Toll Free - 877-442-3915

Account | Self-Paced Login

Account | Self-Paced Login | 877-442-3915

CISSP Certification Prep Course Course

CISSP Certification Prep Course Training Course


Course Description:

The GK CISSP Certification Prep Course course is a 5-day course that is designed to provide students the most comprehensive review of information security concepts and industry best practices, and focuses on the eight domains of the CISSP CBK (Common Body of Knowledge) that are covered in the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity.

Why take the CISSP Certification Prep Course?

The CISSP exam is challenging, but the benefits are immense. Due to its comprehensive breadth, CISSP is the de facto certification to show competence in cyber roles. It's also one of the top-paying certifications in IT.

This course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.

Business Computer Skills is independent of and not affiliated with (ISC)2.

Topics covered in the course include:

Iin-depth coverage of the eight domains required to pass the CISSP exam:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Target Student:

  • Anyone whose position requires CISSP certification
  • Individuals who want to advance within their current computer security careers or migrate to a related career

Prerequisites:

Students should have a minimum of five years of experience working in IT Infrastructure and Cybersecurity.

Training Dates
(Click on the course name below to view course details and full list of class dates)

CISSP Certification Prep Course
Course Format: Online with Live Instructor
Class Date(s): 8/2/2021 - 8/6/2021
Course Fee : $3595


CISSP Certification Prep Course
Course Format: Online with Live Instructor
Class Date(s): 8/9/2021 - 8/13/2021
Course Fee : $3595


CISSP Certification Prep Course
Course Format: Online with Live Instructor
Class Date(s): 8/23/2021 - 8/27/2021
Course Fee : $3595


CISSP Certification Prep Course
Course Format: Online with Live Instructor
Class Date(s): 9/13/2021 - 9/17/2021
Course Fee : $3595


CISSP Certification Prep Course
Course Format: Online with Live Instructor
Class Date(s): 9/20/2021 - 9/24/2021
Course Fee : $3595


Course Syllabus

Course Outline

    1. Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)

    • Understanding and Applying Concepts of Confidentiality, Integrity, and Availability
    • Applying Security Governance Principles
    • Compliance
    • Understanding Legal and Regulatory Issues that Pertain to Information Security in a Global Context
    • Developing and Implementing Documented Security Policy, Standards, Procedures, and Guidelines
    • Understanding Business Continuity Requirements
    • Contribute to Personnel Security Policies
    • Understanding and Applying Risk Management Concepts
    • Understanding and Applying Threat Modeling
    • Integrating Security Risk Considerations into Acquisitions Strategy and Practice
    • Establish and Manage Security Education, Training, and Awareness

    2. Asset Security (Protecting Security of Assets)

    • Classify Information and Supporting Assets
    • Determine and Maintain Ownership
    • Protect Privacy
    • Ensure Appropriate Retention
    • Determine Data Security Controls
    • Establish Handling Requirements

    3. Security Engineering (Engineering and Management of Security)

    • Implement and Manage an Engineering Life Cycle Using Security Design Principles
    • Understanding Fundamental Concepts of Security Models
    • Select Controls and Countermeasures Based Upon Information Systems Security Standards
    • Understanding the Security Capabilities of Information Systems
    • Assessing and Mitigating the Vulnerabilities of Security Architectures, Designs, and Solution Elements
    • Assessing and Mitigating Vulnerabilities in Web-based Systems
    • Assessing and Mitigating Vulnerabilities in Mobile Systems
    • Assessing and Mitigating Vulnerabilities in Embedded Devices and Cyber-Physical Systems
    • Applying Cryptography
    • Applying Secure Principles to Site and Facility Design
    • Designing and Implementing Facility Security

    4. Communications and Network Security (Designing and Protecting Network Security)

    • Applying Secure Design Principles to Network Architecture
    • Securing Network Components
    • Designing and Establishing Secure Communication Channels
    • Preventing or Mitigating Network Attacks

    5. Identity and Access Management (Controlling Access and Managing Identity)

    • Controlling Physical and Logical Access to Assets
    • Managing Identification and Authentication of People and Devices
    • Integrating Identity as a Service (IDaaS)
    • Integrating Third-Party Identity Services
    • Implement and Manage Authorization Mechanisms
    • Preventing or Mitigating Access Control Attacks
    • Managing the Identity and Accessing Provisioning Life Cycle

    6. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)

    • Designing and Validating Assessment and Test Strategies
    • Conducting Security Control Testing
    • Collecting Security Process Data
    • Conducting or Facilitating Internal and Third-Party Audits

    7. Security Operations (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

    • Understanding and Support Investigations
    • Understanding Requirements for Investigation Types
    • Conducting Logging and Monitoring Activities
    • Securing the Provisioning of Resources through Configuration Management
    • Understanding and Applying Foundational Security Operations Concepts
    • Employing Resource Protection Techniques
    • Conducting Incident Response
    • Operating and Maintaining Preventative Measures
    • Implementing and Supporting Patch and Vulnerability Management
    • Participating in and Understanding Change Management Processes
    • Implementing Recovery Strategies
    • Implementing Disaster Recovery Processes
    • Testing Disaster Recovery Plan
    • Participating in Business Continuity Planning
    • Implementing and Manage Physical Security
    • Participating in Personnel Safety

    8. Software Development Security (Understanding, Applying, and Enforcing Software Security)

    • Understanding and Applying Security in the Software Development Life Cycle
    • Enforcing Security Controls in the Development Environment
    • Assessing the Effectiveness of Software Security
    • Assessing Software Acquisition Security

cissp Self Paced Courses
CISSP Certification Prep Course On-Site Group Training
Arrange a private CISSP Certification Prep Course training class for your team with one of our Certified Instructors. Private instruction for your team members at a lower per-student price than attending the public courses. Learn More or complete the quote request form below.



(ISC)² On-Demand Training

"The Instructor made class truly interesting and put everything into real world terms."
- Meredith T(Jersey City, NJ)


Business Computer Skills BBB Profile