certification Training | Advanced Dashboards and Visualizations Certification Training | ITIL® Service Lifecycle: Service Design Certification Training | ITIL® Service Lifecycle: Service Transition Certification Training | Splunk Cloud Administration Certification Training | Oracle 12c Database Administration II Certification Training | Oracle 12c Advanced SQL Certification Training | Troubleshooting TCP/IP Networks with Wireshark Certification Training | VMware Horizon 7: Install, Configure, Manage v7 Certification Training | CompTIA Cybersecurity Analyst (CSA+) Certification Training | CISSP - Information Systems Security Management Professional (ISSMP) Certification Training | AWS Technical Essentials Certification Training | Big Data on AWS Certification Training | FireEye Forensics Fundamentals Certification Training | Oracle 12c Foundations: SQL & SQL*PLUS Certification Training | Avaya Aura Messaging Implementation, Administration, and Support Certification Training | Migrating to AWS Certification Training | Avaya Aura® Communication Manager Administration and Call Center Elite Fast Track Certification Training | Data Warehousing on AWS Certification Training | Avaya Aura® Communication Manager Administration, Maintenance, and Troubleshooting Fast Track Certification Training | Avaya Aura® Session Manager and System Manager Implementation (R6.3) Certification Training | Red Hat System Administration II (RH134) Certification Training | Red Hat System Administration III (RH254) Certification Training | Red Hat System Administration I (RH124) Certification Training | IBM Cognos Framework Manager: Design Metadata Models (v11.0) Certification Training | IBM Cognos Framework Manager: Design Metadata Models (V10.2) Certification Training | ITIL® Service Lifecycle: Service Operation Certification Training | ITIL® Service Lifecycle: Continual Service Improvement Certification Training | ITIL® Expert Qualification: Managing Across the Lifecycle Certification Training | VMware vSphere: Install, Configure, Manage V6.5 Certification Training | ROUTE - Implementing Cisco IP Routing v2.0 Certification Training | IBM InfoSphere DataStage Essentials (v11.5) Certification Training | Power Systems for AIX - Virtualization I: Implementing Virtualization Certification Training | WebSphere Application Server V8.5.5 Administration Certification Training | Enterprise Wi-Fi Security (CWSP) Certification Training | SWITCH - Implementing Cisco IP Switched Networks v2.0 Certification Training | Advanced Solutions of Microsoft Exchange Server 2013 (20342B) Certification Training | Installing and Configuring Windows 10 (20697-1B) Certification Training | VMware vSphere: Optimize and Scale v6.5 Certification Training | VMware vRealize Automation: Install, Configure, Manage v7.0 Certification Training |
Copyright © 2017 Ultimate Knowledge Institute | Privacy Policy
ITIL® is a registered trade mark of AXELOS® Limited.
IT Infrastructure Library® is a registered trade mark of AXELOS® Limited.
The Swirl logo™; is a trade mark of AXELOS® Limited.

All other trademarks mentioned in this web site are the property of their respective owners.