Updated CISSP Introductory Course in Udemy  

Certified, Information, System, Security, Professional

This is an introduction to all the the details necessary to pass the Certified Information Systems Security Professional (CISSP) exam including many study tips. We intend to teach the new 8 domains of security of the (ISC)2 Common Body of Knowledge (CBK) in 8 individual courses rather than one entire course so you only pay for the courses or sections you need to brush up or review on.

Since you only need 70% correct answers to pass we suggest you become proficient in at least 6 of the 8 domains to pass, rather than try to focus on all the domains.

We recommend to use the Sybex CISSP book, 7th edition, but you can use other book(s) as well. For more information see full course details at my CISSP student website at  https://learncissp.com 

https://www.udemy.com/introduction-to-the-cissp-security-certification/

kozzi-26124839-Businessman_showing_virtual_security-1200

This management level computer security course will teach you to plan, design, administer, and troubleshoot security systems to effectively protect your company’s data in the constantly changing, challenging world of computer networks and information systems. Through the eight CISSP core domains, including security theory and applications, students will broaden and deepening their knowledge of information systems security.

CISSP Security Domains

Domain 1: Security and Risk Management

Domain 2: Asset Security

Domain 3: Security Engineering

Domain 4: Communications and Network Security

Domain 5: Identity and Access Management

Domain 6: Security Assessment and Testing

Domain 7: Security Operations

Domain 8: Software Development Security

CISSP Syllabus

Session 1
Introductions & Becoming a CISSP
Chapter 1 –– Security Governance
Chapter 2 –– Personnel Security & Risk Management Concepts
CISSP online resources, Initial Assessment
Homework/required reading: Read chapters 1 & 2

Session 2
Chapter 3 – Business Continuity Planning
Chapter 4 – Laws, Regulations, and Compliance
Chapter 5 – Protecting Security of Assets
Homework/required reading: Read chapters 3, 4 & 5

Session 3
Chapter 6 – Cryptography & Symmetric Key Algorithms
Chapter 7 – PKI & Cryptography Applications
Homework/required reading: Read chapters 6 & 7

Session 4
Chapter 8 – Principles of Security Models, Design, and Capabilities
Chapter 9 – Security Vulnerabilities, Threats, and Countermeasures
Homework/required reading: Read chapters 8 & 9

Session 5
Chapter 10 – Physical Security Requirements
Chapter 11 – Secure Network Architecture and Securing Network Components
Homework/required reading: Read chapters 10 & 11

Session 6
Chapter 12 – Secure Communication and Network Attacks
Chapter 13 – Managing Identity and Authentication
Homework/required reading: Read chapters 12 & 13

Session 7
Chapter 14 – Controlling and Monitoring Access
Chapter 15 – Security Assessment and Testing
Homework/required reading: Read chapters 14 & 15

Session 8
Chapter 16 – Managing Security Operations
Chapter 17 – Preventing and Responding to Incidents
Homework/required reading: Read chapters 16 & 17

Session 9
Chapter 18 – Disaster Recovery Planning
Chapter 19 – Incidents and Ethics
Homework/required reading: Read chapters 18 & 19

Session 10
Chapter 20 – Software Development Security
Chapter 21 – Malicious Code and Application Attacks
Homework/required reading: Read chapters 20 & 21
Review/Questions, Practice Test

“CISSP is a registered mark of the International Information Systems Security Certification Consortium in the United States and other countries.”

https://www.isc2.org