reed.co.uk Courses

Header

Certified Information Systems Security Professional (CISSP)


Simply Cert

Summary

Price
Save 83%
£39 inc VAT (was £234)
Offer ends 31 October 2020
Study method
Online, self-paced
Duration
12 months
Certification
Certified Information Systems Security Professional (CISSP)
Professional certification What's this?

138 students purchased this course

Add to basket or enquire

Overview

  • 12 months unlimited access
  • Completion Certificate awarded upon completion to show employers your new skills
  • Free upgrade on to our premium platform
  • Free career advice available on completion

Developed and maintained by the International Information Systems Security Certification Consortium (ISC)2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The CISSP course provides you with the knowledge and skills to pass the CISSP certification, after which you’ll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security.

Certification

Certified Information Systems Security Professional (CISSP)
Awarded by Cisco Systems

Description

ACCESS CONTROL

  • General Concepts
  • Authentication
  • Principles
  • Types and Categories
  • Reference Monitor
  • Techniques
  • Models
  • Passwords
  • Smart Cards
  • Biometrics
  • Access Control Systems
  • Administration
  • Residuals
  • Accountability
  • Summary

TELECOMMUNICATIONS AND NETWORK SECURITY

  • OSI Reference Model
  • ISO/OSI Layers and Characteristics
  • Topologies
  • LAN Access Methods
  • Wireless
  • System and Security Management
  • Internet Protocols and Security
  • Firewall Terms and Types
  • Web Security
  • Common Attacks
  • Remote Access Security
  • Summary

INFORMATION SECURITY GOVERNANCE AND RISK MANAGEMENT

  • Key Concepts
  • Definitions
  • Key Concepts
  • Risk Management
  • Risk Assessment
  • Useful Formulas
  • 3rd Party Governance
  • Information Classification
  • Roles and Responsibilities
  • Written Guidance
  • Policies and Standards
  • Employment Policies
  • Employee Education Programs
  • Change Management
  • Summary

SOFTWARE ARCHITECTURE AND DESIGN

  • Problems
  • Databases
  • Query Language
  • Object Oriented
  • Applications Beyond the Database
  • Definitions
  • Application System Development
  • Controls
  • Compiled vs. Interpreted
  • Vulnerabilities
  • Botnets
  • Summary

CRYPTOGRAPHY

  • Definitions
  • Cryptanalysis Terms
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hybrid Encryption
  • Public Key Infrastructures
  • Hash Functions
  • Digital Signatures
  • Protocol Based
  • Pretty Good Privacy
  • Cracking Techniques
  • Summary

SECURITY ARCHITECTURE AND DESIGN

  • Abstract Levels
  • Computer Hardware
  • Operating Systems
  • Processors
  • Types of Storage
  • Information Security Architecture
  • Open and Closed Systems
  • Access Controls
  • Architectural Foundation
  • Modes of Operation
  • Certification and Accreditation
  • Evaluation Criteria
  • Security Models
  • Summary

OPERATIONS SECURITY

  • Threats in an Operating Environment
  • Control Categories
  • Accountability
  • Trusted Recovery
  • Management and Administrative Control
  • Due Care and Diligence
  • Hardware and Software Controls
  • Email and Fax
  • Privilege
  • Physical Access
  • Monitoring Techniques
  • Problem Management
  • Threats and Vulnerabilities
  • Defence in Depth
  • Summary

BUSINESS CONTINUITY AND DISASTER RECOVERY

  • The Basics
  • Reasons for BCP
  • Key Concepts
  • Definitions
  • Business Continuity Life Cycle
  • Project Initiation
  • Business Impact Analysis
  • Assessing Risk
  • Recovery Strategies
  • Off-Site Requirements
  • Data Redundancy
  • System Backups
  • Plan Development
  • Testing and Maintenance
  • Stages in an Incident
  • Summary

LEGAL REQUIREMENTS AND INVESTIGATIONS

  • Ethics
  • Code of Ethics
  • Laws
  • Intellectual Property
  • Proprietary Rights
  • Liability
  • Computer Crime
  • Computer Crime Laws
  • Computer Investigation
  • Investigation Steps
  • Computer Forensics
  • Evidence Admissibility
  • Summary

PHYSICAL AND ENVIRONMENTAL SECURITY

  • Physical Security
  • Crime Prevention
  • Site Design and Configuration
  • Boundary Protection
  • Computing Facility Requirements
  • Fire Prevention
  • Fire Suppression
  • Fire Classes
  • Media Protection
  • Access Controls
  • Physical Security
  • Summary


EXPERT INSTRUCTOR-LED TRAINING

Our Courseware uses only the industry’s finest instructors. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS

Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Our Courseware always focuses on real world scenarios and skill-set development.

QUIZZES & EXAM SIMULATORS

Our custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding.

This will allow you to gauge your effectiveness before moving to the next module in your course. Our Courses also include practice exams designed to replicate and mirror the environment in the testing centre. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

SOCIAL LEARNING & NETWORKING

We Have designed a world class Learning Management System (LMS) This system allows you to interact and collaborate with other students, form study groups, engage in discussions in our NOW@ Forums, rate and “like” different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. This LMS is unmatched in the industry and makes learning fun and enjoyable.

FLASH CARDS & EDUCATIONAL GAMES

Our Courseware knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.

NAVIGATION & CONTROLS

Our self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.

12 MONTHS UNLIMITED ACCESS

Each student will have 12 months unlimited access to allow you to have access to the training anytime 24/7.

Who is this course for?

This package is designed for any individual wishing to pursue or enhance their career in Certified Information Systems Security Professional.

Our Online Courses is a cost-effective and successful approach for many individuals. It provides a flexible learning method, allowing candidates to schedule learning at a time that suits them and fits in with other commitments; ideal for those who find it difficult to take time away from their workplace. It also allows candidates to work at their own pace, and revisit sections of the course as often as needed, leading to a fuller understanding of all the topics covered.

In addition, there are none of the high costs of travel and accommodation associated with courses at an external venue.

Requirements

There is no need for any special equipment to complete your course, all you need is a high speed internet connection.

Our training works on all devices including Mobile phones, iPads, Android tablets, Macs and PCs.

Career path

A list of Career Paths you can pursue:

  • Senior Security Consultant
  • Security Operations Lead
  • Security Architect
  • Security Risk Assessment Consultant

Questions and answers


No questions or answers found containing ''.


abdulbasit asked:

How many hours can finish the course.?

Answer:

everyone is different, i would say 35 hours to completed the course material

This was helpful. Thank you for your feedback.

Reviews

5.0
Course rating
100%
Service
100%
Content
100%
Value
Leave a review

{{ getTruncatedSinglePointScore(item.OverallCourseRating) }} Star Review by {{ item.ReviewerName }} for {{ item.Title }}


{{ getLongDate(item.CreatedOn) }}
{{ item.Title }}
Reviewed by {{ item.ReviewerName }}
|Purchased {{ getHumanisedPassageOftime(item.PurchasedOn) }}
{{ item.ProviderName }} responded to this review
{{ getLongDate(item.ProviderResponseDate) }}
{{ results.length }} out of {{ totalResultsCount }} reviews

FAQs

What does study method mean?

Study method describes the format in which the course will be delivered. At reed.co.uk courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

What are CPD hours/points?

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on reed.co.uk, many of which can be completed online.

What is a ‘regulated qualification’?

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

What is an ‘endorsed’ course?

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body’s logo if they wish. Certain awarding bodies - such as ABC Awards and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.

Modals

Mobile Navigation