This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Email Print this page

CISSP Common Body of Knowledge Review

About this course

Based on the Information Systems Security Certification Consortium (ISC2) curriculum, this Certified Information Systems Security Professional (CISSP) course is a six-day program that covers the most comprehensive compendium of information security best practices—the Common Body of Knowledge (CBK). Recognized for its quality and integrity, this review seminar offers a rigorous study of relevant domains. By leveraging the resources of one of the world’s leading professional services firm, it also sets the standard for CISSP preparatory training.

On day six of the program, participants have the option to sit for the CISSP certification exam. This six-hour, multiple choice exam is administered by an independent examiner on behalf of ISC2, the certifying body. Achieving CISSP certification is an important career differentiator and the right preparation can make all the difference for both you and your organization.

Who should attend

  • All information security professionals who want to master the world’s best practices and enhance their management and technical competency in information security

Learn how to

  • Enhance your understanding of the main topics covered in the Common Body of Knowledge through this high-level review related to all aspects of information systems security
  • Better understand the scope of the field of information security
  • Prepare for the CISSP certification exam

Course content

This six-day course will teach you:

  • Information security and risk management—including strategies for identifying an organization’s information assets and developing, documenting and implementing related policies, standards, procedures and guidelines
  • Security architecture and design—the concepts, principles, structures and standards used to design, monitor and secure operating systems, equipment, networks, applications and controls
  • Access control—a collection of mechanisms that work together to create security architecture to protect the assets of the information system
  • Application security—the important security concepts that apply to application software development
  • Operations security—the methods used to identify the controls over hardware, media and the operators and administrators with access privileges to any of these resources
  • Physical (environmental) security—protection techniques for the entire facility, from perimeter to office space, including all information system resources
  • Cryptography—the principles, means and methods of disguising information to ensure its integrity, confidentiality and authenticity
  • Telecommunications and network security—the network structures, transmission methods, transport formats and security measures used to provide availability, integrity and confidentiality
  • Business continuity and disaster recovery planning—the preservation and recovery of business operations in the event of outages
  • Legal issues, regulations, compliance and investigations—including computer crime laws and regulations and the measures and technologies used to investigate computer crime incidents