Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. NetCom Learning
  4. CISSP - Certified Information Systems Security Professional Certification Prep

CISSP - Certified Information Systems Security Professional Certification Prep

Learn how to protect enterprise resources from cybersecurity threats. CISSP courses and training classes help you understand security principles, cryptography, network security, access control features, implementing security controls, assessing risks, and more. Experienced security professionals can take the Certified Information Systems Security Professional training.

Provider Information

More courses from this provider:
Contact Information

NetCom Learning
1460 Broadway, 8th Floor, Room 8003
New York, NY 10036

Course Overview

Overall Proficiency Level
4 - Expert
Course Prerequisites

You must have a minimum of five years of direct full-time security work experience in two or more of the 8 domains of the ISC2 CISSP CBK Or four years of direct full-time security work experience in two or more of the 8 domains.

Training Purpose
Skill Development
Specific Audience
All
General Public
Contractor
Delivery Method
Classroom
Online, Instructor-Led
Online, Self-Paced
Course Location

8th Floor
Room 8003
New York, NY 10036

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Classroom
  • Online, Instructor-Led
  • Online, Self-Paced

Learning Objectives

Apply core information technology and security fundamentals, concepts, and methods.
Align security strategy, controls, and operations with organizational business goals.
Protect assets across their full lifecycle: classification, handling, retention, and disposal.
Architect and secure OS, hardware, networks, and applications to uphold confidentiality, integrity, and availability using standards.
Use security design principles and threat modeling to select effective mitigations for common architectures.
Explain cryptography’s role and apply its services—confidentiality, integrity, authentication, non-repudiation.
Evaluate and implement physical security to support information security objectives.
Secure communications and networks with OSI-layer controls, protocols, segmentation, and monitoring.
Choose access control models and enforce physical and logical IAM mechanisms to meet business requirements.
Perform risk assessment; select and operate controls; design tests and audits; embed security throughout the SDLC.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: