The Certified Information Systems Security Professional (CISSP) is an internationally recognized certification for information security professionals. Offered by the International Information Systems Security Certification Consortium, (ISC)2, the CISSP certification is both an objective measure of excellence and a globally recognized standard of achievement.
CISSPs are information assurance professionals who are responsible for defining the architecture, design, management and controls that ensure the security of an organization. CISSPs are authorities on critical security topics that include risk management, cloud computing, mobile security, application development security, and more.
The CISSP has clearly emerged as the key certification for security professionals. Corporations are demanding experienced information security professionals with the certifications to prove it to protect their information and assets.
Prerequisites: Significant IT security experience and prior certification such as CCNA, CCNP, MCSE or SCNP are recommended. (ICS)2 requires exam candidates to have a minimum of five years of relevant work experience in two or more of the ten security domains, four years of work experience with an applicable college degree, or a credential from the (ISC)2-approved list.
Candidates must have a minimum of five years of work experience in two or more of the eight domains indicated in the CISSP Common Body of Knowledge® (CBK):
1. Security and Risk Management
2. Asset Security
3. Security Engineering
4. Communications and Network Security
5. Identity and Access Management
6. Security Assessment and Testing
7. Security Operations
8. Software Development Security
Our course is a comprehensive review of information security concepts and industry best practices, and covers the eight domains listed above. You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity. You will learn how to determine who or what may have altered data or system information, potentially affecting the integrity of those asset and match an entity, such as a person or a computer system, with the actions that entity takes against valuable assets, allowing organizations to have a better understanding of the state of their security posture. Policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets are also covered in this course.