• CATALOG
  • MILITARY
  • FINANCIAL ASSISTANCE
  • LOGIN
      Forget your password?
  • Open Search Dialog
Home > Training Programs > Cybersecurity > (ISC)² CISSP® Training Boot Camp

(ISC)² CISSP® Training Boot Camp

Take your career to the next level by earning one of the most in-demand cybersecurity certifications. This comprehensive boot camp provides you with a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional (CISSP).

Infosec-ISC-2-CISSP-Training-Boot-Camp
$4,299.00 (USD)

Overview

Objective

Outline

  1. Security & Risk Management
    1. Confidentiality, integrity and availability
    2. Security governance policies and their supporting counterparts
    3. Compliance
    4. Global information security
    5. Legal and regulatory policies
    6. Professional ethics
    7. Business continuity
    8. Personnel security
    9. Risk management
    10. Threat modeling
    11. Acquisition security
    12. Security awareness
  2. Asset Security
    1. Classify information
    2. Identify and document asset ownership
    3. Asset privacy concerns
    4. Asset retention policies
    5. Data security controls
    6. Handling requirements
  3. Security Engineering
    1. Secure engineering processes
    2. Review security engineering models
    3. Security architecture
    4. Web-based vulnerabilities
    5. Mobile vulnerabilities
    6. Embedded device vulnerabilities
    7. Cryptography components and their relationships
    8. Site and facility design
    9. Physical security
  4. Communication and Network Security
    1. Network architecture
    2. Network components
    3. Communication channels
    4. Handling network attacks
  5. Identity & Access Management
    1. Physical and logical access
    2. Authentication of people and devices
    3. Identity as service (cloud identity)
    4. Third-party identity
    5. Authorization mechanisms
    6. Access control attacks
    7. Provisioning life cycle
  6. Security Assessment and Testing
    1. Validate assessment
    2. Security control
    3. Management and operational controls
    4. Analyze and report test outputs
    5. Internal and third-party audits
    6. Security operations
    7. Handling investigations
    8. Investigation types
    9. Logging and monitoring
    10. Provisioning of resources
  7. Security Operations
    1. Resource protection
    2. Incident management
    3. Preventative measures
    4. Patch and vulnerability management
    5. Change management
    6. Disaster recovery
    7. Business continuity
    8. Managing physical security
    9. Personnel safety concerns
  8. Software Development Security
    1. Software development life cycle
    2. Security for development environments
    3. Software security
    4. Purchased software risk

Requirements

Prerequisites

Instructor

FAQs

Reviews

Mississippi State University
Center for Continuing Education
P. O. Box 5441
190 Bost Ste. 330
Mississippi, MS 39762 US
MAIN CONTENT

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning. Privacy Policy