Home » Security Training and Tips » Certified Information Systems Security Professional (CISSP) – Class Overview

Certified Information Systems Security Professional (CISSP) – Class Overview

Vector of Antivirus ShieldInformation Security entails a wide range of topics and skills.  While some may assume that it’s only focused with protecting Information Systems from attack or intrusion, the truth is a number of tasks are involved – such as protecting Information Systems from unauthorized viewing, modification, or disruption, even from within the company itself.  Information Security is an important area of Information Technology, and a career area that is becoming more and more important as time goes on.  The Certified Information Systems Security Professional (CISSP) Certification is one of the most prestigious, globally-recognized certificates for Information Security professionals.

During the five day Certified Information Systems Security Professional course, students will examine the ten Common Body of Knowledge domains:

  • Access Control – addresses setting up, implementing, and managing the guidelines, protocols, and safeguards that allow specific users access to specific parts of the system and the actions they can take
  • Information Security and Risk Management – focuses on determining risks, planning policies, and implementing those policies in a real world setting
  • Cryptography – deals with the different measures that can be taken to disguise information
  • Physical (Environmental) Security – addresses threats and vulnerabilities to an organization’s physical facility
  • Security Architecture and Design – focuses on designing, monitoring and securing operating systems
  • Business Continuity and Disaster Recovery Planning – explains how to resume business operations after an outage or system failure
  • Telecommunications and Networking Security – looks at transmission methods and security measures for voice and data communication
  • Application Development Security – discusses the use of security measures for software development
  • Operations Security – identifies important security events that can be audited, monitored, and executed to eliminate exploitation of critical information
  • Legal, Regulations, Compliance and Investigations – addresses the ethics and legalities of computer law and the investigative processes used in the event of a security breach

The CISSP course fully prepares you for the certification exam needed to become a Certified Information Systems Security Professional.

Contact Ashford Global IT today for more information!

Tags: , , , ,

About this author:


Frank is a leading trainer in IT Security.

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.