- Certified Information System Security Professional (CISSP)
- (ISC)�® CISSP CBK® Review Seminars
The (ISC)� CISSP CBK� Review Seminar is more than just the best way to refresh & review your knowledge base for the CISSP certification exam. It�s also the best way to maintain your access to the latest news regarding information system security iss
- Course Outline
The intended audience is professionals requiring comprehensive knowledge of security and wishing to prepare for CISSP certification.
Sitting for the CISSP® exam? The (ISC)² CISSP CBK® Review Seminar is more than just the best way to refresh and review your knowledge base for the CISSP certification exam. It's also the best way to maintain your access to the latest news regarding information system security issues, concerns, and countermeasures. This is not test preparation. This is your best bet for making sure you're properly prepared to take on the challenges inherent in a world of constantly evolving information.
At (ISC)², we don't just meet today's standard for information security. We create it.
The CISSP CBK Review Seminar is prepared by CISSP credential holders and conducted by only (ISC)² Authorized Instructors, each of whom is up-to-date on the latest information security-related developments and is an expert in the CISSP CBK.
The comprehensive (ISC)² CISSP CBK Review Seminar covers these domains:
- Access Control
- Application Development Security
- Business Continuity and Disaster Recovery Planning
- Information Security Governance and Risk Management
- Legal, Regulations, Investigation and Compliance
- Operations Security
- Physical (Environmental) Security
- Security Architecture and Design
- Telecommunications and Network Security
The Official (ISC)2 CISSP CBK Review Seminar offers a high-level review of the main topics and identifies areas that students need to study and includes:
• Post-Seminar Self-Assessment
• 100% up-to-date material
• Contributions from CISSPs, (ISC)2 Authorized Instructors and subject matter experts
• An overview of the scope of the information security field Official (ISC)2 CBK Review Seminars are available throughout the world at (ISC)2 facilities and through (ISC)2 Authorized Education Affiliates. Each official class is taught by an authorized (ISC)2 instructor to ensure the highest quality education. If your study time is limited, our online education offerings are available for your convenience.
The course material, covering the ten CISSP domains of the CBK, is redesigned and updated for every review seminar to reflect the latest information system security issues, concerns, and countermeasures. The following domains are covered in the seminar modules:
• Access Control - a collection of mechanisms that work together to create a security architecture to protect the assets of the information system.
• Application Development Security - addresses the important security concepts that apply to application software development. It outlines the environment where software is designed and developed and explains the critical role software plays in providing information system security.
• Business Continuity and Disaster Recovery Planning – for the preservation and recovery of business operations in the event of outages.
• Cryptography - the principles, means, and methods of disguising information to ensure its integrity, confidentiality and authenticity.
• Information Security Governance and Risk
Management - the identification of an organization's information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines. Management tools such as data classification and risk assessment/analysis are used to identify threats, classify assets, and to rate system vulnerabilities so that effective controls can be implemented.
• Legal, Regulations, Investigations and Compliance
• Computer crime laws and regulations
• The measures and technologies used to investigate computer crime incidents
• Operations Security - used to identify the controls over hardware, media, and the operators and administrators with access privileges to any of these resources. Audit and monitoring are the mechanisms, tools, and facilities that permit the identification of security events and subsequent actions to identify the key elements and report the pertinent information to the appropriate individual, group, or process.
• Physical (Environmental) Security - provides protection techniques for the entire facility, from the outside perimeter to the inside office space, including all of the information system resources.
• Security Architecture and Design - contains the concepts, principles, structures, and standards used to design, monitor, and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of availability, integrity, and confidentiality.
• Telecommunications and Network Security
• Network structures
• Transmission methods
• Transport formats
• Security measures used to provide availability, integrity, and confidentiality
• Authentication for transmissions over private and public communications networks and media There are several organizations that teach (ISC)2® review courses that make unauthorized claims of higher than average test scores and inflated pass rates. A candidate should be cautious since test scores or pass rates are never revealed. Be sure you are taking an Official (ISC)2 CISSP® CBK® Review Seminar from an authorized provider.
How to Certify? To become a CISSP®, a candidate must successfully complete two separate processes: Examination and Certification. The eligibility requirements to sit for the CISSP examination are completely separate from the eligibility requirements necessary to be certified.
Examination To sit for the CISSP examination, a candidate must:
- Submit the examination
- Assert that he or she possesses a minimum of four years of professional experience in the information security field or three years plus a college degree. Additionally, a Master's Degree in Information Security from a National
- Center of Excellence can substitute for one year toward the four-year requirement. If you don't have this experience see below to learn about the Associate CISSP.
- Complete the Candidate Agreement, attesting to the truth of his or her assertions regarding professional experience and legally commit to adhere to the CISSP Code of Ethics.
- Successfully answer four questions regarding criminal history and related background.
- Pass the CISSP exam with a scaled score of 700 points or greater.
- Submit a properly completed and executed Endorsement Form.
- Successfully pass an audit of their assertions regarding professional experience, if the candidate is selected for audit.
You don't have to wait until you've spent years in the field to demonstrate your competence in information security. Become an Associate of (ISC)² and earn recognition from employers and peers for the industry knowledge you've already gained.
Associate of (ISC)² status is available to those who have gained competence in key areas of industry knowledge and information security concepts and can pass the CISSP® or examination, but lack the years of practical work experience required for full accreditation. Associates of (ISC)² must also subscribe to the (ISC)² Code of Ethics and maintain their status in good standing with (ISC)².
Candidates who do not meet the CISSP® professional experience requirements may become Associates of (ISC)². To become an Associate of (ISC)², you will need to complete and submit the examination form and successfully pass either exam.
After taking the CISSP examination, you will receive an email from (ISC)² indicating whether you have passed the exam. Upon successfully passing the exam, you become an Associate of (ISC)². The (ISC)² Associate for CISSP designation is valid for a period of five (5) years from the date the "pass" email is issued; the (ISC)² Associate has a maximum of five (5) years to obtain the required experience and submit the required endorsement form for certification as a CISSP.
Once you have achieved the professional experience requirements for CISSP certification, you must notify (ISC)² Services to convert your status from Associate of (ISC)² to CISSP status.
Other Resources For more information visit - CISSP Certification
Delegates must agree with the following clause to attend training.
“I understand that the material and content of the CBK Review Seminar are proprietary to (ISC)² and protected by appropriate intellectual property laws. (ISC)² has incurred great expense to develop, produce, and present the material and content of the CBK Review Seminar. The material and contents may not be copied, transferred, exchanged, sold, disclosed, or otherwise disseminated to anyone outside the seminar, and may only be used by me for personal study. Any breach of this license will be grounds for revocation of the certification designation, if awarded, and appropriate legal action.”
- Prerequisites & Certificates
- Cancellation Policy
Cancellations less than 2 business weeks before the expected delivery date are eligible for a 50% refund, or a credit voucher will be provided for regularly scheduled courses (choice being that of the registrant). Credit Vouchers are transferable within the same company. Please send your cancellation notice to firstname.lastname@example.org.
- Map & Reviews
Itplanit Services Corp.
[ View Provider's Profile ]
ReviewsHere are some reviews of the training vendor.
This course has not yet been rated by one of our members.
If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities.
This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team.
This page has been viewed 352 times.