CISSP Security Professional Training
This online training series helps a learner prepare to take and pass the Certified Information Systems Security Professional (CISSP) exam. This online training series, like the exam, covers ten domains of information system security knowledge including access control systems and methodology, network and telecommunications security, security management and practices, applications and systems development security, cryptography, security and architecture models, operations security, business continuity and disaster recovery planning, law, investigation, and ethics, as well as physical security.
This CISSP Security Professional online training series provides 24 hours of self-paced courseware. This web-based training provides 1 year of unlimited access to all of the following lessons:
1 . Access Control Systems and Methodology
2 . Telecommunications and Network Security
3 . Security Management and Practices
4 . Applications and Systems Development Security
5 . Cryptography, Security Architecture, and Security Models
6 . Operations Security
7 . Business Continuity and Disaster Recovery Planning
8 . Law, Investigation, Ethics, and Physical Security
9 . Practice Exams
Access Control Systems and Methodology
This course covers Domain 1 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about the mechanisms you can use to exercise either a directing or restraining influence over the behavior, use, and content of a system.
- Authentication, access control, and accountability
- Access control techniques
- Access control administration and models
- Identification and authentication techniques
- Access control methodologies
- Methods of attacks
- Penetration testing
Telecommunications and Network Security
This course covers Domain 2 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about the structures, transmissions methods, transport formats, and security measures used to provide integrity, availability, authentication, and confidentiality for transmissions over private and public communications networks and media.
- The Open Systems Interconnection model
- Network characteristics
- Network topologies
- LAN devices
- WAN technologies
- Providing remote access capabilities
- Networking and security protocols
- Securing communications
- Error prevention, detection, and correction
- Intrusion detection, response, and prevention
- Fault tolerance and data restoration
Security Management and Practices
This course covers Domain 3 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about identifying an organization's information assets, as well as the development, documentation, and implementation of appropriate policies, standards, procedures, and guidelines. It also covers how data classification, risk assessment, and risk analysis are used to identify the threats, classify assets, and to rate their vulnerabilities so that effective security controls can be implemented.
- Defining security principles
- Identification and authentication
- Accountability and auditing
- Security management planning
- Risk management and analysis
- Risk analysis step by step
- Policies, standards, guidelines, and procedures
- Examining roles and responsibility
- Understanding protection mechanisms
- Classifying data
- Employment policies and practices
- Managing change control
- Security awareness training
Applications and Systems Development Security
This course covers Domain 4 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about the security controls that are included within systems and applications software and the steps used in their development in both distributed and centralized environments.
- Distributed and nondistributed environment challenges
- Database and data warehousing issues
- Storage and storage systems
- Knowledge-based systems and edge computing
- Attacking software
- Understanding malicious code
- System development lifecycle models
- Security control architecture
- Software development methodologies
- Secure software design and coding practices
Cryptography, Security Architecture, and Security Models
This course covers Domains 5 and 6 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about the principles, means, and methods of disguising information to ensure its integrity, confidentiality, and authenticity. It also covers concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, and applications.
- Uses of cryptography
- Cryptographic concepts, methodologies, and practices
- Methods of attack
- Security architecture and model requirements
- Security models
- Security system architecture
- Information system security standards
- Common criteria
This course covers Domain 7 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about identifying the hardware and media controls, as well as the operators with access privileges to any of these resources. It also covers auditing and monitoring techniques that permit the identification of security events and their sources.
- Key operations security roles
- The roles of auditing and monitoring
- Penetration testing techniques
- Defining threats and countermeasures
- Countermeasures for employee-related threats
- The role of administrative management
- Concepts and best practices
Business Continuity and Disaster Recovery Planning
This course covers Domain 8 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about preservation in the face of major disruptions to normal business operations. It covers both the preparation and testing of specific actions to protect critical business processes from the effect of major system and network failures.
- Business operation disasters
- DRP and BCP differences
- BCP scope and business impact analysis
- Developing operational plans for BCP
- BCP implementation, testing and maintenance
- Disaster recovery planning
- Developing a backup strategy
- Alternative site requirements
Law, Investigation, Ethics, and Physical Security
This course covers Domains 9 and 10 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about computer crime laws and regulations, as well as the investigative measures and techniques which can be used to determine if a crime has been committed. It also covers the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise's resources and sensitive information.
- Fundamentals of law
- Criminal law and computer crime
- Computer security incidents
- Legal evidence
- Computer forensics
- Computer ethics
- Classifying assets and vulnerabilities
- Site location and construction
- Physical access controls
- Environmental controls and water exposure problems
- Fire prevention and protection
- Tape, media, and document library retention policies
- Waste disposal
- Physical intrusion detection
This course provides five practice exams for the Certified Information Systems Security Professional (CISSP) exam.
- Certification process overview
- Exam prep tips
- Fast facts
- Practice Exam 1
- Practice Exam 2
- Practice Exam 3
- Practice Exam 4
- Practice Exam 5
CISSP Security Professional
This online training series is for anyone preparing for the CISSP exam, or for anyone who wants to learn more about information security subjects.
- A Course Topics list contains active hyperlinks, permitting quick access to specific topics.
- Find-A-Word allows learners to look up an unfamiliar term in the Glossary, on the Web, or in a dictionary. In addition, it lets them find other occurrences of the term in the same course.
- Search text enables learners to rapidly search all text within a course to easily retrieve information required.
- Courses challenge the learner with a variety of question formats, including multi-step simulations, true/false, multiple choice, and fill-in-the-blank.
- A skill assessment generates a customized learning path based on the results of a pre-test.
- A glossary provides a reference for definitions of unfamiliar terms.
- Bookmarking tracks the learner's progress in a course.
- Internet connection
- Browser: Internet Explorer, FireFox, Chrome, Safari, Opera or any standards compliant browser.
- Authorware and Macromedia Flash player recommended but not required.
What You Get:
You will receive Unlimited Access to all of the CISSP Security Professional training tutorials listed above. Your online training courses will be available from anywhere you have internet access.This e-learning series includes all of the online training tutorials listed and is provided in an interactive, self-paced format. Retake any or all of our computer training as often as you want. Our online tutorials allow you to learn anywhere, anytime from any computer with internet access. All courses allow for 1 year unlimited access (1 user), include a variety of features and qualify for Continuing Education Unit credit.
StaffKit is a leader in providing online computer training tutorials and online education. We have customers use our online training courses in over 75 countries. StaffKit has been providing e-learning solutions for 10 years.
Web-Based Training Products:
CISSP Security Professional Online Training Series
You might also be interested in our Technical Package which includes all of the CISSP Security Professional training courses listed above plus hundreds of hours of related online training courses