Aimed at security professionals, this course surveys the entire information security landscape and the technologies involved. The course addresses the eight knowledge domains that comprise the common body of knowledge (CBK) for information systems security professionals and will help delegates prepare for CISSP certification.
The course offers a theory based approach to the security process, with opportunities to discuss the immediate application of concepts and techniques described in the CBK to the real world. It can be considered as providing a good introduction to security management, architecture and engineering.
The course comprises of eight sessions that map directly to the (CBK), each one is theory based with instructor led discussions; there are no hands on labs.
If you plan to build a career in information security CISSP is the gold standard certification to attain.
- The course can run in two formats, the standard public event or as a boot camp. The boot camp allows the customer to specify longer working hours which allows a deeper and more detailed discussion of the technologies involved.
- A public event would typically run 9.30 till 5 pm.
- Boot camps can run 9 am to 5.30 pm or 9 am to 8 pm, depending on your preference.
- A boot camp also traditionally finishes with a test prep exam, which takes place after lunch on the last day. This allows the delegates to approach the topics covered in a question and answer format, and then discuss their answers with the trainer and class.
Delegates should have experience in at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant industry or degree level certifications) to achieve full certification. Associate status can be achieved without the full 4/5 years experience; full certification will be assigned when the correct amount of experience is obtained.
- We recommend delegates have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
- QA will provide a CISSP guide book as pre-reading. It is expected that delegates review the guide and gain an appreciation of the key concepts in each of the eight CISSP domains in advance of the course. However, we do not expect delegates to be familiar with all the details of the guide book in advance of the course itself.
We recommend that work completed in the classroom is complemented by extra reading to ensure success in the exam. The amount of extra reading required will depend on the amount of experience the delegate has. The 'mile wide, inch deep' description indicates the challenge to most delegates, not all will have 'hands on' experience spanning all 8 domains of the CBK.
A reduction in the number of domains, from ten to eight, was introduced in April 2015. A revised and updated content to include the most current and best practice topics for today's security landscape.
From 15 April, 2015 the CISSP domains changed (find the current domains here):
- Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
- Asset Security (Protecting Security of Assets)
- Security Engineering (Engineering and Management of Security)
- Communications and Network Security (Designing and Protecting Network Security)
- Identity and Access Management (Controlling Access and Managing Identity)
- Security Assessment and Testing (Designing, Performing, and Analysing Security Testing)
- Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
- Software Development Security (Understanding, Applying, and Enforcing Software Security)
Download the CISSP 8 Domain Guide
- Q. How does the refresh affect the CISSP prerequisites?
- A. The prerequisites will not change. You will still be required to possess a minimum of five years of cumulative paid full-time work experience in two out of the eight domains.
- Q. I already hold the CISSP - how will these changes affect my CPE submissions?
- A. Starting April 15, 2015 all CISSPs will be required to submit their continuing professional education credits in accordance with the refreshed CISSP domains.
- Q. Will the new domains affect the number of exam questions, or duration of the exam?
- A. No - your CISSP exam will still have the same number of questions and the time you are allotted will not be affected.
- Q. Will there be new training materials for the CISSP?
- A. The content within the training materials will be updated to align with the new CISSP domains.
- Q. Where can I find more information?
- A. Use these links to ISC2's official FAQ or the ISC2 blog post for more information regarding the CISSP domain refresh.
Course Outline:Module 1. Security and Risk Management
Module 2. Asset Security
- Understand and apply concepts of confidentiality, integrity and availability
- Apply security governance principles
- Understand legal and regulatory issues that pertain to information security in a global context
- Understand professional ethics
- Develop and implement documented security policy, standards, procedures, and guidelines
- Understand business continuity requirements
- Contribute to personnel security policies
- Understand and apply risk management concepts
- Understand and apply threat modelling
- Integrate security risk considerations into acquisition strategy and practice
- Establish and manage information security education, training, and awareness
Module 3. Security Engineering
- Classify information and supporting assets
- Determine and maintain ownership
- Protect privacy
- Ensure appropriate retention
- Determine data security controls
- Establish handling requirements
Module 4. Communication & Network Security
- Implement and manage engineering processes using secure design principles
- Understand the fundamental concepts of security models
- Select controls and countermeasures based upon systems security evaluation models
- Understand security capabilities of information systems
- Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
- Assess and mitigate the vulnerabilities in web-based systems
- Assess and mitigate vulnerabilities in mobile systems
- Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems
- Apply cryptography
- Apply secure principles to site and facility design
- Design and implement physical security
Module 5. Identity & Access Management
- Apply secure design principles to network architecture
- Secure network components
- Design and establish secure communication channels
- Prevent or mitigate network attacks
Module 6. Security Assessment & Testing
- Control physical and logical access to assets
- Manage identification and authentication of people and devices
- Integrate identity as a service
- Integrate third-party identity services
- Implement and manage authorization mechanisms
- Prevent or mitigate access control attacks
- Manage the identity and access provisioning lifecycle
Module 7. Security Operations
- Design and validate assessment and test strategies
- Conduct security control testing
- Collect security process data
- Analyse and report test outputs
- Understand the vulnerabilities of security architectures
Module 8. Software Security Development
- Understand and support investigations
- Understand requirements for investigation types
- Conduct logging and monitoring activities
- Secure the provisioning of resources
- Understand and apply foundational security operations concepts
- Employ resource protection techniques
- Conduct incident management
- Operate and maintain preventative measures
- Understand and apply security in the software development lifecycle
- Enforce security controls in development environments
- Assess the effectiveness of software security
- Assess security impact of acquired software
CISSP and CBK are registered certification marks of (ISC)2, Inc.