Discover Classes. Earn Rewards.

CISSP Certification is unfortunately unavailable

Thankfully we have 2 other CISSP Classes for you to choose from. Check our top choices below or see all classes for more options.

Certified Information Systems Security Professional

Technical Institute of America @ Virtual Classroom

Become a cybersecurity expert with the nation's leading provider of CISSP certification training. Join thousands of successful students and unlock exclusive resources and networking opportunities with an (ISC)² membership. Prove your skills, advance your career, and earn the salary you deserve with the Technical Institute of America.

(632) All levels 18 and older
$1,499

10 sessions

Gift it!

Certified Info Systems Security Professional CISSP

Computer Training Source, Inc. @ Online Classroom

Master the eight CISSP domains and gain the skills and knowledge needed to thrive in the information system security field with this premier certification course from Computer Training Source, Inc.

(21) All levels 18 and older
$3,995

10 sessions

Gift it!
See all CISSP classes Online

CISSP Certification

  • All levels
  • 16 and older
  • $1,499
  • Live, online training
  • 32 hours over 4 sessions

Start Dates (0)

  • $1,499
  • Live, online training
  • 32 hours over 4 sessions
  • Early bird price is until November 19. $1899
Showing 10 of 0

Class Description

Description

What you'll learn in this cissp training:

CISSP training helps participants gain in-depth knowledge about computer security and access control systems. This training program covers a wide range of topics that will help participants in their preparation for the CISSP certification exam. By attending CISSP training, participants will gain expertise in CISSP architecture. 

On course completion, they will gain the knowledge required for designing, building, and maintaining a secure business environment essential for an organization. The CISSP certification is globally recognized and it is respected by most of the companies across the globe. In the CISSP training program, the participant will gain a good working knowledge of information security, cryptography, and security management practices.

Course Objectives
The CISSP certification course helps you in
  • High impact, proven training – Over 15,000 professionals globally have participated in our training programs
  • Helps you in developing a comprehensive security program
  • Helps you in your professional and career growth
Salient Features
  • High impact, proven training – Over 15,000 professionals globally have participated in our training programs
  • Experienced, expert instructors – Our Instructors come with a rich, 10+ years’ industry experience
  • We have different training methodologies that help participants learn better
Course Outline

Module 1: Course Introduction
  • Introduction to the course
Module 2: The CISSP Exam
  • Introduction
  • CISSP Certification Goals
  • Security Professional Certification Value
  • Exam Common Body of Knowledge
  • Becoming a CISSP
Module 3: Cryptography
  • Introduction
  • Cryptography Concepts Part1
  • Cryptography Concepts Part2
  • History of Cryptography
  • Cryptosystem Features
  • Encryption Systems Part1
  • Encryption Systems Part2
  • Substitution Ciphers
  • Symmetric Algorithms Part1
  • Symmetric Algorithms Part2
  • Asymmetric Algorithms
  • Message Integrity
  • Digital Signatures
  • Public Key Infrastructure Part1
  • Public Key Infrastructure Part2
  • Trusted Platform Module
  • Encryption Communication Levels
  • E-Mail Security
  • Internet Security
  • Cryptography Attacks
Module 4: Physical (Environmental) Security
  • Introduction
  • Threat Mitigation Techniques
  • Geographical-Man Made and Political Threats
  • Site and Facility Design
  • Perimeter Security
  • Building and Internal Security
  • Secure Data Centers and Fire Detection Systems
  • Types of Power Issues
  • HVAC Guidelines
  • Equipment Security and Personal Security
Module 5: Security Architecture and Design
  • Introduction
  • Security Model Concepts
  • System Architecture
  • Computing Platforms
  • Virtual Computing and Security Services
  • System Components
  • Memory Concepts
  • Enforcing Process Security and Multitasking
  • System Security Architecture
  • Security Models and Modes Part1
  • Security Models and Modes Part2
  • System Evaluation and Assurance Levels
  • Certification and Accreditation
  • Security Architecture Threats
  • Database Security and Distributed Systems Security
Module 6: Access Control
  • Introduction
  • Access Control Concepts
  • Identification and Authentication
  • Password Types and Management
  • Ownership-Character-Physiological-Behavioral Factors
  • Biometric Considerations
  • Authorization Concepts Part1
  • Authorization Concepts Part2
  • User Accountability
  • Vulnerability Assessment
  • Penetration Testing and Threat Modeling
  • Access Control Categories-Types-Models and Administration
  • Provisioning Life Cycle and Access Control Monitoring
  • Access Control Threats
Module 7: Software Development Security
  • Introduction
  • System Development Life Cycle
  • Software Testing and Validation
  • Software Development Security Best Practices
  • Software Development Methods
  • Programming Languages
  • Database Architecture and Models
  • Database Interface Languages
  • Data Warehouse-Mining and Threats
  • Database and Application Access Control
  • Monitoring for Problems
  • Software Threats and Security
Module 8: Information Security Governance and Risk Management
  • Introduction
  • Principles and Terms
  • Security Frameworks & Methodologies Part1
  • Security Frameworks & Methodologies Part2
  • Risk Assessment
  • Asset Values-Vulnerabilities and Threats
  • Quantitative Risk Analysis
  • Safeguard Selection
  • Risk Management
  • Security Governance Components
  • Security Policies
  • Classification Life Cycle
  • Responsibilities and Roles
  • Personnel Security
  • Security Awareness Training
Module 9: Telecommunications and Network Security
  • Introduction
  • OSI and TCP/IP Models Part1
  • OSI and TCP/IP Models Part2
  • IP Addressing
  • Transmission Methods
  • Types of Cabling
  • Network Topologies
  • Network Protocols and Services
  • Network Routing and Devices
  • Network Connection Types Part1
  • Network Connection Types Part2
  • Network Authentication
  • Wireless Technologies
  • WLAN Security Methods
  • Network Threats and Cabling Behaviors
Module 10: Operation Security
  • Introduction
  • Operation Security Concepts
  • Protecting Tangible and Intangible Assets
  • Asset and Media Management
  • Storage Options
  • Network and Resource Management
  • Incident Response and Change Management
  • Patch Management-Audit and Review
  • Threats and Preventative Measures
  • Trusted Paths-Trusted Recovery and System Hardening
  • Monitoring and Reporting
Module 11: Business Continuity and Disaster Recovery
  • Introduction
  • Business Continuity and Disaster Recovery Concepts Part1
  • Business Continuity and Disaster Recovery Concepts Part2
  • BIA Development
  • Business Continuity Planning
  • Preventive Controls
  • Recovery Strategies Part1
  • Recovery Strategies Part2
  • Data Backup Types
  • Data Recovery Terms
  • Critical Teams and Duties
  • BCP Testing
Module 12: Legal, Regulations and Investigations and Compliance
  • Introduction
  • Digital Crime
  • Computer Crime Concepts
  • Major Legal Systems
  • Intellectual Property Law
  • Privacy Part1
  • Privacy Part2
  • Liability
  • Incident Response
  • Forensic and Digital Investigations Part1
  • Forensic and Digital Investigations Part2
  • Evidence Part1
  • Evidence Part2
  • Security Professional Ethics
  • Course Outro

Remote Learning

This course is available for "remote" learning and will be available to anyone with access to an internet device with a microphone (this includes most models of computers, tablets). Classes will take place with a "Live" instructor at the date/times listed below.

Upon registration, the instructor will send along additional information about how to log-on and participate in the class.

Refund Policy

  • If a delegate cancels a session, no refund will be made.
  • If a delegate wishes to reschedule his/her session, a rescheduling fee of $250 will be charged.
  • No refunds will be made on examination services’ registration fees.

The school reserves the right to reschedule/cancel an event, or change the location of an event. In case the school cancels an event, refund less a 5% non-refundable registration fee will be paid to the delegate. Alternatively, the delegate can also choose a different session at no additional cost.

In any event where a customer wants to cancel their enrollment and is eligible for a full refund, a 5% processing fee will be deducted from the refund amount.

Reviews of Classes at GreyCampus (1)

Similar Classes

Benefits of Booking Through CourseHorse

  • Booking is safe. When you book with us your details are protected by a secure connection.
  • Lowest price guaranteed. Classes on CourseHorse are never marked up.
  • This class will earn you 14990 points. Points give you money off your next class!

Questions & Answers (0)

Get quick answers from CourseHorse and past students.

GreyCampus

GreyCampus transforms careers through skills and certification training. We are a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management and Quality Management. We offer live-online (instructor-led online), classroom (instructor-led...

Read more about GreyCampus

CourseHorse Approved

This school has been carefully vetted by CourseHorse and is a verified Online educator.

GreyCampus

Give This Course as a Gift Card

  • Thousands of classes
  • No expiration
  • Unique and memorable gifts for any occasion
  • Personalized
  • Explore a passion, gain a new skill, discover a new hobby, engage in a memorable experience
  • Instant delivery
  • Lock in a price with the Inflation Buster Gift Card Price Adjuster™

Buy a Gift Card

Book this Class as a Group Event

Booking this class for a group? Find great private group events

Or see all Professional Group Events

Explore group events and team building activities ranging from cooking, art, escape rooms, trivia, and more.

CourseHorse Gift Cards

  • Creative & unique gift for any occasion
  • Thousands of classes & experiences
  • No expiration date
  • Instant e-delivery (or choose a date)
  • Add a personalized message
  • Lock in a price with the Inflation Buster Gift Card Price Adjuster™
Buy a Gift Card
gift card with the CourseHorse logo gift card with the CourseHorse logo
Loading...