Certified Information Systems Security Professional (CISSP)

Training Architect
course instructor image
Ermin Kreponic
A skilled Java and C++ developer, a security researcher and an individual with an affinity for problem solving and diving head first into the unknown. Independent and highly motivated individual, requiring minimal supervision, with a good perception of time in regard to project timetable. A strong proponent of open-source technologies and passionate Linux user with a great deal of experience in dealing with code deployment and overall system administration (DevOps). On the personal side note, as part of my previous experiences I have worked with all sorts of people from different time zones, and in the process I have come to regard the need to sleep as a sort of an urban myth. Cold cup of coffee from the night before over time became my best friend. But I have no regrets, because I do what I love doing.

Course Introduction

Getting Started

Security and Risk Management

Security Governance

Laws, Regulations, and Ethics

Asset Security

Data and Asset Security

Security Architecture and Engineering

Cryptography

Security Models and Design

Threats and Attacks

Communication and Network Security

Network Architecture

Network Traffic

Identity and Access Management

Identity and Authentication

Security Assessments and Testing

Security Assessments

Security Operations

Disaster Prevention, Response, and Recovery

Security in Software Development

Software Development Security Principles

Course Conclusion

Final Steps

Details

Welcome to the Certified Information Systems Security Professional (CISSP) certification course! To obtain the CISSP certification, candidates need to pass an exam that consists of mostly multiple choice questions. The purpose of this course is to prepare you for the certification exam by introducing you to the concepts and terminology you need to know to pass. This course is designed to provide you with extensive knowledge, learning strategies, and instructor support along the way. In addition to the exam, you must meet a few other requirements in order to become a Certified Information Systems Security Professional. You must demonstrate that you follow the CISSP Code of Ethics, have a minimum of five years’ full-time paid work experience in the systems security field, and hold an IS or IT degree. With that in mind, before enrolling in this course, be sure that this is the right course for you. This course is designed for people who want to become certified security professionals and are looking for jobs that require the CISSP certification. Sometimes companies also require their systems security employees to obtain this certification. The prerequisites for this course are basic knowledge in networking and some knowledge of systems operations. Throughout this course, you will learn about the basics of asset security, cryptography, security and risk management, and various threats and attacks. This is a theoretical course — not a practical one — and we will cover many regulations, laws, policies, standards, and encryption protocols. With the flash cards, interactive diagrams, video lessons, and instructor support included with this course, you should be equipped with everything you need to successfully pass the exam and earn your CISSP certification.


Download the interactive diagram here: https://interactive.linuxacademy.com/diagrams/CISSPStudyBook.html


Study Guides

Interactive Diagram

https://interactive.linuxacademy.com/diagrams/CISSPStudyBook.html

Instructor Deck

Community

certificate ribbon icon

Earn a Certificate of Completion

When you complete this course, you’ll receive a certificate of completion as proof of your accomplishment.

Looking For Team Training?

Learn More