Skip to product information
1 of 1

MindEdge

CISSP ® Exam Prep Course

CISSP ® Exam Prep Course

Regular price $2,799 USD
Regular price Sale price $2,799 USD
Sale Sold out
  • Fully-funded by tuition assistance programs for active duty airmen - Follow the link to start the funding process.

CISSP, but make it simple! Dive deep into exam essentials, strategies, and success stories. Like a coach for cyber champs, we’ve got your back. Study, strategize, succeed!

Course Duration:40 hours

Credits:
CEU Credits: 0
AMA PCM CEU Credits:
PDU Credits: 0
HRCI Credits: 0
SHRM Credits: 0
CFRE Credits: 0
ATD CI Credits:
ACE Credits: 0


Course Description

The CISSP ® Exam Prep Course prepares test-takers for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP ® certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024. As security breaches outpace the available pool of security experts, the need for information security professionals with proper certifications will continue to grow. Among other titles, obtaining the CISSP ® certification prepares one for a position as a Security Analyst, Chief Information Security Officer, or as a Security Architect. Learning Outcomes Discuss the foundational concepts of information security, such as the CIA triad Know the different information security frameworks Explain information security training and education Discuss the information life cycle Explain how information and data are classified Learn about data and information privacy Understand system and computer architecture Explain and compare symmetric and asymmetric cryptography Learn about physical security risks and mitigation Compare different types of networks Contrast the OSI model with the TCP/IP Model Identify and differentiate among network, routing, and data link protocols Describe the functions of common networking devices and how wireless networks work Evaluate different identification methods and technologies Assess and test various security controls Describe business continuity and disaster recovery plans Understand the role of security operations Identify trusted recovery techniques Relate the steps required in effective incident management Discuss the role of auditing, monitoring, and detection in information security Learn the steps of a digital forensics investigation Explain the software development life cycle Discuss the role of databases in information security Recognize several software-based and network attacks

Testimonials

David S.

Overall, an excellent, comprehensive, well-constructed, and user-friendly course structure.

Nathan M.

Great course. I really like the length of each page...there was just enough content to read in one sitting. The quizzes were very good also.

 

View full details

Course Description

Included Courses

Testimonials