Learn: in:
» back to Search Results

Course rating of 0 Vendor rating of 4

The (ISC)� CISSP CBK� Review Seminar is more than just the best way to refresh & review your knowledge base for the CISSP certification exam. It�s also the best way to maintain your access to the latest news regarding information system security iss

Course Outline
The intended audience is professionals requiring comprehensive knowledge of security and wishing to prepare for CISSP certification.

Sitting for the CISSP® exam? The (ISC)² CISSP CBK® Review Seminar is more than just the best way to refresh and review your knowledge base for the CISSP certification exam. It's also the best way to maintain your access to the latest news regarding information system security issues, concerns, and countermeasures. This is not test preparation. This is your best bet for making sure you're properly prepared to take on the challenges inherent in a world of constantly evolving information.

At (ISC)², we don't just meet today's standard for information security. We create it.
The CISSP CBK Review Seminar is prepared by CISSP credential holders and conducted by only (ISC)² Authorized Instructors, each of whom is up-to-date on the latest information security-related developments and is an expert in the CISSP CBK.

The comprehensive (ISC)² CISSP CBK Review Seminar covers these domains:
  • Access Control
  • Application Development Security
  • Business Continuity and Disaster Recovery Planning
  • Cryptography
  • Information Security Governance and Risk Management
  • Legal, Regulations, Investigation and Compliance
  • Operations Security
  • Physical (Environmental) Security
  • Security Architecture and Design
  • Telecommunications and Network Security
Conquering the Ten Domains of the (ISC)2 CBK® The Official (ISC)2® CISSP® CBK® Review Seminar is the most comprehensive, complete review of information systems security concepts and industry best practices, and the only review course endorsed by (ISC)2. Review Seminars are held worldwide and conducted by (ISC)2-authorized instructors, each of whom is up-to-date on the latest information security-related developments and is an expert in the specific domains.

The Official (ISC)2 CISSP CBK Review Seminar offers a high-level review of the main topics and identifies areas that students need to study and includes:
• Post-Seminar Self-Assessment
• 100% up-to-date material
• Contributions from CISSPs, (ISC)2 Authorized Instructors and subject matter experts
• An overview of the scope of the information security field Official (ISC)2 CBK Review Seminars are available throughout the world at (ISC)2 facilities and through (ISC)2 Authorized Education Affiliates. Each official class is taught by an authorized (ISC)2 instructor to ensure the highest quality education. If your study time is limited, our online education offerings are available for your convenience.

The course material, covering the ten CISSP domains of the CBK, is redesigned and updated for every review seminar to reflect the latest information system security issues, concerns, and countermeasures. The following domains are covered in the seminar modules:
• Access Control - a collection of mechanisms that work together to create a security architecture to protect the assets of the information system.

• Application Development Security - addresses the important security concepts that apply to application software development. It outlines the environment where software is designed and developed and explains the critical role software plays in providing information system  security.

• Business Continuity and Disaster Recovery Planning – for the preservation and recovery of business operations in the event of outages.

• Cryptography - the principles, means, and methods of disguising information to ensure its integrity, confidentiality and authenticity.

• Information Security Governance and Risk

Management - the identification of an organization's information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines. Management tools such as data classification and risk assessment/analysis are used to identify threats, classify assets, and to rate system vulnerabilities so that effective controls can be implemented.

• Legal, Regulations, Investigations and Compliance

• Computer crime laws and regulations

• The measures and technologies used to investigate computer crime incidents

• Operations Security - used to identify the controls over hardware, media, and the operators and administrators with access privileges to any of these resources. Audit and monitoring are the mechanisms, tools, and facilities that permit the identification of security events and subsequent actions to identify the key elements and report the pertinent information to the appropriate individual, group, or process.

• Physical (Environmental) Security - provides protection techniques for the entire facility, from the outside perimeter to the inside office space, including all of the information system resources.

• Security Architecture and Design - contains the concepts, principles, structures, and  standards used to design, monitor, and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of availability, integrity, and confidentiality.

• Telecommunications and Network Security

• Network structures

• Transmission methods

• Transport formats

• Security measures used to provide availability, integrity, and confidentiality

• Authentication for transmissions over private and public communications networks and media There are several organizations that teach (ISC)2® review courses that make unauthorized claims of higher than average test scores and inflated pass rates. A candidate should be cautious since test scores or pass rates are never revealed. Be sure you are taking an Official (ISC)2 CISSP® CBK® Review Seminar from an authorized provider.

How to Certify? To become a CISSP®, a candidate must successfully complete two separate processes: Examination and Certification. The eligibility requirements to sit for the CISSP examination are completely separate from the eligibility requirements necessary to be certified.

Examination To sit for the CISSP examination, a candidate must:
  • Submit the examination
  • Assert that he or she possesses a minimum of four years of professional experience in the information security field or three years plus a college degree. Additionally, a Master's Degree in Information Security from a National
  • Center of Excellence can substitute for one year toward the four-year requirement.  If you don't have this experience see below to learn about the Associate CISSP.
  • Complete the Candidate Agreement, attesting to the truth of his or her assertions regarding professional experience and legally commit to adhere to the CISSP Code of Ethics.
  • Successfully answer four questions regarding criminal history and related background.
Certification To be issued a certificate, a candidate must:
  • Pass the CISSP exam with a scaled score of 700 points or greater.
  • Submit a properly completed and executed Endorsement Form.
  • Successfully pass an audit of their assertions regarding professional experience, if the candidate is selected for audit.
Associate CISSP
You don't have to wait until you've spent years in the field to demonstrate your competence in information security. Become an Associate of (ISC)² and earn recognition from employers and peers for the industry knowledge you've already gained.

Participation Requirements
Associate of (ISC)² status is available to those who have gained competence in key areas of industry knowledge and information security concepts and can pass the CISSP® or examination, but lack the years of practical work experience required for full accreditation. Associates of (ISC)² must also subscribe to the (ISC)² Code of Ethics and maintain their status in good standing with (ISC)².

Candidates who do not meet the CISSP® professional experience requirements may become Associates of (ISC)². To become an Associate of (ISC)², you will need to complete and submit the examination form and successfully pass either exam.
After taking the CISSP examination, you will receive an email from (ISC)² indicating whether you have passed the exam. Upon successfully passing the exam, you become an Associate of (ISC)². The (ISC)² Associate for CISSP designation is valid for a period of five (5) years from the date the "pass" email is issued; the (ISC)² Associate has a maximum of five (5) years to obtain the required experience and submit the required endorsement form for certification as a CISSP.

Once you have achieved the professional experience requirements for CISSP certification, you must notify (ISC)² Services to convert your status from Associate of (ISC)² to CISSP status.

Other Resources For more information visit - CISSP Certification

Delegates must agree with the following clause to attend training.

“I understand that the material and content of the CBK Review Seminar are proprietary to (ISC)² and protected by appropriate intellectual property laws.  (ISC)² has incurred great expense to develop, produce, and present the material and content of the CBK Review Seminar.  The material and contents may not be copied, transferred, exchanged, sold, disclosed, or otherwise disseminated to anyone outside the seminar, and may only be used by me for personal study. Any breach of this license will be grounds for revocation of the certification designation, if awarded, and appropriate legal action.”
Prerequisites & Certificates

Certificates offered

Cancellation Policy
Cancellations less than 2 business weeks before the expected delivery date are eligible for a 50% refund, or a credit voucher will be provided for regularly scheduled courses (choice being that of the registrant). Credit Vouchers are transferable within the same company. Please send your cancellation notice to info@itplanit.com.
Map & Reviews
Itplanit Services Corp.
[ View Provider's Profile ]


This course has not yet been rated by one of our members.

If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities.

Here are some reviews of the training vendor.
This course was very, very interesting due to the instructor. He was simple, gave good examples and made a few jokes. Also, being only 5 participants was a bonus for us as we were able to share our experiences in a timely manner.
Reviewed by 2016
I think there is too much material to cover in one session. It's a lot of information to absorb all at once.
Reviewed by 2013
The only thing I would add...if you know you don't have many participants, hands on practice would be great. I would like to have had more time applying what i learned in a diagram. Once I got back to my office...i didn't know how to move a shape and associated text together. I also would like to know where I can see all the shapes offered by visio instead of searching for the shape and not knowing what to call it?
Reviewed by 2013
The instructor was excellent. I was pleasantly surprised by how interesting she made a potentially dry subject appear. Non-stop, great snacks provided all day from ham/egg bagels for breakfast, muffins, Valentines chocolate, chips, popcorn, gumball machine, coffee, juices etc etc. Perfect location for me as it was 2 blocks from my office.
Reviewed by 2013
I had no problem with the instructor's technigues, methods or delivery of the course material. He made what was otherwise fairly dry material as interesting as he possible and augmented it with practical examples that the class could relate to. The training facility and staff were also comendable, however what can't be overlooked is the IT infrastructure. During the exam the problems with latency were so bad that it affected my ability to concentrate on the material. Prior to the exam I completed 2 practice exams on paper in 35 & 37 minutes respectively. Doing the exam online it took over 1.5 hrs because it would take between 30 & 60 sec to refresh the page and show the next question. At times when I attempted to go back and review quesgtions I had marked I found my original answer wasn't recorded & I'd have to answer the question a second time. By the end of 70 min I was so digruntled I couldn't wait to finish regardless of the end result. It may not seem fair to evaluate the favility in this manner, but as a student the outcome is the ultimate measurement of a training favility.
Reviewed by 2013
A very interesting course. Claude Gerin, our instructor, was excellent in making this a very interesting and learning experience. THANKS!
Reviewed by 2012

This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team.

This page has been viewed 380 times.