Certified Information Systems Security Pro (CISSP) 2015
The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, deeming CISSP as the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement. **NOTE: Effective April 15, 2015, the CISSP exam is based on a new exam blueprint.
Course Content
Introduction
Module 1 Security and Risk Management
1.1 CIA Triad Security Governance
1.2 Compliance Legal And Regulatory Issues
1.3 Understanding Professional Ethics
1.4 Risk Management
1.5 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training
Module 2 Asset Security
2.1 Asset Security
Module 3 Security Engineering
3.1 Engineering And Management Of Security Part 1
3.2 Engineering And Management Of Security Part 2
3.3 Engineering And Management Of Security Part 3
Module 4 Communication and Network Security
4.1 Apply Secure Design Principles To Networks Part 1
4.2 Apply Secure Design Principles To Networks Part 2
4.3 Securing Network Components
4.4 Design And Establish Secure Communication Channels
Module 5 Identity and Access Management
5.1 Controlling Access And Managing Identity Part 1
5.2 Controlling Access And Managing Identity Part 2
Module 6 Security Assessment Testing
6.1 Designing Performing And Analyzing Security Testing
Module 7 Security Operations
7.1 Foundational Concepts And Investigations
7.2 Incident Management And Preventative Measures
7.3 Disaster Recovery Process
Module 8 Software Development Security
8.1 Understanding Applying And Enforcing Software Security Part 1
8.2 Understanding Applying And Enforcing Software Security Part 2
Summary