In this course students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. Information security is part of every IT professional’s job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Planning, implementing, enforcing, or even removing security are tasks we all do to keep users and systems safe. Performing these tasks properly and in alignment with industry best practices is critical to virtually every technology role, from decision maker to developer to operator. This 5-day scenario-based course focuses on computer security as an applied process across job roles and industries. The course also helps to prepare students for achieving the Certified Information Systems Security Professional (CISSP) certification. CISSP is widely regarded as the most valuable vendor-neutral credential a computer security professional can hold. It is frequently identified as a prerequisite for security jobs across all industries including security design, implementation, maintenance, policy development, and management of secured systems, process/procedures, policies, applications and networks.
This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience.
What You'll Learn
- Analyze components of the Security and Risk Management domain
- Analyze components of the Asset Security domain
- Analyze components of the Security Engineering domain
- Analyze components of the Communications and Network Security domain
- Analyze components of the Identity and Access Management domain
- Analyze components of the Security Assessment and Testing domain
- Analyze components of the Security Operations domain
- Analyze components of the Software Development Security domain
- Course Number CISSP
- Course Length 5 days
- Course Fee $2,995.00
- Delivery Format VLT (Instructor Led; Virtual LIVE Online; Remote Training)
- Course Topic Certification
- Vendor (ISC)2, ISACA, CBK, EC-Council
Need a different date? This course is also offered on these dates
|Date||Course ID||Course Name||Duration||Delivery Format||Registration|
|08/22/2022||CISSP||Certified Information System Security Professional (CISSP)||5 days||VLT||Register|
|09/12/2022||CISSP||Certified Information System Security Professional (CISSP)||5 days||VLT||Register|
|09/19/2022||CISSP||Certified Information System Security Professional (CISSP)||5 days||VLT||Register|
|10/10/2022||CISSP||Certified Information System Security Professional (CISSP)||5 days||VLT||Register|
|11/14/2022||CISSP||Certified Information System Security Professional (CISSP)||5 days||VLT||Register|
|12/12/2022||CISSP||Certified Information System Security Professional (CISSP)||5 days||VLT||Register|
About the instructorMike DanseglioSystems & IT Security Instructor; CISSP, CEH
Mike has worked in the IT field for more than 20 years. He is an award-winning author, public speaker, and instructor on a variety of technology topics including security, virtualization, cloud computing, wireless and wired networking, and IT lifecycle processes. His security work has included protecting militaries, government agencies, and private industry around the world. Mike has developed and taught extensive security training on topics including cryptography, security technology, and attacks and countermeasures. Mike has published several books and numerous papers on computer security including Microsoft’s own product security guides. He holds numerous certifications and credentials in technical instruction, security expertise, and across several IT specializations. Mike performed computer security hardening for NATO, wrote many Microsoft product security guides and managed Microsoft’s Xbox LIVE Operations.
Danseglio trains IT professionals to protect their companies’ infrastructure, database systems, websites and customer accounts from threats such as hacking, viruses and corrupted processes. “I help people understand attacks across all these approaches,” Danseglio says. “I understand how relentless and creative hackers are, and I’ve translated that knowledge into training that’s directly applicable for the IT pro.” Danseglio has written National Security Agency (NSA) security recommendations and has written and presented on topics such as Active Directory Recovery and Availability in the enterprise, using SSL and Trust Marks and simplifying Compliance. Mike is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and Langevin Master Trainer. He has developed and taught security training programs in Cryptography, Security Technology and Attacks and Countermeasures.
Certified Information System Security Professional (CISSP)
Register for course: CISSP
"*" indicates required fields