Course Description
During this fast-paced, two-day session, the eight domains of the (ISC)² CISSP common body of knowledge (CBK®) will be covered. This fact-filled course will review the topics within the CBK and deepen the participant’s knowledge of information security. Each day of the presentation will cover essential topics within various domains of the CBK, such as current security challenges, problem resolution, application security, network security, infrastructure planning, legal considerations, international privacy, investigations, and forensics, among other topics.
The instructor will utilize (ISC)² course materials to guide you through the most pertinent information to understand prior to taking the examination or to help enhance your current CISSP credential. The two-day session will conclude with a practice exam. For those students interested in deepening their knowledge, enrollment in this course also includes access to the Official (ISC)² On-Demand Training Seminar.
Presentation: The facilitator will explain content to participants using PowerPoint to guide the presentation. Multiple examples will be used to clarify points.
Short Lecture/Discussion: The facilitator will engage participants in conversation by asking questions and encouraging them to respond. Participants will be encouraged to provide examples from their experience.
Computers: The course is presented to (ISC)2 standards and will not require the course participants to have laptops or computer devices during the class presentation.
Course Objectives
After Completing This Course, the Participant Will Be Able To:
Course Outline
Day 1: Certified Information Systems Security Professional CBK® Introduction
Day 2: Certified Information Systems Security Professional CBK® Introduction
Who Should Attend
The CISSP with Access to Self-Paces introduction is ideal for those working in positions such as, but not limited to:
Requisite Skills
Participants should have demonstrated competency in security management on a large, enterprise-wide scale. They should possess skills in project management, risk management, creating and delivering a security awareness program, and managing a business continuity planning program. Also, participants should possess complete comprehension of information security. Participants should have knowledge of architecture and solving issues with chief security architects or analysts, or work as independent consultants (or in similar capacities), enhancing functionality between the C-suite and upper managerial levels as well as the implementation of a security program. The participant generally either consults on, develops, designs, or analyzes an organization’s overall security plan.
Instructor:
Dr. Lyron H. Andrews CISSP, CCSP
Title: Authorized (ISC)² Instructor
Professional Profile: Dr. Andrews has made a career in technology and information security management along with training that span nearly 25 years.
He began his career managing Novell 2.0 servers and Banyan Vines routers. He served as the network manager for the New York City Department of Education converting a 5,000 node token ring to a switched Ethernet network. He was the senior director of technology for Bertelsmann while spending his evenings as an adjunct professor at Columbia University. He combined his love of technology with academia to aid in establishing a university inside of BNY Mellon (bank founded by Alexander Hamilton in 1784) and worked as the dean for the school of client technology solutions.
Between 2006-2008 he led the (ISC)2 train-the-trainer initiative for new instructors of the CISSP. He traveled to 28 countries delivering the course to some of the highest ratings while certifying instructors around the globe.
Education and Credentials: