Lectures cover, in detail, the eight security domains required for the CISSP examination.
The tools and methods used to penetrate security systems. Conducting security control testing, processing data, analyzing, and reporting. Facilitating security audits.
Understand and integrate security in the Software Development Life Cycle. Environment security controls, development models, and software testing.
The identification and classification of information, data retention, privacy concerns, and determining asset ownership.
Understanding and supporting investigations and their requirements. Operating and maintaining preventative measures. Recovery strategies and processes.
Using secure design principles to develop engineering processes. Mitigating vulnerabilities and the application of cryptography, and secure site design.
Developing secure network design and communication channels to include Internet Protocol, wireless, and software-defined networks. Understanding network attacks.
The basic concepts of information security such as confidentiality, integrity and availability. The application of risk management approaches and creating effective security training and awareness programs.
Access control of information, devices and facilities. Understanding and recognizing access control attacks. Identification and authentication management, third-party identity services, and implementing authorization mechanisms.
Certified Information Systems Security Professional Prep Courses are instructed by researchers from the UTSA Center for Infrastructure Assurance and Security (CIAS), a world's foremost cyber security think tank for multidisciplinary education and development of operational infrastructure security capabilities.
Over the past 15 years, the CIAS has been on the forefront of cyber security training efforts. The CIAS has been called upon by Congress, with support from the Department of Homeland Security and the Department of Defense, to strengthen the nation's cyber security preparedness.
In Texas, Information Security Analysts are projected grow 45% between 2021-2031, much faster than the average growth for all occupations.
According to the Texas Comptroller's office, as of 2017, the average annual wage for Information Security Analysts in the state was $95,000, nearly twice as much as the average annual wage for all occupations. Top industries searching for this specialized skill set include information technology & services, defense & space, computer network & security, management consulting, and financial services.
Information Security, Network Security, Vulnerability Assessment
CISSP Certification prepares candidates for a variety of high-level positions including:
Total cost of the high-impact, 40 hour CISSP Preparation course.
Materials are not provided. Please click 'View Materials' button below to locate necessary books.
Candidates must have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Earning a four-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy one year of the required experience.