Learn Online with StaffKit Training Courses
Online Employee Business and Computer Training

CISSP Security Professional 2012 Training


This series is designed to help users prepare for the Certified Information Systems Security Professional (CISSP) certification exam. The courses in this series cover the ten CISSP common body of knowledge domains, which relate to topics such as access co

This CISSP Security Professional 2012 online training series provides over 30 hours of self-paced courseware. This web-based training provides 6 months of unlimited access to all of the following lessons:

1 . Access Control
2 . Access Control Attacks and Monitoring
3 . Architectural Threats and Countermeasures
4 . Cryptography
5 . Malicious Code and Application Attacks
6 . PKI and Cryptographic Applications
7 . Risk and Personnel Management
8 . Secure Communications
9 . Securing Network Components
10 . Security Governance
11 . Security Models, Design, and Capabilities
12 . Software Development Security

Lesson Detail:

Access Control
This course covers topics and issues related to granting and revoking the right to access data or perform an action on a system.

  • Access Control Overview
  • Identification and Authentication Techniques
  • Access Control Techniques

Access Control Attacks and Monitoring
This course builds on access control topics and discusses key information on logging and monitoring, access control attacks, and assessing the effectiveness of access controls.

  • Access Control Attacks
  • Preventing Access Control Attacks

Architectural Threats and Countermeasures
This course covers underlying concerns about the security of a system itself and its foundation by discussing computer architecture: The physical design of computers from various components.

  • Computer Architecture
  • Common Flaws and Security Issues

This course covers the history of cryptography, the basics of cryptographic communications, and the fundamental principles of private key cryptosystems.

  • Cryptographic Basics
  • Modern Cryptography

Malicious Code and Application Attacks
This course covers the risks posed by malicious code objects -- viruses, worms, logic bombs, and Trojan horses. The course also looks at some of the other security exploits used by someone attempting to gain unauthorized access to a system or to prevent l

  • Malicious Code
  • Password and Application Attacks
  • Reconnaissance and Masquerading Attacks

PKI and Cryptographic Applications
This course explores the world of asymmetric (or public key) cryptography and the public key infrastructure (PKI) that supports worldwide secure communication between parties that don't necessarily know each other prior to the communication.

  • Asymmetric Cryptography
  • Public Key Infrastructure

Risk and Personnel Management
This course covers hiring practices, formalizing security structure, risk management, awareness training, and management planning.

  • Risk Management
  • Managing Personnel Security

Secure Communications
This course covers the many forms of communications security, vulnerabilities, and countermeasures.

  • Network and Protocol Security Mechanisms
  • Miscellaneous Security Control Characteristics
  • Network Attacks and Countermeasures

Securing Network Components
This course discusses the OSI model as a guiding principle in networking, cabling, wireless connectivity, TCP/IP and related protocols, networking devices, and firewalls.

  • OSI Model
  • Secure Network Components
  • Cabling, Wireless, Topology, and Communications Technology

Security Governance
This course covers the Information Security Governance and Risk Management domain of the Common Body of Knowledge for the CISSP certification exam, which deals with the common and foundational elements of security solutions. These include elements essenti

  • Security Management Planning
  • Security Management Concepts and Principles

Security Models, Design, and Capabilities
This course covers security models such as state machine, Bell-LaPadula, Biba, Clark-Wilson, Take-Grant, and Brewer and Nash. This course also describes Common Criteria and other methods governments and corporations use to evaluate information systems fro

  • Fundamental Concepts of Security Models
  • Components of Information Systems Security Evaluation Models

Software Development Security
This course covers maintaining security during the software development process. It also covers the various types of threats you will encounter throughout the process, and what you can do to prevent these risks.

  • Application Issues
  • Data and Information Storage
  • Systems Development Controls

CISSP Security Professional 2012

This series is for anyone who is preparing to take the Certified Information Systems Security Professional (CISSP) exam.


  • Flash and audio provide animated, interactive Lesson Introductions, Activities, and Simulations.
  • Streaming video scenarios illustrate real world issues and solutions discussed in the course.
  • Audio accompanies each lesson page throughout the course.
  • MindNotes provide printable quick-reference sheets and other files to be used as learners apply their skills on the job.
  • Instructional audio with graphics highlighting key points.
  • Activities allow learners to apply course concepts in an interactive questioning environment.
  • Exercises allow learners to practice in the actual application being studied.
  • A Course Topics list contains active hyperlinks, permitting quick access to specific topics.
  • Find-A-Word allows learners to look up an unfamiliar term in the Glossary, on the Web, or in a dictionary. In addition, it lets them find other occurrences of the term in the same course.
  • Search text enables learners to rapidly search all text within a course to easily retrieve information required.
  • Courses challenge the learner with a variety of question formats, including multi-step simulations, true/false, multiple choice, and fill-in-the-blank.
  • A skill assessment generates a customized learning path based on the results of a pre-test.
  • A glossary provides a reference for definitions of unfamiliar terms.
  • Bookmarking tracks the learner's progress in a course.

Technical Requirements:

What You Get:

You will receive Unlimited Access to all of the CISSP Security Professional 2012 training tutorials listed above. Your online training courses will be available from anywhere you have internet access.This e-learning series includes all of the online training tutorials listed and is provided in an interactive, self-paced format. Retake any or all of our computer training as often as you want. Our online tutorials allow you to learn anywhere, anytime from any computer with internet access. All courses allow for 6 months of unlimited access (1 user), include a variety of features and qualify for Continuing Education Unit credit.

Web-Based Training Products:

You might also be interested in our Technical Package which includes all of the CISSP Security Professional 2012 training courses listed above plus hundreds of hours of related online training courses


Technical Package

Only $249.95   staffkit

CISSP Security Professional 2012
Training Series
Total Courses: 12
Total Time: 30+ hours
Only $99.95
Available in Package only
Total Courses: 853
Total Time: 1723+ hours
Only $249.95
Satisfaction Guaranteed    BBB Online Accredited Business          Fruad Protection Guaranteed By American Express            Paypal World Seller


'offers employers an excellent way to train their staff economically and without having to send them out of the office.'

'this is a must have resource'
California Technology Magazine

'this is theUltimate
Career Development
MidWest Technology Journal

Read more customer
reviews about our
e-learning training tutorials

StaffKit offers a centralized e-learning solution for business, computer, technical, compliance and employee training.
Copyright © 2001-2016 StaffKit All Rights Reserved