To attend the CISSP CBK Review you do not need to have the prerequisite experience for the examination. It is available to anyone working in the field of IT and Information Security and aims to give you a thorough understanding of Information Security even if you do not intend to sit the examination.
If you intend to go on to the examination:
Must have a minimum of five years of direct full-time security professional work experience in two or more of the ten domains of the (ISC)2® CISSP CBK®, or four years of direct full-time security professional work experience in two or more of the ten domains of the CISSP CBK with a college degree.
Associate of (ISC)2 status is available to those knowledgeable in key areas of industry concepts but lacking the work experience. As a candidate, you may take the CISSP examination and subscribe to the (ISC)2 Code of Ethics, however to earn the CISSP credential you will have to acquire the necessary years of professional experience required, provide proof and be endorsed by a member of (ISC)2 in good standing. If you are working towards this credential, you will have a maximum of six years from your exam pass date to acquire the necessary five years of professional experience. For more information please refer to: www.isc2.org
A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.
This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security.
Security architecture that protects the assets of your systems:
Network structures, transmission methods, transport formats and security measures that provide availability, integrity and confidentiality:
Identifying an organisation’s information assets, and the development, documentation and implementation of policies, standards, procedures and guidelines:
The controls found in systems and applications software, and their development:
The principles, means and methods of disguising information; to ensure its integrity, confidentiality and authenticity:
The concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks and applications:
Controls over hardware, media and operators with access privileges:
How to maintain business in the face of major disruptions:
Computer crime laws, investigation and how to gather evidence:
How to protect your business's resources and sensitive information:
I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.