Certified Information Systems Security Professional (CISSP)

Begin your prep for the (ISC)2 Certified Information Systems Security Professional certification with the NetworkCerts courses and labs. Lab provides real-world, software, hardware, and command-line interface environments and can be executed to any training, textbook or course. With this course and in-lab training, you can gain knowledge of basic principles of an effective security system and also cover exam objectives thoroughly. Interactive Lessons and TestPrep will further prepare candidates for CISSP certification exam.

Here’s what you will get

The (ISC) 2 CISSP certification is a globally acknowledged cyber-security credential. This CISSP certification is perfect for professionals who are looking to execute their expertise across different cyber security principles and practices. By obtaining this certification you will be able to design, implement, and effectively administer a cybersecurity program. This credential provides professionals with an objective to measure competency and an internationally recognized standard of achievement.

Lessons

22+ Lessons | 840+ Flashcards |420+ Quizzes | 420+ Glossary of terms

TestPrep

108+ Pre Assessment Questions |108+ Post Assessment Questions| 3+ Full Length Tests | 324+ Practice Test Questions

Hand on lab

80+ Live Lab | 33+ Video tutorials | 55+ Minutes

Benefits 

The Certified Information Systems Security Professional (CISSP) certification is a globally recognized credential for cybersecurity professionals. Achieving CISSP certification offers numerous benefits:

High Demand: CISSP certification is in high demand by employers worldwide. It demonstrates your expertise and commitment to the field of information security.

Career Advancement: CISSP can open doors to advanced cybersecurity roles such as security manager, security consultant, security architect, and even Chief Information Security Officer (CISO).

Global Recognition: CISSP is recognized internationally and respected across industries. This global recognition is valuable for professionals seeking opportunities in various regions.

Earning Potential: Certified professionals often command higher salaries than their non-certified counterparts. CISSP certification can significantly boost your earning potential in the cybersecurity field.

Comprehensive Knowledge: CISSP covers a wide range of cybersecurity domains, including security and risk management, asset security, security architecture, and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security. This comprehensive knowledge equips you to address various cybersecurity challenges.

Risk Management: CISSP emphasizes risk management principles and practices, helping professionals identify, assess, and manage security risks effectively.

Security Leadership: CISSP is often sought after for leadership roles within organizations. It equips you with the knowledge and skills needed to lead cybersecurity initiatives and teams.

Vendor-Neutrality: CISSP is vendor-neutral, meaning it is not tied to specific products or technologies. This allows you to work with a wide range of security solutions and adapt to different environments.

Continuous Learning: To maintain CISSP certification, you must earn Continuing Professional Education (CPE) credits, encouraging ongoing professional development and keeping you updated on the latest cybersecurity trends.

Networking Opportunities: CISSP certification connects you with a global community of cybersecurity professionals. Networking with peers can provide valuable insights, support, and potential career opportunities.

Cybersecurity Expertise: CISSP certification is a rigorous process that ensures you have a deep understanding of cybersecurity principles and practices, making you well-equipped to protect an organization’s digital assets.

Credibility: CISSP certification adds credibility to your resume and can make you a preferred candidate for cybersecurity positions. Employers trust CISSP-certified professionals to safeguard their information and systems.

Legal and Ethical Knowledge: CISSP covers legal and ethical aspects of cybersecurity, helping professionals navigate complex issues related to privacy, compliance, and regulations.

Reviews

Yes, it was a good review for my CISSP cert
Roger D.
It is challenging, yet thier is ambition to finalize it.
Petru F.

Here's what you will learn

1
Lessons 1: Introduction
  • Overview of the CISSP Exam
  • The Elements of This Study Guide
  • Study Guide Exam Objectives
  • Objective Map
2
Lessons 2: Security Governance Through Principles and Policies
  • Security 101
  • Understand and Apply Security Concepts
  • Security Boundaries
  • Evaluate and Apply Security Governance Principles
  • Manage the Security Function
  • Security Policy, Standards, Procedures, and Guidelines
  • Threat Modeling
  • Supply Chain Risk Management
  • Summary
  • Exam Essentials
  • Written Lab
3
Lessons 3: Personnel Security and Risk Management Concepts
  • Personnel Security Policies and Procedures
  • Understand and Apply Risk Management Concepts
  • Social Engineering
  • Establish and Maintain a Security Awareness, Education, and Training Program
  • Summary
  • Exam Essentials
  • Written Lab
4
Lessons 4: Business Continuity Planning
  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Analysis
  • Continuity Planning
  • Plan Approval and Implementation
  • Summary
  • Exam Essentials
  • Written Lab
5
Lessons 5: Laws, Regulations, and Compliance
  • Categories of Laws
  • Laws
  • State Privacy Laws
  • Compliance
  • Contracting and Procurement
  • Summary
  • Exam Essentials
  • Written Lab
6
Lessons 6: Protecting Security of Assets
  • Identifying and Classifying Information and Assets
  • Establishing Information and Asset Handling Requirements
  • Data Protection Methods
  • Understanding Data Roles
  • Using Security Baselines
  • Summary
  • Exam Essentials
  • Written Lab
7
Lessons 7: Cryptography and Symmetric Key Algorithms
  • Cryptographic Foundations
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Lifecycle
  • Summary
  • Exam Essentials
  • Written Lab
8
Lessons 8: PKI and Cryptographic Applications
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Hybrid Cryptography
  • Applied Cryptography
  • Cryptographic Attacks
  • Summary
  • Exam Essentials
  • Written Lab
9
Lessons 9: Principles of Security Models, Design, and Capabilities
  • Secure Design Principles
  • Techniques for Ensuring CIA
  • Understand the Fundamental Concepts of Security Models
  • Select Controls Based on Systems Security Requirements
  • Understand Security Capabilities of Information Systems
  • Summary
  • Exam Essentials
  • Written Lab
10
Lessons 10: Security Vulnerabilities, Threats, and Countermeasures
  • Shared Responsibility
  • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Client-Based Systems
  • Server-Based Systems
  • Industrial Control Systems
  • Distributed Systems
  • High-Performance Computing (HPC) Systems
  • Internet of Things
  • Edge and Fog Computing
  • Embedded Devices and Cyber-Physical Systems
  • Specialized Devices
  • Micro services
  • Infrastructure as Code
  • Virtualized Systems
  • Containerization
  • Server less Architecture
  • Mobile Devices
  • Essential Security Protection Mechanisms
  • Common Security Architecture Flaws and Issues
  • Summary
  • Exam Essentials
  • Written Lab
11
Lessons 11: Physical Security Requirements
  • Apply Security Principles to Site and Facility Design
  • Implement Site and Facility Security Controls
  • Implement and Manage Physical Security
  • Summary
  • Exam Essentials
  • Written Lab
12
Lessons 12: Secure Network Architecture and Components
  • OSI Model
  • TCP/IP Model
  • Analyzing Network Traffic
  • Common Application Layer Protocols
  • Transport Layer Protocols
  • Domain Name System
  • Internet Protocol (IP) Networking
  • ARP Concerns
  • Secure Communication Protocols
  • Implications of Multilayer Protocols
  • Microsegmentation
  • Wireless Networks
  • Other Communication Protocols
  • Cellular Networks
  • Content Distribution Networks (CDNs)
  • Secure Network Components
  • Summary
  • Exam Essentials
  • Written Lab
13
Lessons 13: Secure Communications and Network Attacks
  • Protocol Security Mechanisms
  • Secure Voice Communications
  • Remote Access Security Management
  • Multimedia Collaboration
  • Load Balancing
  • Manage Email Security
  • Virtual Private Network
  • Switching and Virtual LANs
  • Network Address Translation
  • Third-Party Connectivity
  • Switching Technologies
  • WAN Technologies
  • Fiber-Optic Links
  • Security Control Characteristics
  • Prevent or Mitigate Network Attacks
  • Summary
  • Exam Essentials
  • Written Lab
14
Lessons 14: Managing Identity and Authentication
  • Controlling Access to Assets
  • Managing Identification and Authentication
  • Implementing Identity Management
  • Managing the Identity and Access Provisioning Lifecycle
  • Summary
  • Exam Essentials
  • Written Lab
15
Lessons 15: Controlling and Monitoring Access
  • Comparing Access Control Models
  • Implementing Authentication Systems
  • Understanding Access Control Attacks
  • Summary
  • Exam Essentials
  • Written Lab
16
Lessons 16: Security Assessment and Testing
  • Building a Security Assessment and Testing Program
  • Performing Vulnerability Assessments
  • Testing Your Software
  • Implementing Security Management Processes
  • Summary
  • Exam Essentials
  • Written Lab
17
Lessons 17: Managing Security Operations
  • Apply Foundational Security Operations Concepts
  • Addressing Personnel Safety and Security
  • Provision Resources Securely
  • Apply Resource Protection
  • Managed Services in the Cloud
  • Perform Configuration Management (CM)
  • Managing Change
  • Managing Patches and Reducing Vulnerabilities
  • Summary
  • Exam Essentials
  • Written Lab
18
Lessons 18: Preventing and Responding to Incidents
  • Conducting Incident Management
  • Implementing Detective and Preventive Measures
  • Logging and Monitoring
  • Automating Incident Response
  • Summary
  • Exam Essentials
  • Written Lab
19
Lessons 19: Disaster Recovery Planning
  • The Nature of Disaster
  • Understand System Resilience, High Availability, and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance
  • Summary
  • Exam Essentials
  • Written Lab
20
Lessons 20: Investigations and Ethics
  • Investigations
  • Major Categories of Computer Crime
  • Ethics
  • Summary
  • Exam Essentials
  • Written Lab
21
Lessons 21: Software Development Security
  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehousing
  • Storage Threats
  • Understanding Knowledge-Based Systems
  • Summary
  • Exam Essentials
  • Written Lab
22
Lessons 22: Malicious Code and Application Attacks
  • Malware
  • Malware Prevention
  • Application Attacks
  • Injection Vulnerabilities
  • Exploiting Authorization Vulnerabilities
  • Exploiting Web Application Vulnerabilities
  • Application Security Controls
  • Secure Coding Practices
  • Summary
  • Exam Essentials
  • Written Lab
23
Hands-on LAB Activities

Security Governance Through Principles and Policies

  • Encrypting the Disk
  • Encrypting a File or Folder
  • Understanding documentation review

Personnel Security and Risk Management Concepts

  • Understanding and Applying Risk Management Concepts
  • Understanding Security Controls

Business Continuity Planning

  • Understanding Business Continuity Planning

Laws, Regulations, and Compliance

  • Understanding Laws related to IT

Protecting Security of Assets

  • Understanding Data Loss Prevention System

Cryptography and Symmetric Key Algorithms

  • Understanding Cryptographic Systems
  • Understanding Symmetric Encryption Algorithms

PKI and Cryptographic Applications

  • Observing an MD5-Generated Hash Value
  • Observing an SHA-Generated Hash Value
  • Using OpenSSL to Create a Public/Private Key Pair
  • Understanding the Diffie-Hellman Algorithm
  • Understanding the RSA Algorithm
  • Hiding Text Using Steganography
  • Understanding the Hardware Security Module

Principles of Security Models, Design, and Capabilities

  • Understanding Secure Design Principles
  • Understanding Evaluation Assurance Levels
  • Understanding Constrained Interface

Security Vulnerabilities, Threats, and Countermeasures

  • Understanding the Lifecycle of an Executed Process
  • Understanding the Internet Files Cache
  • Understanding Hypervisor
  • Understanding a Rootkit

Physical Security Requirements

  • Understanding Fire Detection Systems
  • Understanding Security Controls
  • Understanding Programmable Lock

Secure Network Architecture and Components

  • Understanding the OSI Model
  • Understanding the Application Layer Protocols
  • Configuring IPSec
  • Understanding IP Classes
  • Understanding Virtual eXtensible LAN
  • Understanding 802.11 Wireless Networking Amendments
  • Understanding LiFi and Zigbee
  • Using Windows Firewall
  • Understanding Network Topologies

Secure Communications and Network Attacks

  • Configuring a VPN
  • Understanding IPsec's Encryption of a Packet in Transport and Tunnel Modes
  • Configuring VLANs
  • Configuring Dynamic NAT
  • Configuring Static NAT
  • Understanding NAT and PAT
  • Understanding Third-Party Connectivity
  • Understanding Circuit Switching and Packet Switching

Managing Identity and Authentication

  • Restricting Local Accounts

Controlling and Monitoring Access

  • Assigning Permissions to Folders
  • Examining Kerberos Settings
  • Performing Spoofing
  • Simulating an Eavesdropping Attack Using Wireshark
  • Using Rainbow Tables

Security Assessment and Testing

  • Configuring Audit Group Policy
  • Using nmap for Scanning
  • Conducting Vulnerability Scanning Using Nessus
  • Exploiting Windows 7 Using Metasploit
  • Scanning Ports Using Metasploit
  • Understanding Penetration Testing
  • Understanding Penetration Tests
  • Understanding the Fagan Inspections
  • Understanding Training and Awareness Program

Managing Security Operations

  • Understanding Security Operations
  • Understanding Privileged Account Management
  • Understanding Cloud Shared Responsibility Model

Preventing and Responding to Incidents

  • Performing DoS Attack with SYN Flood
  • Enabling Intrusion Prevention and Detection
  • Understanding Honeypots and Honeynets
  • Understanding Security Information and Event Management

Disaster Recovery Planning

  • Configuring RAID 5
  • Taking Incremental Backup
  • Taking a Full Backup

Investigations and Ethics

  • Completing the Chain of Custody
  • Understanding Organizational Code of Ethics

Software Development Security

  • Understanding Software Development Lifecycle
  • Understanding Software Capability Maturity Model
  • Understanding ACID Model
  • Understanding a Neural Network

Malicious Code and Application Attacks

  • Causing a DarkComet Trojan Infection
  • Understanding Antimalware Software
  • Exploiting a Website Using SQL Injection
  • Conducting a Cross-Site Request Forgery Attack

Attacking a Website Using XSS Injection

Be the first to add a review.

Please, login to leave a review
Get course
Enrolled: 0 students
Lectures: 23
Level: Intermediate

Office Hours

Monday 9:00 am - 6.00 pm
Tuesday 9:00 am - 6.00 pm
Wednesday 9:00 am - 6.00 pm
Thursday 9:00 am - 6.00 pm
Friday 9:00 am - 6.00 pm
Saturday 10:00 am - 6.00 pm
Sunday 10:00 am - 6.00 pm