Course Catalog
CISSP Certification Prep Course
Code: GK CISSP
Duration: 5 Day
$2995 USD

OVERVIEW

This 2022 updated course is the most comprehensive review of information security concepts and industry best practices, focusing on the eight domains of the CISSP-CBK (Common Body of Knowledge) that are covered in the CISSP exam. You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

In addition to a textbook, you will receive practice test questions with complete answer explanations and flashcards to help you prepare for certification.

 

DELIVERY FORMAT

This course is available in the following formats:

Virtual Classroom

Duration: 5 Day
Classroom

Duration: 5 Day

CLASS SCHEDULE

Delivery Format: Virtual Classroom
Date: Apr 01 2024 - Apr 05 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Apr 08 2024 - Apr 12 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Apr 29 2024 - May 03 2024 | 11:00 - 20:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: May 13 2024 - May 17 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: May 06 2024 - May 10 2024 | 11:00 - 20:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: May 20 2024 - May 24 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Jun 03 2024 - Jun 07 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Jun 10 2024 - Jun 14 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Jun 24 2024 - Jun 28 2024 | 11:00 - 20:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Jul 08 2024 - Jul 12 2024 | 11:00 - 20:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Jul 15 2024 - Jul 19 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Jul 22 2024 - Jul 26 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Aug 12 2024 - Aug 16 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Aug 19 2024 - Aug 23 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Aug 26 2024 - Aug 30 2024 | 11:00 - 20:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Sep 09 2024 - Sep 13 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Sep 16 2024 - Sep 20 2024 | 11:00 - 20:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Oct 07 2024 - Oct 11 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Oct 21 2024 - Oct 25 2024 | 08:00 - 17:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Oct 28 2024 - Nov 01 2024 | 11:00 - 20:30 EDT
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Nov 11 2024 - Nov 15 2024 | 11:00 - 20:30 EST
Location: Online
Course Length: 5 Day

$ 2995

Delivery Format: Virtual Classroom
Date: Nov 18 2024 - Nov 22 2024 | 08:00 - 17:30 EST
Location: Online
Course Length: 5 Day

$ 2995

GOALS

This course provides in-depth coverage of the eight domains required to pass the CISSP exam:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

 

The CISSP exam is challenging, but the benefits are immense. Due to its comprehensive breadth, CISSP is the de facto certification to show competence in cyber roles. It’s also one of the top-paying certifications in IT.

This course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.

Global Knowledge is independent of and not affiliated with (ISC)2.

OUTLINE

1: Security Governance Through Principles and Policies

  • Security 101
  • Understand and Apply Security Concepts
  • Security Boundaries
  • Evaluate and Apply Security Governance Principles
  • Manage the Security Function
  • Security Policy, Standards, Procedures, and Guidelines
  • Threat Modeling
  • Supply Chain Risk Management

2: Personnel Security and Risk Management Concepts

  • Personnel Security Policies and Procedures
  • Understand and Apply Risk Management Concepts
  • Social Engineering
  • Establish and Maintain a Security Awareness, Education, and Training Program

3: Business Continuity Planning

  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Analysis
  • Continuity Planning
  • Plan Approval and Implementation

4: Laws, Regulations, and Compliance

  • Categories of Laws
  • Laws
  • State Privacy Laws
  • Compliance
  • Contracting and Procurement

5: Protecting Security of Assets

  • Identifying and Classifying Information and Assets
  • Establishing Information and Asset Handling Requirements
  • Data Protection Methods
  • Understanding Data Roles
  • Using Security Baselines

6: Cryptography and Symmetric Key Algorithms

  • Cryptographic Foundations
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Lifecycle

7: PKI and Cryptographic Applications

  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Hybrid Cryptography
  • Applied Cryptography
  • Cryptographic Attacks

8: Principles of Security Models, Design, and Capabilities

  • Secure Design Principles
  • Techniques for Ensuring CIA
  • Understand the Fundamental Concepts of Security Models
  • Select Controls Based on Systems Security Requirements
  • Understand Security Capabilities of Information Systems

9: Security Vulnerabilities, Threats, and Countermeasures

  • Shared Responsibility
  • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Client-Based Systems
  • Server-Based Systems
  • Industrial Control Systems
  • Distributed Systems
  • High-Performance Computing (HPC) Systems
  • Internet of Things
  • Edge and Fog Computing
  • Embedded Devices and Cyber-Physical Systems
  • Specialized Devices
  • Microservices
  • Infrastructure as Code
  • Virtualized Systems
  • Containerization
  • Serverless Architecture
  • Mobile Devices
  • Essential Security Protection Mechanisms
  • Common Security Architecture Flaws and Issues

10: Physical Security Requirements

  • Apply Security Principles to Site and Facility Design
  • Implement Site and Facility Security Controls
  • Implement and Manage Physical Security

11: Secure Network Architecture and Components

  • OSI Model
  • TCP/IP Model
  • Analyzing Network Traffic
  • Common Application Layer Protocols
  • Transport Layer Protocols
  • Domain Name System
  • Internet Protocol (IP) Networking
  • ARP Concerns
  • Secure Communication Protocols
  • Implications of Multilayer Protocols
  • Microsegmentation
  • Wireless Networks
  • Other Communication Protocols
  • Cellular Networks
  • Content Distribution Networks (CDNs)
  • Secure Network Components

12: Secure Communications and Network Attacks

  • Protocol Security Mechanisms
  • Secure Voice Communications
  • Remote Access Security Management
  • Multimedia Collaboration
  • Load Balancing
  • Manage Email Security
  • Virtual Private Network
  • Switching and Virtual LANs
  • Network Address Translation
  • Third-Party Connectivity
  • Switching Technologies
  • WAN Technologies
  • Fiber-Optic Links
  • Security Control Characteristics
  • Prevent or Mitigate Network Attacks

13: Managing Identity and Authentication

  • Controlling Access to Assets
  • Managing Identification and Authentication
  • Implementing Identity Management
  • Managing the Identity and Access Provisioning Lifecycle

14: Controlling and Monitoring Access

  • Comparing Access Control Models
  • Implementing Authentication Systems
  • Understanding Access Control Attacks

15: Security Assessment and Testing

  • Building a Security Assessment and Testing Program
  • Performing Vulnerability Assessments
  • Testing Your Software
  • Implementing Security Management Processes

16: Managing Security Operations

  • Apply Foundational Security Operations Concepts
  • Addressing Personnel Safety and Security
  • Provision Resources Securely
  • Apply Resource Protection
  • Managed Services in the Cloud
  • Perform Configuration Management (CM)
  • Managing Change
  • Managing Patches and Reducing Vulnerabilities

17: Preventing and Responding to Incidents

  • Conducting Incident Management
  • Implementing Detective and Preventive Measures
  • Logging and Monitoring
  • Automating Incident Response

18: Disaster Recovery Planning

  • The Nature of Disaster
  • Understand System Resilience, High Availability, and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance

19: Investigations and Ethics

  • Investigations
  • Major Categories of Computer Crime
  • Ethics

20: Software Development Security

  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehousing
  • Storage Threats
  • Understanding Knowledge-Based Systems

21: Malicious Code and Application Attacks

  • Malware
  • Malware Prevention
  • Application Attacks
  • Injection Vulnerabilities
  • Exploiting Authorization Vulnerabilities
  • Exploiting Web Application Vulnerabilities
  • Application Security Controls
  • Secure Coding Practices

1: Security Governance Through Principles and Policies

  • Security 101
  • Understand and Apply Security Concepts
  • Security Boundaries
  • Evaluate and Apply Security Governance Principles
  • Manage the Security Function
  • Security Policy, Standards, Procedures, and Guidelines
  • Threat Modeling
  • Supply Chain Risk Management

2: Personnel Security and Risk Management Concepts

  • Personnel Security Policies and Procedures
  • Understand and Apply Risk Management Concepts
  • Social Engineering
  • Establish and Maintain a Security Awareness, Education, and Training Program

3: Business Continuity Planning

  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Analysis
  • Continuity Planning
  • Plan Approval and Implementation

4: Laws, Regulations, and Compliance

  • Categories of Laws
  • Laws
  • State Privacy Laws
  • Compliance
  • Contracting and Procurement

5: Protecting Security of Assets

  • Identifying and Classifying Information and Assets
  • Establishing Information and Asset Handling Requirements
  • Data Protection Methods
  • Understanding Data Roles
  • Using Security Baselines

6: Cryptography and Symmetric Key Algorithms

  • Cryptographic Foundations
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Lifecycle

7: PKI and Cryptographic Applications

  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Hybrid Cryptography
  • Applied Cryptography
  • Cryptographic Attacks

8: Principles of Security Models, Design, and Capabilities

  • Secure Design Principles
  • Techniques for Ensuring CIA
  • Understand the Fundamental Concepts of Security Models
  • Select Controls Based on Systems Security Requirements
  • Understand Security Capabilities of Information Systems

9: Security Vulnerabilities, Threats, and Countermeasures

  • Shared Responsibility
  • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Client-Based Systems
  • Server-Based Systems
  • Industrial Control Systems
  • Distributed Systems
  • High-Performance Computing (HPC) Systems
  • Internet of Things
  • Edge and Fog Computing
  • Embedded Devices and Cyber-Physical Systems
  • Specialized Devices
  • Microservices
  • Infrastructure as Code
  • Virtualized Systems
  • Containerization
  • Serverless Architecture
  • Mobile Devices
  • Essential Security Protection Mechanisms
  • Common Security Architecture Flaws and Issues

10: Physical Security Requirements

  • Apply Security Principles to Site and Facility Design
  • Implement Site and Facility Security Controls
  • Implement and Manage Physical Security

11: Secure Network Architecture and Components

  • OSI Model
  • TCP/IP Model
  • Analyzing Network Traffic
  • Common Application Layer Protocols
  • Transport Layer Protocols
  • Domain Name System
  • Internet Protocol (IP) Networking
  • ARP Concerns
  • Secure Communication Protocols
  • Implications of Multilayer Protocols
  • Microsegmentation
  • Wireless Networks
  • Other Communication Protocols
  • Cellular Networks
  • Content Distribution Networks (CDNs)
  • Secure Network Components

12: Secure Communications and Network Attacks

  • Protocol Security Mechanisms
  • Secure Voice Communications
  • Remote Access Security Management
  • Multimedia Collaboration
  • Load Balancing
  • Manage Email Security
  • Virtual Private Network
  • Switching and Virtual LANs
  • Network Address Translation
  • Third-Party Connectivity
  • Switching Technologies
  • WAN Technologies
  • Fiber-Optic Links
  • Security Control Characteristics
  • Prevent or Mitigate Network Attacks

13: Managing Identity and Authentication

  • Controlling Access to Assets
  • Managing Identification and Authentication
  • Implementing Identity Management
  • Managing the Identity and Access Provisioning Lifecycle

14: Controlling and Monitoring Access

  • Comparing Access Control Models
  • Implementing Authentication Systems
  • Understanding Access Control Attacks

15: Security Assessment and Testing

  • Building a Security Assessment and Testing Program
  • Performing Vulnerability Assessments
  • Testing Your Software
  • Implementing Security Management Processes

16: Managing Security Operations

  • Apply Foundational Security Operations Concepts
  • Addressing Personnel Safety and Security
  • Provision Resources Securely
  • Apply Resource Protection
  • Managed Services in the Cloud
  • Perform Configuration Management (CM)
  • Managing Change
  • Managing Patches and Reducing Vulnerabilities

17: Preventing and Responding to Incidents

  • Conducting Incident Management
  • Implementing Detective and Preventive Measures
  • Logging and Monitoring
  • Automating Incident Response

18: Disaster Recovery Planning

  • The Nature of Disaster
  • Understand System Resilience, High Availability, and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance

19: Investigations and Ethics

  • Investigations
  • Major Categories of Computer Crime
  • Ethics

20: Software Development Security

  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehousing
  • Storage Threats
  • Understanding Knowledge-Based Systems

21: Malicious Code and Application Attacks

  • Malware
  • Malware Prevention
  • Application Attacks
  • Injection Vulnerabilities
  • Exploiting Authorization Vulnerabilities
  • Exploiting Web Application Vulnerabilities
  • Application Security Controls
  • Secure Coding Practices
LABS

Will Be Updated Soon!
Will Be Updated Soon!
WHO SHOULD ATTEND
  • Anyone whose position requires CISSP certification
  • Individuals who want to advance within their current computer security careers or migrate to a related career
PREREQUISITES

None