Proudly serving the D.C. metro
area for over 25 years.


Softek Services, Inc.
1156 15th Street, NW, Suite 100
Washington, DC 20005
(202) 747-5000

Computer Training Software Consulting Database Programming

Get tips on our Facebook Find us on Google+ Tweet Us Read Reviews on Yelp Softek on Linkedin

  • Instructor-led Training Instructor-led Training
  • Join a Public Class Join a Public Class
  • Private Group Classes Private Group Classes
  • Transition Classes Transition Classes
  • Virtual Training Virtual Training
  • Customization & Documentation Customization & Documentation
  • Web and Database Development Web and Database Development
  • We Have Classrooms We Have Classrooms
     

CISSP™ Preparation Class

5 Days, 9:00-4:00

The International Information Systems Security Certification Consortium (ISC2) Certified Information Systems Security Professional (CISSP) certification is the most prestigious certification a security professional can attain. This class will provide students with the knowledge to pass the exam and provide the roadmap on how to pass on the first try. The class will provide all the concepts and terms for all eight domains of the CISSP certification. Students will understand what to study and how to study to pass the CISSP exam. Students will receive textbook, sample test questions and Softek’s unique SmartFlash® smartphone flashcard deck.

Monday

  • Overview
  • Introduction
  • Detailed Overview of the CISSP Exam
  • What's on the Exam and What's Not on the Exam
  • Certification Process
  • Exam Tips
  • Security and Risk Management Part I
  • The Complete and Effective Security Program
  • Security Governance
  • Confidentiality, Availability and Integrity
  • Risk Management Concepts
  • Develop and Implement Security Policy
  • Security Education, Training and Awareness
  • Threat Modeling
  • Identity and Access Management
  • Identity Management and Implementation
  • Identity as a Service (IDaaS)
  • Integrate Third-Party Service
  • Implement and Manage Authorization Mechanisms
  • Prevent or Mitigate Access Control Attacks
  • Identity and Access Provisioning

Tuesday

  • Security Engineering Part I
  • History of Cryptography
  • Cryptographic Concepts and Terms
  • The Application and Use of Cryptography
  • Security and Risk Management Part II
  • Business Continuity and Disaster Recovery
  • The Business Continuity process
  • Disaster recovery preventive measures
  • Disaster recovery technologies
  • Standby facilities
  • Backup Methodology
  • Security Engineering Part III (Physical Security)
  • Site Facility Design and Considerations
    Site Planning
  • Design and Implement Facility Security
  • Implementation and Operation of Facilities Security

Wednesday

  • Security Engineering Part II (Computer Architecture, Security Models, Evaluation Criteria)
  • Then Engineering Lifecycle Using Security Design Principles
  • Fundamental Concepts of Security Models
  • Information Systems Security Evaluation Models
  • Security Capabilities and Information Systems
  • Vulnerabilities of Security Architectures
  • Software and System Vulnerabilities and Threats
  • Vulnerabilities of Mobile Systems
  • Vulnerabilities in Embedded Devices and Cyber-Physical Systems

 

Thursday

  • Communications and Network Security
  • Security Network Architecture and Design
  • Implications of Multi-Layer Protection
  • Securing Network Components
  • Secure Communications Channels
  • Network Attacks

Friday

  • Security in the Software Development Life Cycle
  • Software Development Security Outline
  • Environmental and Security Controls
  • Security of the Software Environment
  • Software Protection Mechanisms
  • Assess the Effectiveness of Software Security
  • Assess Software Acquisition Security
  • Database Security
  • Security and Risk Management Part III (Legal, Compliance and Ethics)
  • Legal Systems
  • Intellectual Property
  • Global Legal and Regulatory Issues
    Compliance
  • Professional Ethics
  • Security Assessment and Testing
  • Assessment and Test Strategies
  • Collect Security Process Data
  • Internal and Third-Party Audits
  • Exam Tips Reprise
  • Drag and Drop

 

View Upcoming Schedule or Register for a Class

Is this the right course for you? Please contact our office at (202) 747-5000 if you have any questions.

Back to Agenda

Investment

Public Class

$2275 per student

View Schedule or Register

Why choose Softek?

  • Live, in-person training
  • Instructors with 10+ years of experience
  • Detailed training guide
  • Certificate of completion
  • Money-back guarantee