8340  Reviews star_rate star_rate star_rate star_rate star_half

CISSP Training and Certification Exam Preparation

Attend this official (ISC)2® CISSP certification course and get prepared to pass the exam and become a CISSP. You will gain the foundational knowledge to fully prepare for the exam, including a...

Read More
$4,095 USD
Duration 5 days
Course Code 2058
Available Formats Classroom

Overview

Attend this official (ISC)2® CISSP certification course and get prepared to pass the exam and become a CISSP. You will gain the foundational knowledge to fully prepare for the exam, including a comprehensive understanding of the CISSP® CBK® 8 domains. Your course tuition includes the current Official (ISC)2® Guide to the CISSP® CBK®, and a voucher that allows you to take the exam at any Pearson VUE Test Center.

  • Earn CISSP certification — exam voucher included with course tuition
  • Official (ISC)2® course materials with a preferred (ISC)2® training partner
  • Access to hundreds of exam prep questions
  • Official (ISC)2® Guide to the CISSP® CBK® included with tuition
  • After-course instructor coaching benefit included

Skills Gained

  • Strategically focus your preparation for CISSP Certification
  • Protect resources using access control methods and cryptography
  • Plan a secure environment aligned with organizational objectives, compliance requirements, and industry-standard architectures
  • Develop operational security and continuity through preventive and recovery mechanisms

Prerequisites

CISSP candidates must meet specific requirements, as established by (ISC)2 — see:https://www.isc2.org/cissp/default.aspx Those without the required experience can take the exam to become an Associate of (ISC)² while working toward the experience needed for full certification.

Course Details

Important CISSP Certification Course Outline

Security and Risk Management

Aligning security and risk to organizational objectives

  • Evaluate and apply security governance principles
  • Implement policies, standards and procedures
  • Applying compliance

Applying risk management concepts

  • Assessing threats and vulnerabilities
  • Performing risk analysis and control
  • Defining qualitative and quantitative analysis

Preserving the business

  • Adhering to Business Continuity Management Code of Practice and Specifications
  • Performing a business impact analysis

Investigating legal measures and techniques

  • Reviewing intellectual property, liability and law, and compliance
  • Differentiating traditional computer crime
  • Establish information and asset handling requirements

Asset Security

Examining security models and frameworks

  • The Information Security Triad and multi-level models
  • Investigating industry standards: ISO 27001/27002
  • Evaluating security model fundamental concepts

Exploring system and component security concepts

  • Certification and accreditation criteria and models
  • Reviewing mobile system/cloud/IoT vulnerabilities

Protecting information by applying cryptography

  • Detailing symmetric and asymmetric encryption systems
  • Ensuring message integrity through hashing
  • Uncovering threats to cryptographic systems

Safeguarding physical resources

  • Designing environments to resist hostile acts and threats

Communication and Network Security

Defining a secure network architecture

  • TCP/IP and other protocol models
  • Protecting from network attacks
  • Reviewing secure network components and communication channels

Examining secure networks and components

  • Identifying wired and wireless technologies
  • Implementing firewalls, secure communications, proxies, and tunnels

Identity and Access Management (IAM)

Controlling access to protect assets

  • Defining administrative, technical and physical controls
  • Implementing centralized and decentralized approaches
  • Investigating biometric and multi-factor authentication
  • Identifying common threats
  • Manage the identity and access provisioning lifecyle

Security Assessment and Testing

Designing and conducting security assessment strategies

  • Leveraging the role of testing and auditing to analyze the effectiveness of security controls
  • Differentiating detection and protection systems

Conducting logging and monitoring activities

  • Distinguishing between the roles of internal and external audits
  • Conduct or facilitate security audits

Security Operations

Maintaining operational resilience

  • Managing security services effectively
  • Leveraging and supporting investigations and incident response
  • Differentiating detection and protection systems
  • Securely provisioning resources

Developing a recovery strategy

  • Designing a disaster recovery plan
  • Implementing test and maintenance processes
  • Provisioning of resources

Software Development Security

Securing the software development life cycle

  • Applying software development methods and security controls
  • Addressing database security concepts and issues
  • Define and apply secure coding guidelines and standards
  • Reviewing software security effectiveness and security impact

Schedule

FAQ

Does the course schedule include a Lunchbreak?

Classes typically include a 1-hour lunch break around midday. However, the exact break times and duration can vary depending on the specific class. Your instructor will provide detailed information at the start of the course.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does Ascendient Learning deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

What does vendor-authorized training mean?

As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.

Is the training too basic, or will you go deep into technology?

It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.

How up-to-date are your courses and support materials?

We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.

Are your instructors seasoned trainers who have deep knowledge of the training topic?

Ascendient Learning instructors have an average of 27 years of practical IT experience and have also served as consultants for an average of 15 years. To stay current, instructors spend at least 25 percent of their time learning new, emerging technologies and courses.

Do you provide hands-on training and exercises in an actual lab environment?

Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.

Will you customize the training for our company’s specific needs and goals?

We will work with you to identify training needs and areas of growth.  We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.

How do I get started with certification?

Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact info@ascendientlearning.com.

Will I get access to content after I complete a course?

You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.

How do I request a W9 for Ascendient Learning?

View our filing status and how to request a W9.

Reviews

Courseware was effective but would like to have some PDF material on BPML and XPATH

This is my second course with ExitCertified. This course exceeded my expectations. The teacher was great and the class was fun.

The tool provided to practice the course teachings is very functional and easy to use.

This was effective way to provide a ton of information in a short time period.

I found this course informative. It was easy to follow and provided some good information.