Register Now      202-747-5000

CISSP® Preparation Course

5 Days, 9:00-4:00

Course Overview

The International Information Systems Security Certification Consortium (ISC2) Certified Information Systems Security Professional (CISSP) certification is the most prestigious certification a security professional can attain. This class will provide students with the knowledge to pass the exam and provide the roadmap on how to pass on the first try. The class will provide all the concepts and terms for all eight domains of the CISSP certification. Students will understand what to study and how to study to pass the CISSP exam. Students will receive textbook, sample test questions and Softek’s unique SmartFlash® smartphone flashcard deck.

Course Outline

Monday

  • Overview
    • Introduction
    • Detailed Overview of the CISSP Exam
    • What's on the Exam and What's Not on the Exam
    • Certification Process
    • Exam Tips
  • Security and Risk Management Part I
    • The Complete and Effective Security Program
    • Security Governance
    • Confidentiality, Availability and Integrity
    • Risk Management Concepts
    • Develop and Implement Security Policy
    • Security Education, Training and Awareness
    • Threat Modeling
  • Identity and Access Management
    • Identity Management and Implementation
    • Identity as a Service (IDaaS)
    • Integrate Third-Party Service
    • Implement and Manage Authorization Mechanisms
    • Prevent or Mitigate Access Control Attacks
    • Identity and Access Provisioning

Tuesday

  • Security Engineering Part I
    • History of Cryptography
    • Cryptographic Concepts and Terms
    • The Application and Use of Cryptography
  • Security and Risk Management Part II
    • Business Continuity and Disaster Recovery
    • The Business Continuity process
    • Disaster recovery preventive measures
    • Disaster recovery technologies
    • Standby facilities
    • Backup Methodology
  • Security Engineering Part III (Physical Security)
    • Site Facility Design and Considerations
    • Site Planning
    • Design and Implement Facility Security
    • Implementation and Operation of Facilities Security

Wednesday

  • Security Engineering Part II (Computer Architecture, Security Models, Evaluation Criteria)
    • Then Engineering Lifecycle Using Security Design Principles
    • Fundamental Concepts of Security Models
    • Information Systems Security Evaluation Models
    • Security Capabilities and Information Systems
    • Vulnerabilities of Security Architectures
    • Software and System Vulnerabilities and Threats
    • Vulnerabilities of Mobile Systems
    • Vulnerabilities in Embedded Devices and Cyber-Physical Systems

Thursday

  • Communications and Network Security
    • Security Network Architecture and Design
    • Implications of Multi-Layer Protection
    • Securing Network Components
    • Secure Communications Channels
    • Network Attacks

Friday

  • Security in the Software Development Life Cycle
    • Software Development Security Outline
    • Environmental and Security Controls
    • Security of the Software Environment
    • Software Protection Mechanisms
    • Assess the Effectiveness of Software Security
    • Assess Software Acquisition Security
    • Database Security
  • Security and Risk Management Part III (Legal, Compliance and Ethics)
    • Legal Systems
    • Intellectual Property
    • Global Legal and Regulatory Issues
    • Compliance
    • Professional Ethics
    • Security Assessment and Testing
    • Assessment and Test Strategies
    • Collect Security Process Data
    • Internal and Third-Party Audits
    • Exam Tips Reprise
    • Drag and Drop

 

Cost and Delivery Format Options

Contact our office at 202-747-5000 or email registrar@softekdc.com for a price quote. Include details on how many people need training and if you want the course conducted in-person or virtually.

Why Choose Softek?

  • Live, virtual or in-person training
  • Instructors with 10+ years of experience
  • Detailed training guide
  • Certificate of completion
  • Money-back guarantee