Training for CISSP Certification: SearchSecurity.com's Security School

Study guides for each of the ten domains of the CBK for those preparing to take the CISSP exam or expanding their knowledge of security concepts and practices.

Security School Logo TRAINING FOR CISSP CERTIFICATION



The first course in SearchSecurity.com's Security School delivers free training for CISSP® certification. Benefit from a series of 10 training lessons that explore the fundamental concepts, technologies and practices of information systems security. Each lesson corresponds to a subject domain in the exam's "Common Body of Knowledge" — the essential elements each CISSP-certified practitioner must know.

Each of the 10 lessons/domains includes a Webcast presentation, a downloadable "Domain Spotlight" that gives you an insider's guide to each domain, and exclusive pre-exam sample prep questions.

Our Security School not only provides CISSP certification education with a thorough overview of the topics covered in the exam, it also doubles as a comprehensive security resource that enables proactive security professionals on all levels to keep their skills ahead of the pack. This is achieved with essential presentations on the topics that matter most. Not only for the CISSP candidate or those renewing their certification, but for any security pro who wants to gain a greater understanding of how all the pieces in the security puzzle fit together.

There are 10 Lessons/Domains covered in Security School. The first 3 focus on Securing the Data and reveal the essential elements to build an organizational security program, including the theories, technologies and methodologies to protect every company's primary information asset: its data.

Lessons/Domains 4-6 focus on securing the infrastructure as they reveal the nuts and bolts of how to best apply security to everyday computer and business operations. Fundamental concepts explored in the sessions include how to effectively design security architectures, implement secure networks, and build security into applications and systems.

Lessons/Domains 7-10 cover the "business" of security, an area that is ignored far too often in some of today's "status quo" enterprises. Security is often thought of exclusively in terms of technology. But corporate security is much more. It involves everything from governance, business management and regulatory compliance, to an understanding of physical security, disaster recovery and the law.


LESSON/DOMAIN 1: Security Management Practices
While viruses, worms and hacking grab all the news headlines, sound security management practices are the foundation of any organization's security success. This Lesson/Domain explores:

  • Security management responsibilities
  • The core components of security management: risk management, security policies and security education.
  • Administrative, technical and physical controls
  • Risk management and risk analysis
  • Data classification
  • Security roles and personnel security issues
Click here for more on Domain 1


LESSON/DOMAIN 2: Access Control
A cornerstone of information security is controlling how resources are accessed so they can be protected from unauthorized modification or disclosure. The controls that enforce access control can be hardware or software tools, which are technical, physical or administrative in nature. This Lesson/Domain tackles:

  • Identification methods and technologies
  • Biometrics
  • Authentication models and tools
  • Access control types: discretionary, mandatory and nondiscretionary
  • Accountability, monitoring and auditing practices
  • Emanation security and technologies
  • Possible threats to access control practices and technologies

Click here for more on Domain 2


LESSON/DOMAIN 3: Cryptography
Cryptography is one of the essential elements in the protection of electronic data. Most e-commerce applications rely on some form of encryption to protect the confidentiality and integrity of sensitive information as it transits across the Internet. Encryption is also an essential component in protecting stored data from unauthorized access. This Lesson/Domain covers:

  • Cryptographic components and their relationships
  • Government involvement in cryptography
  • Symmetric and asymmetric key cryptosystems
  • PKI concepts and mechanisms
  • Hashing algorithms
  • Types of attacks on cryptosystems

Click here for more on Domain 3


LESSON/DOMAIN 4: Security Models and Architecture
Two fundamental concepts in computer and information security are the security model, which outlines how security is to be implemented; and the architecture of a security system, which is the framework and structure of a system. Security School attendees get an in-depth review of:

  • Computer architectures, from the core operating system kernel to the applications to the network
  • Trusted computing base and security mechanisms
  • Components within the operating system
  • Different security models used in software development
  • Security criterion and ratings
  • Certification and accreditation processes

Click here for more on Domain 4


LESSON/DOMAIN 5: Telecommunications and Networking
This session focuses on the "glue" of network security: how networks work, how data is transmitted from one device to another, how protocols transmit information, and how applications understand, interpret and translate data. Topics to be featured in this session include:

  • OSI model
  • TCP/IP and protocols
  • LAN, WAN and WAN technologies
  • Cabling and data transmission types
  • Network devices and services
  • Intranets and extranets
  • Telecommunication protocols and devices
  • Remote access methodologies and technologies
  • Resource availability
  • Wireless technologies

Click here for more on Domain 5


LESSON/DOMAIN 6: Applications and System Development
Applications and computer systems are usually developed for functionality first, not security. But it's always more effective to build security into every system from the outset rather than "bolt" it on afterward. The exact reasons why are revealed through topics focused on:

  • Different types of software controls and implementation
  • Database concepts and security issues
  • Data warehousing and data mining
  • Software life cycle development processes
  • Change control concepts
  • Object-oriented programming components
  • Expert systems and artificial intelligence

Click here for more on Domain 6


LESSON/DOMAIN 7: Business Continuity
One of the fundamental objectives of security is "availability" — the ability to access computer data and resources whenever necessary. This session focuses on one of the often overlooked but critical aspects of availability: business continuity planning and disaster recovery. Topics delivered focus on:

  • Business impact analysis
  • Operational and financial impact analysis
  • Contingency planning requirements
  • Selecting, developing and implementing disaster and contingency plans
  • Backup and offsite facilities

Click here for more on Domain 7


LESSON/DOMAIN 8: Law, Investigation and Ethics
Fraud, theft and embezzlement have always been an unfortunate fact of life, but the computer age has brought on new opportunities for a different and more malicious set of thieves and miscreants. While many security professionals focus on "preventing" cyber attacks, it's equally important to understand how to investigate a computer crime and gather evidence – that's exactly what this session addresses. Additional topics highlighted are information security regulations, laws and ethics that guide the practice:

  • Ethics and best practices for security professionals
  • Computer crimes and computer law
  • Computer crime investigation processes and evidence collection
  • Incident-handling procedures
  • Different types of evidence

Click here for more on Domain 8


LESSON/DOMAIN 9: Physical Security
Physical security has taken on added importance in the continuing wake of 9/11. While most IT professionals are focused on logical systems—computers, networks, systems, devices—a comprehensive security program must address critical physical risks, too. The convergence of physical and logical systems makes this practice even more important. This session covers:

  • Administrative, technical and physical controls pertaining to physical security
  • Facility location, construction and management
  • Physical security risks, threats and countermeasures
  • Fire prevention, detection and suppression
  • Authenticating individuals and intrusion detection

Click here for more on Domain 9


LESSON/DOMAIN 10: Operations Security
Operations security pertains to everything needed to keep a network, computer system and environment up and running in a secure and protected manner. Since networks are "evolutionary" and always changing, it's essential that security pros understand the fundamental procedures for managing security continuity and consistency in an operational environment. This session reveals essential solutions centered on key operations security topics:

  • Administrative and management responsibilities
  • Product evaluation and operational assurance
  • Change configuration management
  • Trusted recovery states
  • E-mail security

Click here for more on Domain 10

CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as ISC(2).

This was first published in October 2004

Dig deeper on CISSP Certification

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close