Courses Offered

    Download pdf format

Fast Track to the CISSP

[ Course No. SCCCSP - 5 Days ]


The Fast Track to CISSP course provides a comprehensive prospectus based upon the core principle concepts of security. The curriculum, though primarily lecture and case studies, discusses the ten core Common Body of Knowledge (CBK) subject areas that are fundamental to the understanding of security in a context. This intense five-day class not only provides an excellent foundation of security but it prepares, CIOs, managers, and engineers for their CISSP certification exam.


Network and firewall administrators, information security officers, and anyone interested in understanding the best practices and core concepts and principles of security. This course is designed for the Certified Information Systems Security Professional (CISSP) certification candidate.

Any individual who has successfully completed this course and successfully received a passing grade on the certification exam will be compliant with the 8570 Information Workforce Improvement Program requirements including change 2 April 20,2010.


None, although experience in security is recommended prior to taking the CISSP examination


Chapter 1: Becoming a CISSP

  • The CISSP Exam
  • CISSP: A Brief History
  • How Do You Become a CISSP?
  • Recertification Requirements
  • Tips for Taking the CISSP Exam

Chapter 2: Security Trends

  • Areas of Security
  • Information Warfare
  • Hacking and Attacking Management
  • Internet and Web Activities
  • A Layered Approach
  • An Architectural View
  • Politics and Laws Education

Chapter 3: Information Security and Risk Management

  • Security Management
  • Security Management Responsibilities
  • Security Administration and Supporting Controls
  • Fundamental Principles of Security
  • Security Definitions
  • Organizational Security Model
  • Information Risk Management
  • Risk Analysis
  • Policies, Standards, Baselines, Guidelines, and Procedures
  • Information Classification
  • Layers of Responsibility
  • Security-Awareness Training

Chapter 4: Access Controls

  • Access Controls Overview
  • Security Principles
  • Identification, Authentication, and Authorization
  • Access Control Models
  • Access Control Techniques and Technologies
  • Access Control Administration
  • Access Control Methods
  • Access Control Types
  • Accountability
  • Access Control Practices
  • Access Control Monitoring
  • A Few Threats to Access Control

Chapter 5: Security Architecture and Design Computer Architecture

  • System Architecture
  • Security Models
  • Security Modes of Operations
  • Systems Evaluations Modes
  • Rainbow Series
  • Information Technology Security Evaluation Criteria
  • Common Criteria
  • Certification vs. Accreditation
  • Open vs. Closed Systems
  • A Few Threats to Security Models and Architectures

Chapter 6: Physical and Environmental Security

  • Introduction to Physical Security
  • Planning Process
  • Protecting Assets
  • Internal Support Systems
  • Perimeter Security

Chapter 7: Telecommunications and Networking Security

  • Open Systems Interconnection Reference Model
  • TCP/IP
  • Types of Transmission
  • LAN Networking
  • Routing Protocols
  • Networking Devices
  • Networking Services and Protocols
  • Internets and Extranets
  • Metropolitan Area Network
  • Wide Area Network
  • Remote Access
  • Wireless Technologies Rootkits

Chapter 8: Crytography

  • History of Cryptography
  • Cryptography Definitions and Concepts
  • Governments Involvement with Cryptography
  • Types of Ciphers
  • Methods of Encryption
  • Types of Symmetric Systems
  • Types of Asymmetric Systems
  • Message Integrity
  • Public Key Infrastructure
  • Key Management
  • Link Encryption vs. End-to-End Encryption
  • E-mail Standards
  • Internet Security Attacks

Chapter 9: Business Continuity Planning

  • Business Continuity and Disaster Recovery
  • Business Continuity Planning Requirements

Chapter 10: Regulations and Compliance

  • The Many Facets of Cyberlaw Ethics
  • Hackers and Crackers Well-Known Computer Crimes
  • Identification, Protection, and Prosecution
  • Liability and Its Ramifications
  • Types of Law
  • Equipment and Software Disposal Issues
  • Computer Crime Investigation
  • Import and Export Laws Privacy
  • Laws, Directives, and Regulations
  • International Cooperation Efforts

Chapter 11: Applications Security

  • Softwares Importance
  • Device vs. Software Security
  • Different Environments Demand Different Security
  • Environment vs. Application Controls
  • Complexity of Functionality
  • Data Types, Forman, and Length
  • Implementation and Default Issues
  • Failure States
  • Database Management
  • Systems Development
  • Application Development Methodology

Chapter 12: Operations Security

  • Role of the Operations Department
  • Network and Resource Availability E-Mail Security

Need Help Signing Up For Training?

Complete this form for fast scheduling help.

* Full Name:
  Company Name: 
  Phone Number:  [555-555-5555]  Ext:
* Email:  
* Comments:
Please Enter Numbers From Above

Bronze classes Bronze classes are new dates that have recently been added to the schedule. Plan ahead and save 25% when you register for a Bronze Course.

Silver classes Silver
classes are filling up fast. Grab a seat and save 15% when you register for a Silver Course.

Gold classes Gold
classes are Guaranteed to Run on the dates, times, and locations listed. Please note that circumstances beyond our control (illness, loss of power) may preclude class delivery. Golden classes are available at standard pricing.

Partner classes Partner
classes are delivered by Knowlogy's expert training partners. Contact your account manager for any available savings.

  • 1 Find Course
  • 2 Register
  • 3 You're Done!