Maxtrain.com - [email protected] - 513-322-8888 - 866-595-6863


CISSP (Certified Information Systems Security Professional)

Alert Me


Security Essentials is the cost-effective and learning-effective way to build your information security knowledge. Based on the ten domains of information security, this course provides you with a structured approach, innovative tools, and unparalleled support to obtain the knowledge needed to be an effective security professional, as well as, prepare for major security industry certifications. By combining a structured approach to classroom learning with reading assignments from carefully selected books and collaboration tools, we are able to provide a learning environment that helps security professionals expand their knowledge to become well rounded practitioners. Security Essentials provides an effective foundation for enhanced job performance, job satisfaction and sets a pathway to obtain the security industries highest level certifications.

Upon completion, students will be able to:

  • Have a broad understanding of the spectrum of Information Security
  • Understand the key elements of each of the ten domains of information security
  • Comfortably discuss and outline information security concepts
  • Understand the difference between security practitioners and security professionals
  • Use the structured approach presented during this course to continue on a successful pathway to prepare for security certifications


This course is currently organized to follow the ten domains of information security. Emphasis is given to defining and explaining the concepts, then discussing security implications.

Day One-Security Management

  • The goals of Security
  • Confidentiality
  • Integrity
  • Availability
  • Policy Standard Procedure/Guideline
  • Data Classification Guidance
  • ISO17799 Common Criteria
  • Organizational Considerations
  • Roles and Responsibilities
  • Hiring and Termination Practices
  • Awareness Training Education
  • Risk Management
  • Vulnerabilities
  • Threats
  • Countermeasures
  • Risk Analysis
  • Qualitative Quantitative
  • Hybrid Security Architecture
  • General Computer Architecture
  • Security Considerations
  • Open and Closed Systems
  • Mainframe Architectures Distributed
  • Computing Architectures
  • Web Based Architectures
  • Security Models
  • Protection Mechanisms
  • Providing Assurance
  • Orange Book Common Criteria
  • Trusting Computing
  • Base Certification and Accreditation
  • Change Management Operations
  • Security Controls and Protections
  • Hardware/Software Personnel

Types of Controls

  • Preventative Controls
  • Detective Controls Corrective
  • Controls Deterrent
  • Directive Application
  • Transactional Least Privilege
  • Separation of Duties
  • Job Rotation
  • Problem Management
  • Change Control
  • Trusted Recovery

Day Two-Cryptology

  • History of Cryptography
  • Symmetric Key
  • Asymmetric Key
  • Hybrid Systems
  • Message Digests
  • Digital Signatures
  • Public Key Infrastructure
  • Crypto Systems/Applications
  • PGP Securing
  • Email Securing
  • Communications SSL
  • IPsec
  • Attacks on Crypto Systems

Physical Security

  • Design Facilities
  • Planning Access Controls
  • Construction Design considerations
  • Power Fire Suppression
  • Perimeter Controls
  • Fencing
  • Lighting
  • Walls
  • Intrusion Detection
  • Security Guards
  • Monitoring Technologies
  • Conversion to Personal Use

Day Three-Application

  • Security Life cycle development process
  • Security Project Management
  • Development Methodologies
  • Programming Languages
  • Secure Programming Concepts
  • Databases and Database Management

Application Security Threats

  • Viruses
  • Malicious Code
  • Access Control
  • Identification and Authentication
  • AAA servers Controls
  • Mandatory Access Control
  • Discretionary Access Control
  • Technologies Locks and Keys
  • Token Systems Challenge-Response Systems

Biometrics Access Control Systems

  • Smart Cards Biometrics

Day Four-Network Security

  • Topologies
  • Wired Wireless Protocols
  • OSI
  • TCP/IP
  • Perimeter and Gateway Firewalls
  • Intrusion Detection
  • Internal Controls
  • Assurance of Network Security

Day Five-Legal, Forensics and Ethics

  • Legal Systems
  • Categories of Law
  • Intellectual Property Law
  • Patent
  • Trademark
  • Trade Secrets
  • Copyright
  • Computer Crime Laws
  • Privacy Laws
  • Liability
  • Negligence
  • Management Liability
  • Forensics and Investigations
  • The process of investigation
  • Admissibility of Evidence
  • Enticement
  • Entrapment
  • Ethics
  • Basis of Ethics
  • Role of ethics in the enterprise
  • Ethics Centers
  • Business Continuity and Disaster Recovery
  • Planning Incidents and Events
  • BCP/DRP Methodologies
  • Vulnerability Assessments
  • Recovery Strategies
  • Building the Plan and Testing the Plan


A CISSP candidate needs to have a minimum of 4 years security experience to attend.

$2995.00 List Price

5 Days Course

Class Dates

Request a Date or a Private Class below.

Loading ...