ISC2 CISSP Study Guide 8th edition

BITTS International Career College > Certificate > ISC2 CISSP Study Guide 8th edition
BITTS logo
Department
Information Technology
Semester
Continuous
Method
Online
Duration
39 Hours

Prepare for the ISC2 CISSP certification exam with the CISSP course and lab. The lab is versatile and delivers a hands-on experience, replacing expensive physical labs. The course and labs offer an interactive learning experience in areas such as security and risk management, asset security, security architecture, and engineering, identity and access management (IAM), security assessment and testing, security operations, and software development security.

students at BITTS

The vendor-neutral ISC2 CISSP certification is ideal for those with the technical and managerial competence to design, engineer, implement, and manage overall information security programs to protect organizations.

Quick Application Form

Entry requirements

  • At least five years of cumulative, paid, full-time work experience
  • In two or more of the eight domains of the (ISC)2 CISSP Common Body of Knowledge (CBK)
  • English Proficiency

Course structure and modules

  • Introduction
  • Security Governance Through Principles and Policies
  • Personnel Security and Risk Management Concepts
  • Business Continuity Planning
  • Laws, Regulations, and Compliance
  • Protecting Security of Assets
  • Cryptography and Symmetric Key Algorithms
  • PKI and Cryptographic Applications
  • Principles of Security Models, Design, and Capabilities
  • Security Vulnerabilities, Threats, and Countermeasures
  • Physical Security Requirements
  • Secure Network Architecture and Securing Network Components
  • Secure Communications and Network Attacks
  • Managing Identity and Authentication
  • Controlling and Monitoring Access
  • Security Assessment and Testing
  • Managing Security Operations
  • Preventing and Responding to Incidents
  • Disaster Recovery Planning
  • Investigations and Ethics
  • Software Development Security
  • Malicious Code and Application Attacks

Career opportunities

  • Security Auditor
  • Director of Security
  • Security Consultant
  • IT Director/Manager
  • Security Systems Engineer
  • Chief Information Security Officer