Skip to content

Certified Information Systems Security Professional (CISSP)

This course will help you to become a certified cyber security professional.


StudyOnline247

Summary

Price
£199 inc VAT
Or £66.33/mo. for 3 months...
Study method
Online
Duration
1 month · Self-paced
Certification
Certified Information Systems Security Professional (CISSP)
Professional certification What's this?
Additional info
  • Exam(s) / assessment(s) not included in price, and must be purchased separately

Overview

Certified Information Systems Security Professional (CISSP) is a premier certification for those who want to demonstrate their knowledge and advance their careers. Become a member of a community of cyber-security leaders and show you have what it takes to design and implement an information security program.

Certification

Certified Information Systems Security Professional (CISSP)

Description

This Certified Information Systems Security Professional (CISSP) course covers everything you need to know to stay one step ahead and keep your organisation safe. This course is seen as an objective measure of excellence. Once you have completed the Certified Information Systems Security Professional (CISSP) you will be recognised as an IT Professional in the field of Security.

What you will learn

Once you have completed this course you will have the deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security of an organisation.

Curriculum

Module 1:

• Introduction

• Least Bad Answer Part 1

• Least Bad Answer Part 2

• Least Bad Answer Part 3

• Least Bad Answer Part 4

• Least Bad Answer Part 5

• Least Bad Answer Part 6

• Least Bad Answer Part 7

• Ethics

Module 2:

• Accounts And Identity Management - Part 1

• Accounts And Identity Management - Part 2

• Accounts And Identity Management - Part 3

• Accounts And Identity Management - Part 4

• Accounts And Identity Management - Part 5

• Authentication Services – Part 1

• Authentication Services – Part 2

• Authentication Services – Part 3

• Authentication Services – Part 4

• Authentication Services – Part 5

• Categories And Types – Part 1

• Categories And Types – Part 2

• Categories And Types – Part 3

• Penetration Testing And Auditing – Part 1

• Penetration Testing And Auditing – Part 2

• Penetration Testing And Auditing – Part 3

• Penetration Testing And Auditing – Part 4

• Penetration Testing And Auditing – Part 5

• Systems M A C D A C R B A C – Part 1

• Systems M A C D A C R B A C – Part 2

• Systems M A C D A C R B A C – Part 3

• Systems M A C D A C R B A C – Part 4

Module 3:

• Telecommunications

• Wired Physical Interfaces

• Physical Layer

• Layer – Part 1

• Layer – Part 2

• Wireless

• Wireless Lan

• Layer 34 And Firewalls

• Firewalls

• Protocols

• Transport Layer

• Layers 5 And 6

• Controls

• Layer 5 Protocols

• Presentation Layer

• Layer 7

• Authentication

• Printing

• Messaging

• Security Protocol

• Application Attacks

• Honeypots

• Telecommunications

• Voice Over IP

• Attacks

• VOIP Controls

Module 4:

• Layers of Protection

• Penetration Testing

• Vectors Of Test

• Scope

• Technical Penetration Testing

• Pen Testing Methodology

Module 5:

• Application Security – Part 1

• Application Security – Part 2

• Connectivity Interfaces And Applications

• Malware

• Attack Types

• Malformed Input

• Payload

• Web Risks – Part 1

• Web Risks – Part 2

• Insecure Direct Object Reference

• Security Misconfiguration

• How To Pass The Exam

• Overview

• Risk Management

• Patch Management

• Levels Of Patch Management

• Software Development Life Cycle – Part 1

• Software Development Life Cycle – Part 2

• Security

Module 6:

• Cryptology

• Symmetric Vs Asymmetric

• Managing Key Sizes

• Initialization Vector

• Asymmetric

• Crytology Law

• Message Integrity Controls

• Apply Integrity Controls

• Digital Signature Overview

• Types Of Encryption

• Digital Signatures

• Key Agreement

• Hierarchical Trust Model

• PGP And Digital Signatures

• Spam Vs PKI

• Cryptolography And Steganography

• Investigating For Steganography

• Code Breaking

• Common Cryptanalytical Attacks

• Types Of Attacks

Module 7:

• Common Criteria And Trusted Computing Base – Part 1

• Common Criteria And Trusted Computing Base – Part 2

• Common Criteria And Trusted Computing Base – Part 3

• Frameworks – Part 1

• Frameworks – Part 2

• Frameworks – Part 3

• Frameworks – Part 4

• Frameworks – Part 5

• Hardware – Part 1

• Hardware – Part 2

• Hardware – Part 3

• Security Architecture Models – Part 1

• Security Architecture Models – Part 2

• Security Architecture Models – Part 3

• Security Architecture Models – Part 4

• Security Architecture Models – Part 5

• Software OS Design – Part 1

• Software OS Design – Part 2

• Software OS Design – Part 3

• Software OS Design – Part 4

Module 8:

• Data Classification – Part 1

• Data Classification – Part 2

• Data Classification – Part 3

• Data Classification – Part 4

• Data Backup And Control – Part 1

• Data Backup And Control – Part 2

• Data Backup And Control – Part 3

• Data Backup And Control – Part 4

• Privilege Entry Control – Part 1

• Privilege Entry Control – Part 2

• IDS And IPS – Part 1

• IDS And IPS – Part 2

• IDS And IPS – Part 3

Module 9:

• Business Continuity Planning – Part 1

• Business Continuity Planning – Part 2

• Policy And Program Management – Part 1

• Policy And Program Management – Part 2

• Business Impact Analysis – Part 1

• Business Impact Analysis – Part 2

• Strategy Options

• Incident Management Plans

• Activity Response Plans

• Test Plan

• Embedding Business Continuity Plan

Module 10:

• Law Domain – Part 1

• Law Domain – Part 2

• Law Domain – Part 3

• Law Domain – Part 4

• Incident Handling – Part 1

• Incident Handling – Part 2

• Incident Handling – Part 3

• Incident Handling – Part 4

• Legal Systems – Part 1

• Legal Systems – Part 2

• Intellectual Property – Part 1

• Intellectual Property – Part 2

• Intellectual Property – Part 3

Module 11:

• Fire And Power – Part 1

• Fire And Power – Part 2

• Fire And Power – Part 3

• Perimeter Barrier Lock Sensor Guard – Part 1

• Perimeter Barrier Lock Sensor Guard – Part 2

• Perimeter Barrier Lock Sensor Guard – Part 3

• Perimeter Barrier Lock Sensor Guard – Part 4

• Physical Security Planning – Part 1

• Physical Security Planning – Part 2

• Physical Security Planning – Part 3

• Conclusion

Please note that the official exam is not included, however for those who complete the course, they will receive a completion certificate upon request.

Who is this course for?

This course is for those who are interested in a career in Security and want to be a Certified Information Systems Security Professional (CISSP).

Requirements

There are no prerequisites to study this CISSP training course, however, to be eligible to write the exam you will be required to have a minimum of 5 years full time paid work experience in at least two of the eight CISSP domains.

Career path

Network Architect
IT Security Architect
IT Manager
Security Systems Engineer
Chief Information Security Officer
Director of IT Security
IT Security Analyst

Questions and answers


No questions or answers found containing ''.


comfort asked:

how much is the exam/assessment fee?

Answer:

Hi, comfort CISSP exam information can be found via the ISC2 website.

This was helpful. Thank you for your feedback.
Rafael asked:

I have no experience in IT industry but this year I´ve got my compTIA Security+. Would it be difficult for me if I have no working experience?

Answer:

We can only answer course related questions. Speak with a recruitment consultant

This was helpful. Thank you for your feedback.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.