CISSP® (Certified Information Systems Security Professional) Exam Release Date: May 1, 2021

Paths

Advanced

CISSP® (Certified Information Systems Security Professional) Exam Release Date: May 1, 2021

Author: Kevin Henry

This series can be used to prepare for the (ISC)²® CISSP® (Certified Information Systems Security Professional) examination, with coverage of all 8 domains on the CISSP®... Read more

##What You Will Learn:

  • Evaluate and apply security governance principles, risk management concepts, and threat modeling concepts and methodologies
  • Develop, document, and implement security policy, standards, procedures, and guidelines
  • Identify and classify information and assets
  • Manage data lifecycle
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Select and determine cryptographic solutions
  • Assess and implement secure design principles in network architectures
  • Manage identification and authentication of people, devices, and services
  • Complete security control testing
  • Complete logging and monitoring activities
  • Operate and maintain detective and preventive measures
  • Complete incident management
  • Understand and integrate security in the Software Development Life Cycle (SDLC)
  • Review the certification and provide exam tips

Pre-requisites

(ISC)²® requires CISSP® candidates to have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP® Common Body of Knowledge (CBK). Earning a four year college degree or regional equivalent or an additional credential from the (ISC)2 approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience.

A candidate who doesn’t have the required experience to become a CISSP® may become an Associate of (ISC)2 by successfully passing the CISSP® examination. The Associate of (ISC)2® will then have six years to earn the five years required experience. You can learn more about CISSP® experience requirements and how to account for part-time work and internships at www.isc2.org/Certifications/CISSP/experience-requirements.

CISSP® (Certified Information Systems Security Professional)

This series can be used to prepare for the (ISC)²® CISSP® (Certified Information Systems Security Professional) examination, with coverage of all 8 domains on the CISSP® Certification Exam Outline effective May 1, 2021. This series provides the foundational knowledge needed to effectively design, engineer, manage, and lead the security posture of an organization.

Security and Risk Management: Concepts and Principles for CISSP®

by Kevin Henry

Mar 31, 2021 / 4h 16m

4h 16m

Start Course
Description

Information security programs are based on a foundation of risk management. It is essential to be familiar with the concepts of risk management. In this course, Security and Risk Management: Concepts and Principles for CISSP®, you’ll learn to build a core understanding of risk and security. First, you’ll explore information security governance and regulations. Next, you’ll discover information security principles. Finally, you’ll learn how to perform risk management and threat modelling. When you’re finished with this course, you’ll have the skills and knowledge of information security needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Foundational Information Security Concepts
  3. Foundational Information Security Concepts Continued
  4. Security Governance Principles
  5. Information Security Legal and Regulatory Issues
  6. Legal and Investigation Types
  7. Risk and Threat Modeling
  8. Risk Management
  9. Risk Treatment/Response
  10. Supply Chain Risk Management

Security and Risk Management: Policies and Procedures for CISSP®


by Kevin Henry

Mar 31, 2021 / 1h 30m

1h 30m

Start Course
Description

To prepare for the CISSP examination, you should understand the elements of an information security management program. In this course, Security and Risk Management: Policies and Procedures for the CISSP®, you’ll learn to build and manage an information security program. First, you’ll explore the field of ethics and personnel security. Next, you’ll discover the value of policies and procedures. Finally, you’ll learn how to create an effective security awareness program. When you’re finished with this course, you’ll have the skills and knowledge of information security management needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Security Policies, Standards, Procedures, and Guidelines
  3. Business Continuity (BC) Requirements
  4. Personnel Security Policies and Procedures
  5. Professional Ethics
  6. Compliance
  7. Security Awareness, Education, and Training
  8. Domain Summary

Asset Security for CISSP®


by Kevin Henry

Mar 31, 2021 / 1h 41m

1h 41m

Start Course
Description

Assets must be protected according to their value and legal requirements. It is essential to be familiar with the concepts covered in this course. In this course, Asset Security for CISSP®
, you’ll learn to identify and protect the assets of the organization. First, you’ll explore the identification and classification of assets. Next, you’ll discover the data management lifecycle. Finally, you’ll explore how to protect assets appropriately. When you’re finished with this course, you’ll have the skills and knowledge of asset management needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Information and Asset Classification
  3. Asset Protection
  4. The Data Lifecycle
  5. Data Protection
  6. Domain Summary

Security Architecture and Engineering: Understand the Design Principles for CISSP®


by Kevin Henry

Mar 31, 2021 / 2h 15m

2h 15m

Start Course
Description

Information Security Architecture designs systems to meet current and future business needs, so the architect must understand business and strategy. In this course, Security Architecture and Engineering: Understand the Design Principles for CISSP®, you’ll learn to design core security controls into information systems. First, you’ll explore the security models. Next, you’ll discover the design of systems based on secure components. Finally, you’ll learn how to review the security of architectural plans. When you’re finished with this course, you’ll have the skills and knowledge of Security Architecture needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Secure System Design Principles
  3. Security Models
  4. Select System Controls
  5. Memory Security
  6. Assessment of Traditional Security Architectures
  7. Assessment of Non-traditional Security Architectures
  8. Assessment of Cloud Security Architectures
  9. Assessment of Cloud Implementations

Security Architecture and Engineering: Build Defenses for CISSP®


by Kevin Henry

Mar 31, 2021 / 1h 53m

1h 53m

Start Course
Description

Designing secure systems requires the effective use of controls such as cryptography and physical security. In this course, Security Architecture and Engineering: Build Defenses for the CISSP®, you’ll learn to design and implement secure architectural solutions to combat threats to data, information systems, networks, and facilities. First, you’ll explore the various types of cryptographic algorithms. Next, you’ll discover the challenges of implementing cryptographic solutions and averting attacks. Finally, you’ll learn how to design secure physical control. When you’re finished with this course, you’ll have the skills and knowledge of Security Architecture and Engineering needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Cryptographic Solutions
  3. Using Cryptography
  4. Cryptanalytic Attacks
  5. Physical and Environmental Security
  6. Infrastructure Security
  7. Domain Summary

Communication and Network Security for CISSP®


by Kevin Henry

Mar 31, 2021 / 1h 53m

1h 53m

Start Course
Description

Networks are the foundation for many business processes. In this course, Communication and Network Security for CISSP®, you'll get familiar with secure network management concepts. First, you'll learn about network models and protocols. Next, you'll discover network architecture. Finally, you'll explore network components. By the end of this course, you’ll understand the principles of designing secure networks to support organizational goals and requirements.

Table of contents
  1. Course Overview
  2. Secure Networking Models
  3. Secure Network Design
  4. Secure Network Components
  5. Secure Communications
  6. Domain Summary

Identity and Access Management (IAM) for CISSP®


by Kevin Henry

Mar 31, 2021 / 1h 49m

1h 49m

Start Course
Description

This course will help you understand the principles of one of the most important areas of information security – the management of access to the assets of the organization – and assist you in preparing for the CISSP® examination. In this course, Identity and Access Management for the CISSP®, you’ll learn to design and manage an identity access program. First, you’ll explore identification and authentication. Next, you’ll discover authorization. Finally, you’ll learn how to establish accountability. When you’re finished with this course, you’ll have the skills and knowledge of Identity and Access Management needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Physical and Logical Access Controls
  3. Identification and Authentication
  4. Authorization and Access Permissions
  5. Single Sign-on
  6. Identity Management Lifecycle
  7. Domain Summary

Security Assessment and Testing for CISSP®


by Kevin Henry

Mar 31, 2021 / 2h 14m

2h 14m

Start Course
Description

This course will help you understand the principles of testing the effectiveness of the many types of security controls – and assist you in preparing for the CISSP® examination. In this course, Security Assessment and Testing for the CISSP®, you’ll learn to test security controls and provide assessment of control effectiveness. First, you’ll explore creation of a test strategy. Next, you’ll discover test plans and methods. Finally, you’ll learn how to provide assessment on the adequacy of security controls to mitigate risk. When you’re finished with this course, you’ll have the skills and knowledge of security assessment and testing needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Test Strategy and Plans
  3. Executing Tests
  4. Testing Application Security
  5. Control Effectiveness Management
  6. Audit and Resolution of Issues
  7. Domain Summary

Coming Soon

Security Operations: Provision, Baseline and Monitor for CISSP®


Coming Soon

by Kevin Henry

Coming Soon

Security Operations: Respond for CISSP®


Coming Soon

by Kevin Henry

Coming Soon

Software Development Security for CISSP®


Coming Soon

by Kevin Henry

Coming Soon

Exam Review and Tips for CISSP®


Coming Soon

by Kevin Henry