Course Content
Chapter 1: Introduction
Chapter 2: Security Governance Through Principles and Policies
Chapter 3: Personnel Security and Risk Management Concepts
Chapter 4: Business Continuity Planning
Chapter 5: Laws, Regulations, and Compliance
Chapter 6: Protecting Security of Assets
Chapter 7: Cryptography and Symmetric Key Algorithms
Chapter 8: PKI and Cryptographic Applications
Chapter 9: Principles of Security Models, Design, and Capabilities
Chapter 10: Security Vulnerabilities, Threats, and Countermeasures
Chapter 11: Physical Security Requirements
Chapter 12: Secure Network Architecture and Components
Chapter 13: Secure Communications and Network Attacks
Chapter 14: Managing Identity and Authentication
Chapter 15: Controlling and Monitoring Access
Chapter 16: Security Assessment and Testing
Chapter 17: Managing Security Operations
Chapter 18: Preventing and Responding to Incidents
Chapter 19: Disaster Recovery Planning
Chapter 20: Investigations and Ethics
Chapter 21: Software Development Security
Chapter 22: Malicious Code and Application Attacks
Hands on Activities (Live Labs)
- Security Governance Through Principles and Policies
- Personnel Security and Risk Management Concepts
- Business Continuity Planning
- Laws, Regulations, and Compliance
- Protecting Security of Assets
- Cryptography and Symmetric Key Algorithms
- PKI and Cryptographic Applications
- Principles of Security Models, Design, and Capabilities
- Security Vulnerabilities, Threats, and Countermeasures
- Physical Security Requirements
- Secure Network Architecture and Components
- Secure Communications and Network Attacks
- Managing Identity and Authentication
- Controlling and Monitoring Access
- Security Assessment and Testing
- Managing Security Operations
- Preventing and Responding to Incidents
- Disaster Recovery Planning
- Investigations and Ethics
- Software Development Security
- Malicious Code and Application Attacks
Below are some of the career paths and potential opportunities after passing the Certified Information Systems Security Professional (CISSP) exam.
- Chief information security officer
- Chief information officer
- Director of security
- IT director/manager
- Security systems engineer
- Security analyst
- Security manager
- Security auditor
- Security architect
- Security consultant
- Network architect
CISSP certification requirements include a combination of work experience, peer endorsement, ethics adherence, and successfully pass the CISSP exam. A candidate must have a minimum of five years of direct full-time security work experience. There are provisions whereby one year of work experience may be waived for having either a four-year college degree, a master’s degree in information security, or for possessing one of several other certifications.In fulfilling their responsibility to build and maintain professionalism within the security industry, (ISC)2 requires candidates to accept the CISSP Code of Ethics and to attest to the truthfulness of their application assertions regarding professional experience and background. That being said, they will, undoubtedly, verify those assertions as well.