Certified Information Systems Security Professional
To provide a high-level review of the main topics covered in the Common Body of Knowledge (CBK), related to all aspects of information systems security.
• To help students prepare for the CISSP certification exam.
• To provide an overview of the scope of the field.
All information security professionals who wish to master the world’s best practices and validate a broad understanding of management and technical competency in information security.
- Access Control
A collection of mechanisms that work together to create security architecture to protect the assets of the information system
- Telecommunications and Network Security
The network structures, transmission methods, transport formats and security measures used to provide availability, integrity and confidentiality
- Information Security Governance and Risk Management
The identification of an organization’s information assets & the development, documentation & implementation of policies, standards, procedures & guidelines.
- Software Development Security
The principles, means and methods of disguising information to ensure its integrity, confidentiality and authenticity
- Security Architecture and Design
The concepts, principles, structures and standards used to design, monitor and secure operating systems, equipment, networks, applications and controls.
- Operations Security
The methods used to identify the controls over hardware, media, and the operators and administrators with access privileges to any of these resources.
- Business Continuity and Disaster Recovery Planning
The preservation and recovery of business operations in the event of outages.
- Legal, Regulations, Investigations and Compliance
Computer crime laws and regulations; the measures and technologies used to investigate computer crime incidents.
- Physical (Environmental) Security
Protection techniques for the entire facility, from perimeter to office space, including all information system resources.