CISSP 2012 Certification Curriculum Outline
CISSP 2012 Domain: Access Control
Overview/Description
This course focuses on the need for access control mechanisms to secure an organizations network and minimize its vulnerability to attacks or intrusion. It covers various access control models, techniques, mechanisms, and methodologies. You will learn about the latest in authentication strategies and intrusion detection and prevention techniques. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers
Expected Duration (hours)
2.0
Lesson Objectives
CISSP 2012 Domain: Access Control
sp_cpte_a01_it_enus
Back to List
CISSP 2012 Domain: Telecommunications and Network Security
Overview/Description
Access to a companys resources through unauthorized means is the number one goal of most attackers. The security professional must understand the proper countermeasures in order to stop attacks on e-mail systems, over the network, and on the PBX. This course discusses the transport mechanisms, structures, and security measures used to ensure availability, confidentiality, integrity, and authentication over both public and private networks. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
The CISSP credential is ideal for mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers.
Expected Duration (hours)
3.5
Lesson Objectives
CISSP 2012 Domain: Telecommunications and Network Security
sp_cpte_a02_it_enus
Back to List
CISSP 2012 Domain: Information Security Governance and Risk Management
Overview/Description
Information Security Governance and Risk Management is an all encompassing domain that the information security professional must constantly be aware of. This course examines the frameworks and planning structures used to make sure that information assets are protected within an organization. This course also examines the governance, organizational structures and cultures, and the awareness training that should be imparted to employees at all levels. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers
Expected Duration (hours)
2.5
Lesson Objectives
CISSP 2012 Domain: Information Security Governance and Risk Management
sp_cpte_a03_it_enus
Back to List
CISSP 2012 Domain: Cryptography
Overview/Description
Cryptography has been used for thousands of years to secure messages, identities, vital information, and communications mechanisms. This course covers the invention of cryptography, the use of algorithms and ciphers, and the secure mechanisms used for message authentication and certificate authority. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers
Expected Duration (hours)
2.0
Lesson Objectives
CISSP 2012 Domain: Cryptography
sp_cpte_a05_it_enus
Back to List
CISSP 2012 Domain: Operations Security
Overview/Description
In todays enterprise environment, security operations takes on many faces, but always comes back to making sure that all aspects of the operation of an enterprise environment are secured and functioning correctly. This course delves into the mechanisms used to track security threats, resource protection, and securing the enterprise environment. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers
Expected Duration (hours)
2.5
Lesson Objectives
CISSP 2012 Domain: Operations Security
sp_cpte_a07_it_enus
Back to List
CISSP 2012 Domain: Business Continuity and Disaster Recovery Planning
Overview/Description
Business continuity is an essential part of any enterprise. When a disaster occurs, it is imperative that a company be prepared, and has policies and people in place to step in and restore normal business operations. This course discusses the processes that are used to create a business continuity and disaster recovery plan and strategies for critical resource recovery. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers
Expected Duration (hours)
1.5
Lesson Objectives
CISSP 2012 Domain: Business Continuity and Disaster Recovery Planning
sp_cpte_a08_it_enus
Back to List
CISSP 2012 Domain: Legal, Regulations, Investigations, and Compliance
Overview/Description
Computer crime is a major area of concern for everyone from the standard end user to the enterprise environment. Government agencies and corporate groups have come together to create rules and laws that deal with computer crimes and how perpetrators should be dealt with. This course brings together different aspects of computer crime, such as types of crime, laws to deal with crimes, and the ethics that must be used when investigating crime. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers
Expected Duration (hours)
2.0
Lesson Objectives
CISSP 2012 Domain: Legal, Regulations, Investigations, and Compliance
sp_cpte_a09_it_enus
Back to List
CISSP 2012 Domain: Physical (Environment) Security
Overview/Description
Physical security is the foundation for all networking security mechanisms. Unless a network is physically secure from threats, all other types of security can be negated. This course focuses on the need for, and implementation of physical security and how it is used as an all encompassing backbone for enterprise security. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers
Expected Duration (hours)
2.0
Lesson Objectives
CISSP 2012 Domain: Physical (Environment) Security
sp_cpte_a10_it_enus
Back to List
CISSP 2012 Domain: Software Development Security
Overview/Description
Poorly written systems or applications can allow an attacker to exploit coding errors and thus interrupt the orderly processes of the system or application. This course discusses methods to increase the security of operating system and application development and thwart attacker attempts to manipulate source code. It also covers application and database development models such as the SDLC and how choosing the right model supports security. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers
Expected Duration (hours)
2.0
Lesson Objectives
CISSP 2012 Domain: Software Development Security
sp_cpte_a04_it_enus
Back to List
CISSP 2012 Domain: Security Architecture and Design
Overview/Description
Computer administrators have a variety of mechanisms that can be used to secure modern enterprise environments. Several access control standards and models have been created by the international community to secure both personnel access and information recovery within an enterprise environment. This course examines hardware and software systems, memory storage types, security models, and security controls. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers
Expected Duration (hours)
2.5
Lesson Objectives
CISSP 2012 Domain: Security Architecture and Design
sp_cpte_a06_it_enus
Back to List
(ISC)2 CISSP 2012 Certification
(Certified Information Systems Security Professional)
If you plan to build a career in information security – one of today’s most visible professions – and if you have at least five full years of experience in information security, then the CISSP® credential should be your next career goal.
ISC2 certification validates the latest skills needed by today's computer security professionals. It is an international, vendor-neutral certification recognized by major hardware and software vendors, distributors and resellers. The CISSP course provides you with the knowledge and skills to pass the CISSP certification, after which you'll have the ability to manage, operate, develop and plan an effective network security infrastructure.
Benefits of CBT Direct’s Online (ISC)2 CISSP Certification Training
CBT Direct boasts the most beneficial online certification training on the market. With online training, you have the flexibility to study on your schedule, and with the speed and reliability of the internet, CBT Direct’s (ISC)2 CISSP training course is accessible anywhere you have an internet connection. Convenience finally costs less with CBT Direct – the most affordable online training solution today.
The unique design of CBT Direct’s (ISC)2 CISSP certification course incorporates a proven four-step learning process: presentation, demonstration, guidance and independent practice. This four-step proven learning model for CBT Direct’s (ISC)2 CISSP training course ensures the greatest level of retention to prepare you for your (ISC)2 CISSP certification exam.
CBT Direct also offers online mentoring for over 100 current major certification exams, including (ISC)2
CISSP, for IT professionals and end-users alike. CBT Direct’s mentors have a minimum of 20 certifications each and are
available 24/7*.
* Available for most courses.
Who Benefits from CBT Direct’s (ISC)2 CISSP Training?
This training would be beneficial for individuals looking for IT job positions such as; Network Administrator, Windows Administrator, Windows System Engineer, Linux Administrator, Network Security Specialist, Information Security Manager or Chief Security Officer.
What Professionals Will Learn from CBT Direct’s (ISC)2 CISSP Training
(ISC)2 CISSP Certification Exam:
The CISSP was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute)
to ISO (International Standards Organization) Standard 17024:2003. CISSP certification is not only an objective measure of excellence,
but a globally recognized standard of achievement. Click here to see a detailed curriculum outline.
Hours
(9-5 EST)
CISSP | ISC2 CISSP 2012 (Certified Information Systems Security Professional) | ü | ü |
CISSP Prerequisites
To sit for the CISSP examination, a candidate must:
- Sign up for the examination date and location
- Submit the examination fee
- Assert that he or she possesses a minimum of five years of professional experience in the information security field or four years plus a college degree. Or, an Advanced Degree in Information Security from a National Center of Excellence or the regional equivalent can substitute for one year towards the five-year requirement.
- Complete the Examination Agreement, attesting to the truth of his or her assertions regarding professional experience, and legally committing to the adherence of the (ISC)²Code of Ethics
- Successfully answer four questions regarding criminal history and related background
Click Here for CISSP Facts.
(ISC)2 CISSP 2012 Certification Exam