CISSP® (Certified Information Systems Security Professional) Exam Release Date: May 1, 2021

Paths

CISSP® (Certified Information Systems Security Professional) Exam Release Date: May 1, 2021

Author: Kevin Henry

This series can be used to prepare for the (ISC)²® CISSP® (Certified Information Systems Security Professional) examination, with coverage of all 8 domains on the CISSP®... Read more

##What You Will Learn:

  • Evaluate and apply security governance principles, risk management concepts, and threat modeling concepts and methodologies
  • Develop, document, and implement security policy, standards, procedures, and guidelines
  • Identify and classify information and assets
  • Manage data lifecycle
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Select and determine cryptographic solutions
  • Assess and implement secure design principles in network architectures
  • Manage identification and authentication of people, devices, and services
  • Complete security control testing
  • Complete logging and monitoring activities
  • Operate and maintain detective and preventive measures
  • Complete incident management
  • Understand and integrate security in the Software Development Life Cycle (SDLC)
  • Review the certification and provide exam tips

Pre-requisites

(ISC)²® requires CISSP® candidates to have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP® Common Body of Knowledge (CBK). Earning a four year college degree or regional equivalent or an additional credential from the (ISC)2 approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience.

A candidate who doesn’t have the required experience to become a CISSP® may become an Associate of (ISC)2 by successfully passing the CISSP® examination. The Associate of (ISC)2® will then have six years to earn the five years required experience. You can learn more about CISSP® experience requirements and how to account for part-time work and internships at www.isc2.org/Certifications/CISSP/experience-requirements.

CISSP® (Certified Information Systems Security Professional)

This series can be used to prepare for the (ISC)²® CISSP® (Certified Information Systems Security Professional) examination, with coverage of all 8 domains on the CISSP® Certification Exam Outline effective May 1, 2021. This series provides the foundational knowledge needed to effectively design, engineer, manage, and lead the security posture of an organization.

Security and Risk Management: Concepts and Principles for CISSP®

by Kevin Henry

Mar 31, 2021 / 4h 16m

4h 16m

Start Course
Description

Information security programs are based on a foundation of risk management. It is essential to be familiar with the concepts of risk management. In this course, Security and Risk Management: Concepts and Principles for CISSP®, you’ll learn to build a core understanding of risk and security. First, you’ll explore information security governance and regulations. Next, you’ll discover information security principles. Finally, you’ll learn how to perform risk management and threat modelling. When you’re finished with this course, you’ll have the skills and knowledge of information security needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Foundational Information Security Concepts
  3. Foundational Information Security Concepts Continued
  4. Security Governance Principles
  5. Information Security Legal and Regulatory Issues
  6. Legal and Investigation Types
  7. Risk and Threat Modeling
  8. Risk Management
  9. Risk Treatment/Response
  10. Supply Chain Risk Management

Security and Risk Management: Policies and Procedures for CISSP®

by Kevin Henry

Mar 31, 2021 / 1h 30m

1h 30m

Start Course
Description

To prepare for the CISSP examination, you should understand the elements of an information security management program. In this course, Security and Risk Management: Policies and Procedures for the CISSP®, you’ll learn to build and manage an information security program. First, you’ll explore the field of ethics and personnel security. Next, you’ll discover the value of policies and procedures. Finally, you’ll learn how to create an effective security awareness program. When you’re finished with this course, you’ll have the skills and knowledge of information security management needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Security Policies, Standards, Procedures, and Guidelines
  3. Business Continuity (BC) Requirements
  4. Personnel Security Policies and Procedures
  5. Professional Ethics
  6. Compliance
  7. Security Awareness, Education, and Training
  8. Domain Summary

Asset Security for CISSP®

by Kevin Henry

Mar 31, 2021 / 1h 41m

1h 41m

Start Course
Description

Assets must be protected according to their value and legal requirements. It is essential to be familiar with the concepts covered in this course. In this course, Asset Security for CISSP®, you’ll learn to identify and protect the assets of the organization. First, you’ll explore the identification and classification of assets. Next, you’ll discover the data management lifecycle. Finally, you’ll explore how to protect assets appropriately. When you’re finished with this course, you’ll have the skills and knowledge of asset management needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Information and Asset Classification
  3. Asset Protection
  4. The Data Lifecycle
  5. Data Protection
  6. Domain Summary

Security Architecture and Engineering: Understand the Design Principles for CISSP®

by Kevin Henry

Mar 31, 2021 / 2h 15m

2h 15m

Start Course
Description

Information Security Architecture designs systems to meet current and future business needs, so the architect must understand business and strategy. In this course, Security Architecture and Engineering: Understand the Design Principles for CISSP®, you’ll learn to design core security controls into information systems. First, you’ll explore the security models. Next, you’ll discover the design of systems based on secure components. Finally, you’ll learn how to review the security of architectural plans. When you’re finished with this course, you’ll have the skills and knowledge of Security Architecture needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Secure System Design Principles
  3. Security Models
  4. Select System Controls
  5. Memory Security
  6. Assessment of Traditional Security Architectures
  7. Assessment of Non-traditional Security Architectures
  8. Assessment of Cloud Security Architectures
  9. Assessment of Cloud Implementations

Security Architecture and Engineering: Build Defenses for CISSP®

by Kevin Henry

Mar 31, 2021 / 1h 53m

1h 53m

Start Course
Description

Designing secure systems requires the effective use of controls such as cryptography and physical security. In this course, Security Architecture and Engineering: Build Defenses for the CISSP®, you’ll learn to design and implement secure architectural solutions to combat threats to data, information systems, networks, and facilities. First, you’ll explore the various types of cryptographic algorithms. Next, you’ll discover the challenges of implementing cryptographic solutions and averting attacks. Finally, you’ll learn how to design secure physical control. When you’re finished with this course, you’ll have the skills and knowledge of Security Architecture and Engineering needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Cryptographic Solutions
  3. Using Cryptography
  4. Cryptanalytic Attacks
  5. Physical and Environmental Security
  6. Infrastructure Security
  7. Domain Summary

Communication and Network Security for CISSP®

by Kevin Henry

Mar 31, 2021 / 1h 53m

1h 53m

Start Course
Description

Networks are the foundation for many business processes. In this course, Communication and Network Security for CISSP®, you'll get familiar with secure network management concepts. First, you'll learn about network models and protocols. Next, you'll discover network architecture. Finally, you'll explore network components. By the end of this course, you’ll understand the principles of designing secure networks to support organizational goals and requirements.

Table of contents
  1. Course Overview
  2. Secure Networking Models
  3. Secure Network Design
  4. Secure Network Components
  5. Secure Communications
  6. Domain Summary

Identity and Access Management (IAM) for CISSP®

by Kevin Henry

Mar 31, 2021 / 1h 49m

1h 49m

Start Course
Description

This course will help you understand the principles of one of the most important areas of information security – the management of access to the assets of the organization – and assist you in preparing for the CISSP® examination. In this course, Identity and Access Management for the CISSP®, you’ll learn to design and manage an identity access program. First, you’ll explore identification and authentication. Next, you’ll discover authorization. Finally, you’ll learn how to establish accountability. When you’re finished with this course, you’ll have the skills and knowledge of Identity and Access Management needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Physical and Logical Access Controls
  3. Identification and Authentication
  4. Authorization and Access Permissions
  5. Single Sign-on
  6. Identity Management Lifecycle
  7. Domain Summary

Security Assessment and Testing for CISSP®

by Kevin Henry

Mar 31, 2021 / 2h 14m

2h 14m

Start Course
Description

This course will help you understand the principles of testing the effectiveness of the many types of security controls – and assist you in preparing for the CISSP® examination. In this course, Security Assessment and Testing for the CISSP®, you’ll learn to test security controls and provide assessment of control effectiveness. First, you’ll explore creation of a test strategy. Next, you’ll discover test plans and methods. Finally, you’ll learn how to provide assessment on the adequacy of security controls to mitigate risk. When you’re finished with this course, you’ll have the skills and knowledge of security assessment and testing needed for the CISSP® examination.

Table of contents
  1. Course Overview
  2. Test Strategy and Plans
  3. Executing Tests
  4. Testing Application Security
  5. Control Effectiveness Management
  6. Audit and Resolution of Issues
  7. Domain Summary

Security Operations: Provision, Baseline, and Monitor for CISSP®

by Kevin Henry

May 7, 2021 / 1h 47m

1h 47m

Start Course
Description

As an information security professional, skills in effective incident response and control monitoring will serve you well. In this course, Security Operations: Provision, Baseline and Monitor for CISSP®, you’ll learn to manage and lead an information security program. First, you’ll explore monitoring of security controls and networks. Next, you’ll discover change control and configuration management. Finally, you’ll learn how to monitor third-party relationships. When you’re finished with this course, you’ll have the skills and knowledge of security operations needed for the CISSP examination.

Table of contents
  1. Course Overview
  2. Security Operations Management
  3. Network Operations Management
  4. Security Monitoring
  5. Configuration Management

Security Operations: Respond for CISSP®

by Kevin Henry

May 7, 2021 / 2h 16m

2h 16m

Start Course
Description

Business continuity and disaster recovery both come with their own special set of security hurdles. In this course, Security Operations: Respond for CISSP®. you’ll learn to manage and mitigate incidents. First, you’ll explore incident response planning and execution. Next, you’ll discover investigations and evidence. Finally, you’ll learn how to support business continuity and disaster recovery planning and testing. When you’re finished with this course, you’ll have the skills and knowledge of responding to Security Incidents needed for the CISSP®.

Table of contents
  1. Course Overview
  2. Incident Management
  3. Managing Investigations
  4. Continuity of Operations
  5. Security in Disaster Recovery Plans
  6. Domain Summary

Software Development Security for CISSP®

by Kevin Henry

May 7, 2021 / 2h 44m

2h 44m

Start Course
Description

Secure software development practices are essential in today's high-stakes world. In this course, Software Development Security, you’ll learn to design and implement security features into software including applications, application program interfaces, operating systems, and databases. First, you’ll explore the integration of security into the software development lifecycle. Next, you’ll discover the development of secure software development practices. Finally, you’ll learn how to assess the security of software. When you’re finished with this course, you’ll have the skills and knowledge of secure software development needed for the CISSP examination

Table of contents
  1. Course Overview
  2. Integrating Security into the Software Lifecycle
  3. Secure Software Development
  4. Software Security Assessment
  5. Security of Third-party Software
  6. Domain Summary

Exam Review and Tips for CISSP®

by Kevin Henry

May 7, 2021 / 33m

33m

Start Course
Description

Preparing for the CISSP is an intimidating task. In this course, Exam Review and Tips for CISSP®, you’ll learn to improve your ability to pass the CISSP examination. First, you’ll explore the exam layout and domain weightings. Next, you’ll discover how to prepare a study plan. Finally, you’ll learn how to leverage sample questions to help you prepare and review your knowledge. When you’re finished with this course, you’ll have the skills and knowledge of an Information Security Professional needed for the CISSP examination.

Table of contents
  1. Course Overview
  2. Becoming and Maintaining the CISSP®
  3. CISSP® Examination Layout

Knowledge is power

A Professional or Enterprise Pluralsight account is required to access Kaplan®* practice exams. Sign in below or sign up for a free team trial.