Skip to main content
Page

Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP)


ARMY IGNITED CRITERIA 

TRAINING NAME:


  • Certified Information Systems Security Professional (CISSP)  
         

FORMAT:

  • Online, On Demand

ASSOCIATED CREDENTIAL:


  • Certified Information Systems Security Professional (CISSP)
  •  
  LOCATION &
SCHEDULES:

  • Virtual - Can be taken from Any Location, Any Time according to Your Schedule
COST:
  • Contact Learn@AristaLearn.com for $
                TESTING VOUCHER or CERTIFICATE OF COMPLETION?
  • Certificate of Completion
TARGET STUDENT:
  • This course is best suited for systems securities professionals
  PREREQUISITES:


  • There are no prerequisites for this course


COURSE MATERIALS INCLUDE:

  • Access to on-line Learning Portal
  • Videos, training content, examples, quizzes, labs, and all items needed to learn the material and successfully pass this course!

                

HOW TO ENROLL:
  • Email Learn@AristaLearn for a Quote & Detailed Upload instructions


Course Overview 

This course will teach students about security and risk management, asset management, security architecture and engineering, communication and network security, identity and access management,


Domain 01 – Security and Risk Management


  • Topic: Confidentiality, Integrity, and Availability
  • Confidentiality, Integrity, Availability
  • Topic: Security Governance
  • Security Governance Principles
  • Security Functions to Business Goals, Organizational Processes
  • Roles and Responsibilities, Security Control Frameworks
  • Due Care / Due Diligence, References
  • Topic: Compliance Requirements
  • Compliance Requirements, Contracts, Legal, Industry Standards
  • Privacy Requirements, References
  • Topic: Legal and Regulatory - Global
  • Legal and Regulatory - Global
  • Cyber Crimes and Data Breaches, Intellectual Property
  • Import / Export Controls, Trans-border Data Flows
  • Privacy, References
  • Topic: Professional Ethics
  • Professional Ethics, Topic: Security Policy, Standards, Procedures
  • Security Policy, Standards, Procedures
  • Topic: Business Continuity
  • Business Continuity, Document Scope and Plan
  • Business Impact Analysis, References
  • Topic: Personal Security Policies
  • Personal Security Policies, Candidate Screening / Hiring
  • Employment Agreements / Polices
  • On-boarding / Termination Process
  • Vendor, Consultant, Contractor, Compliance Policy Requirements
  • Privacy Policy Requirements
  • References
  • Topic: Apply Risk Management
  • Apply Risk Management, References, Topic: Threat Modeling
  • Threat Modeling – Concepts / Methodology
  • Threat Modeling – Categorizing Threats
  • Threat Modeling – Generic Steps
  • Threat Modeling – Analyzing Risk, References
  • Topic: Risk Management – Supply Chain
  • Risk Management – Hardware, Software
  • Risk Management – 3rd Party Evaluations
  • Risk Management – Minimum Security
  • Topic: Security Awareness and Training
  • Security Awareness and Training
  • Methods and Techniques
  • Periodic Content Reviews
  • Effectiveness Evaluations
  • References

Domain 02 – Asset Management

  • Topic: Identify and Classify, Data Classification
  • Asset Classification, References
  • Topic: Asset Ownership
  • Asset Ownership, References
  • Topic: Protect Privacy
  • Data Owners, Data Processors, Data Remanence
  • Data Collection, References
  • Topic: Asset Retention
  • Asset Retention, Record Retention, References
  • Topic: Data Security Controls
  • Data Security Controls, Scoping and Tailoring
  • Standards Selection, Data Protection Methods
  • Topic: Information / Asset Handling
  • Information / Asset Handling, Failure Examples, Storage Options

Domain 03 – Security Architecture and Engineering

  • Topic: Engineering Processes and Secure Design
  • Engineering Processes and Secure Design
  • Closed / Open Systems, Closed / Open Source Code
  • Techniques / Confinement, Bounds
  • Process Isolation, Controls / MAC and DAC
  • Topic: Concepts of Security Models
  • Concepts of Security Models, Security Perimeter
  • Reference Monitors / Security Kernels
  • Various Models, References
  • Topic: Controls Based on Security Requirements
  • Controls Based on Security Requirements
  • Rainbow Series, TCSEC, ITSEC / Common Criteria
  • Common Criteria, References
  • Topic: Security Capabilities of Information Systems
  • Security Capabilities of Information Systems
  • Virtualization, Trusted Platform Module
  • References, Topic: Assess / Mitigate Vulnerabilities
  • Assess / Mitigate Vulnerabilities
  • Local Caches, Server-Based Systems
  • Database Systems, Industrial Control Systems
  • Cloud-Based Systems, Distributed Systems
  • Internet of Things
  • Topic: Assess / Mitigate Vulnerabilities (Web)
  • Assess / Mitigate Vulnerabilities (Web)
  • Topic: Assess / Mitigate Vulnerabilities (Mobile)
  • Assess / Mitigate Vulnerabilities (Mobile)
  • Device Security, Application Security
  • Topic: Assess / Mitigate Vulnerabilities (Embedded)
  • Assets / Mitigate Vulnerabilities (Embedded)
  • Embedded / Static Systems
  • Securing Embedded / Static Systems
  • References
  • Topic: Apply Cryptography
  • Apply Cryptography, Cryptographic Life Cycle
  • Cryptographic Methods
  • Symmetric Key,Asymmetric Key
  • Elliptic Curve, Public Key Infrastructure
  • Certificates, Key Management
  • Digital Signatures, Integrity - Hashing
  • Cryptanalytic Attacks
  • Digital Rights Management (DRM)
  • Topic: Site / Facility Security Principles
  • Site / Facility Security Principles, References
  • Topic: Site / Facility Security Controls
  • Site / Facility Security Controls
  • Server Rooms / Data Centers
  • Media Storage Facilities, Evidence Storage
  • Restricted and Work Area Security
  • Utilities and HVAC, Environmental Issues
  • Fire Prevention, Detection, and Suppression
  • Fire Extinguishers / Detection, Water Suppression / Gas Discharge
  • References

Domain 04 – Communication and Network Security

  • Topic: Secure Design and Network Architecture
  • Secure Design and Network Architecture
  • OSI Model, Encapsulation / Decapsulation
  • Physical / Data Link Layers, Network Layer
  • Transport Layer, Session Layer
  • Presentation Layer, Application Layer
  • IP Networking, TCP/IP
  • SYN / ACK / TCP, IP Classes
  • Multilayer Protocols, Converged Protocols
  • Wireless Networks, Secure SSID
  • Secure Encryption Protocols
  • References
  • Topic: Secure Network Components
  • Operation of Hardware, Firewalls
  • Firewall Inspection, Transmission Media
  • Baseband / Broadband, Twisted Pair
  • Network Access Controls, Network Access Controls - Concepts
  • Endpoint Security, Distribution Networks
  • Topic: Secure Communication Design
  • Voice, PBX Fraud, Multimedia Collaboration
  • Remote Meeting, Securing Email, Remote Access
  • Remote Authentication, Virtualized Networks
  • VPN Protocols
  • References

Domain 05 – Identity and Access Management

  • Topic: Physical and Logical Access
  • Information, Access Control Process
  • Logical and Technical Access Controls
  • Systems, Devices, Facilities
  • Topic: Manage Identification / Authentication
  • Identity Implementation, Single / Multi-factor Authentication
  • Service Authentication, Accountability
  • Session Management
  • Registration / Proofing Identity
  • Federated Identity Management
  • Common Language
  • Credential Management Systems
  • CyberArk, References
  • Topic: Integrate Identity as a Third-Party Service
  • On-Premise, Cloud, Federated
  • Topic: Implement and Manage Authorization
  • Role-Based Access, Upsides / Downsides, Rule-Based Access
  • Mandatory Access, Discretionary Access, Attribute-based Access
  • References
  • Topic: Manage Identity / Access Lifecycle
  • Account Review, System Access Review

Domain 06 – Security Assessment and Training

  • Topic: Assessment, Test, and Audit Strategies
  • Assessment, Test, and Audit Strategies
  • Security Assessment / Testing, Security Assessments
  • External / Third Party, Auditing Standards
  • Topic: Security Control Testing
  • Vulnerability Assessment, Vulnerability Scans
  • Network Vulnerability Scans, Web Vulnerability Scans
  • Penetration Testing, Testing Options
  • Log Reviews, Synthetic Transaction
  • Code Review / Testing, Testing Options (cont.)
  • Misuse Case Testing, Test Coverage Analysis
  • Interface Testing, References
  • Topic: Security Process Data
  • Account Management, Management Review
  • Performance and Risk Indicators
  • Backup Verification, Training and Awareness
  • Topic: Analyze Test Output / Generate Reports
  • Analyze Test Output / Generate Reports
  • External Scan Report, References
  • Topic: Conduct / Facilitate Security Audit
  • Internal Aspects, External / 3rd Party Aspect
  • References

Domain 07 – Security Operations

  • Topic: Investigations
  • Evidence Collection
  • Network / Software / Hardware Analysis
  • Reporting and Documentation, Investigative Techniques
  • Gathering Evidence, Digital Forensics, Chain of Custody
  • References
  • Topic: Investigation Team
  • Administrative Aspects, Criminal Investigations
  • Civil Investigations, Regulatory Investigations
  • Topic: Logging and Monitoring Activities
  • SIEM, Deployment, Continuous Monitoring
  • Egress Monitoring, Tools to Assist
  • References
  • Topic: Provisioning Resources
  • Asset Inventory, Asset Management
  • Cloud-Based Management, Configuration Management
  • References
  • Topic: Security Operations Concepts
  • Separation of Duties, Need to Know / Least Privilege
  • Separation of Privilege, Privileged Account Management
  • Job Rotation, Information Lifecycle
  • Key Phases of Data, Service Level Agreements
  • References
  • Topic: Protection Techniques
  • Media Management, Hardware / Software Asset Management
  • Software, References
  • Topic: Incident Management
  • Detection, Responsive, Reporting
  • Legal / Compliance, Recovery, Remediation
  • Lessons Learned, References
  • Topic: Detective / Preventative Measures
  • Firewalls, Intrusion Detection / Prevention
  • Knowledge / Behavior-Based
  • Network / Host-Based, Whitelisting / Blacklisting
  • Third-Party Security Services, Sandboxing
  • Honeypots/Honeynets, Anti-Malware
  • Topic: Patch and Vulnerability Management
  • Patch / Vulnerability Management, Patch Management
  • References
  • Topic: Change Management Processes
  • Change Management, Security Impact Analysis
  • References
  • Topic: Implement Recovery Strategies
  • Backup Storage, Recovery Site Strategies
  • Business / Functional Unit Priorities
  • Crisis Management, Multiple Processing Sites
  • Options, Cloud Computing
  • High Availability / QoS, Hard Drives / Power Sources, QoS
  • References
  • Topic: Implement Disaster Recovery
  • Response, Personnel, Communications, Assessment
  • Restoration, Training and Awareness
  • References
  • Topic: Test Disaster Recovery
  • Overview, Read-Through Checklists, Walk-Through (Table-Top)
  • Simulation Test, Parallel Test, Full Interruption
  • References
  • Topic: Implement / Manage Physical Security
  • Perimeter Security, Fences, Gates and Lighting
  • Security Dogs, Internal Security Controls
  • Badges / Regulatory Requirements
  • References
  • Topic: Personnel Safety / Security
  • Travel, Security Training and Awareness
  • Emergency Management
  • Duress, References
  • Domain 08 – Software Development Security
  • Topic: Software Development Life Cycle
  • Development Methodologies
  • Functional Requirements / Control Specifications
  • Design / Code Review
  • User Acceptance Testing / Change Management
  • Maturity Models, Agile / SW-CMM, Change Management
  • Integrated Product Team, References
  • Topic: Security Controls in Development
  • Security of Software Environments
  • Development Security
  • Secure Coding Configuration Management
  • Code Repositories, Best Practices
  • References, Topic: Assess Software Security Effectiveness
  • Auditing and Logging, ODBC / NoSQL
  • Risk Analysis / Mitigation
  • Development Methodology
  • Tracking Progress / Repeat
  • References
  • Topic: Security Impact of Acquired Software
  • Security Impact of Acquired Software
  • OWASP Key Considerations, References
  • Topic: Secure Coding Guidelines and Standards
  • Security Weaknesses / Vulnerabilities
  • Reconnaissance Attacks, Masquerading Attacks
  • API Security, Secure Coding Practices
  • Testing Options, References
  • Course Closure