UMBC Training Centers logo

Certified Information Systems Security Professional (CISSP) Preparation

 

Course Description | Outline | Information Security Training | IT Training

Course Outline

Lesson 1: Information Systems Access Control
Topic 1A: Data Access Principles
Topic 1B: System Access and Authentication
Topic 1C: Penetration Tests

Lesson 2: Security Architecture and Design
Topic 2A: Security Models
Topic 2B: Security Modes
Topic 2C: System Assurance

Lesson 3: Network and Telecommunications Security
Topic 3A: Data Network Design
Topic 3B: Remote Data Access
Topic 3C: Data Network Security
Topic 3D: Data Network Management

Lesson 4: Information Security Management Goals
Topic 4A: Organizational Security
Topic 4B: The Application of Security Concepts

Lesson 5: Information Security Classification and Program Development
Topic 5A: Information Classification
Topic 5B: Security Program Development

Lesson 6: Risk Management and Ethics
Topic 6A: Risk Management
Topic 6B: Ethics

Lesson 7: Application Security
Topic 7A: Software Configuration Management
Topic 7B: Software Controls
Topic 7C: Database System Security

Lesson 8: Cryptography
Topic 8A: Ciphers and Cryptography
Topic 8B: Symmetric-Key Cryptography
Topic 8C: Asymmetric-Key Cryptography
Topic 8D: Hashing and Message Digests
Topic 8E: Email, Internet, and Wireless Security
Topic 8F: Cryptographic Weaknesses

Lesson 9: Physical Security
Topic 9A: Physical Access Control
Topic 9B: Physical Access Monitoring
Topic 9C: Physical Security Methods
Topic 9D: Facilities Security

Lesson 10: Operations Security
Topic 10A: Operations Security Control
Topic 10B: Operations Security Auditing and Monitoring
Topic 10C: Operational Threats and Violations

Lesson 11: Business Continuity and Disaster Recovery Planning
Topic 11A: Business Continuity Plan Fundamentals
Topic 11B: Business Continuity Plan Implementation
Topic 11C: Disaster Recovery Plan Fundamentals
Topic 11D: Disaster Recovery Plan Implementation

Lesson 12: Legal, Regulations, Compliance, and Investigations
Topic 12A: Computer Crime Laws and Regulations
Topic 12B: Computer Crime Incident Response