2 Days Left to Save $400 on SANS Scottsdale 2015

MGT414: SANS Training Program for CISSP Certification®

MGT414: SANS Training Program for CISSP® Certification is an accelerated review course designed to prepare you to pass the exam. The course takes into account the updates to the CISSP® exam and has been constantly updated to keep track of any changes and updates to the exam since then.

This course assumes that students have a basic understanding of networks and operating systems and focuses solely on the 10 domains of knowledge as determined by (ISC)2. Each domain of knowledge is dissected into its critical components, and those components are then discussed in terms of their relationship with one another and with other areas of network security.

After completion of this course, students will have a strong working knowledge of the 10 domains of knowledge and be better placed to pass the exam. Over the past four years, 98% of all respondents who took the SANS Training Program passed the CISSP® Certification Exam. This compares to a national average of around 70% for other prep courses.

  • The analytical skills required to pass the exam
  • The technical skills required to understand each question
  • Detailed coverage of the 10 domains of knowledge
  • Foundational information needed to become a CISSP

Notice:

The CISSP® exam itself is not hosted by SANS. You will need to make separate arrangements to take the CISSP® exam. Please note as well that the GISP exam offered by GIAC is NOT the same as the CISSP® exam offered by (ISC)2.

Course Syllabus
Course Contents
  MGT414.1: Introduction and Access Control

The CISSP® exam itself is not hosted by SANS. You will need to make separate arrangements to take the CISSP® exam.

Overview

The first day of the course introduces the specific requirements needed to obtain CISSP® certification. General security principles needed to understand the 10 domains of knowledge are covered in detail, with specific examples for each domain. The first of the 10 domains, Access Control, is discussed using real-world scenarios to illustrate the critical points. Access control, which includes authentication, authorization, and accountability, will be covered with an emphasis on controlling access to critical systems.

CPE/CMU Credits: 7

Topics
  • Overview of CISSP® Certification
  • Introductory Material
    • Overview of the exam
    • What is required to become a CISSP®?
    • Maintaining a CISSP®
    • Exam overview
    • Test-taking tips and tricks
    • Overview of the 10 domains
      • Domain 1: Access Controls
      • Domain 2: Telecommunications and Network Security
      • Domain 3: Information Security Governance and Risk Management
      • Domain 4: Software Development Security
      • Domain 5: Cryptography
      • Domain 6: Security Architecture and Design
      • Domain 7: Security Operations
      • Domain 8: Business Continuity and Disaster Recovery Planning
      • Domain 9: Legal, Regulations, Investigations, and Compliance
      • Domain 10: Physical (Environmental) Security
  • Domain 1: Access Controls
    • Controlling who can do what
    • What access control is
    • How access control relates to risk
    • Key terms and principles
    • Access control models
    • Threat modeling
    • Understanding weaknesses in access control
    • Measuring the effectiveness of access control
    • Audit review
    • Access provisioning life cycle
 
  MGT414.2: Telecommunications and Network Security

The CISSP® exam itself is not hosted by SANS. You will need to make separate arrangements to take the CISSP® exam.

Overview

Understanding network communications is critical to building a solid foundation for network security. The first day of the course examines all aspects of network security, including routing, switches and key protocols, and how they can be properly protected on the network. The telecommunications domain covers all aspects of communication and what is required to provide infrastructure that has embedded security.

CPE/CMU Credits: 8

Topics
  • Domain 2: Telecommunications and Network Security
    • Key components of network security
    • Intrusion detection
    • Firewalls
    • Packet filtering
    • Stateful
    • Proxy
    • Network vulnerability scanning
    • Penetration testing
    • Security assessment
    • Methods of attack
    • Types of networks
    • LANS
    • MANS
    • WANS
    • Topologies
    • Physical
    • Bus
    • Ring
    • Star
    • Logical
    • Ethernet
    • Token ring
    • FDDI
    • WAN technologies
    • VoIP
    • Remote access
    • Virtual applications
    • Screen scraping
    • Multi-media applications
    • Network hardware
    • Wiring
    • Routers bridges
    • Switches
    • Hubs
    • Numbering systems
    • Binary
    • Octal
    • Decimal
    • Hex
    • Protocol stacks
    • OSI
    • TCP/IP
    • Multi-layer protocols
    • Network addresses
    • MAC
    • IPv4 and IPv6
    • VPNS
    • IPSEC
    • Virtual machines
 
  MGT414.3: Information Security Governance, Risk Management, and Software Development Security

The CISSP® exam itself is not hosted by SANS. You will need to make separate arrangements to take the CISSP® exam.

Overview

In order to secure an organization, it is important to understand the critical components of network security and the issues that must be addressed to manage that security. Security is all about mitigating risk to an organization, so this section of the course will discuss the core areas and methods involved in calculating risk.

To secure an application, it is important to understand system engineering principles and techniques. This section examines software development lifecycles (SDL), including examples of what types of projects are suited for different lifecycles.

CPE/CMU Credits: 8

Topics
  • Domain 3: Information Security Governance and Risk Management
    • Data classification
    • Information lifecycle
    • Organizational processes and governance
    • Due care and due diligence
    • Managing security in the enterprise
    • Risk
    • Threats
    • Vulnerabilities
    • Countermeasures - Dealing with risk
    • Accepting
    • Reducing
    • Eliminating
    • Transferring
    • Risk management questions
    • Risk models
    • Single loss expectancy (SLE)
    • Annualized loss expectancy (ALE)
    • Quantitative
    • Qualitative
    • Threat vectors
    • Outsider attack from network
    • Outsider attack from telephone
    • Insider attack from local network
    • Insider attack from local system
    • Attack from malicious code
    • Managing third-party risk
    • Security documentation
    • Policy
    • Procedure
    • Standard
    • Baseline
    • Guidelines
    • Policy, training and awareness
  • Domain 4: Software Development Security
    • Application controls
    • Client server applications
    • Distributed data processing
    • Modes of operation
    • System high
    • Compartment
    • High-level security
    • SDL guidelines
    • Certification and accreditation
    • Application controls
    • Security controls
    • Development process
    • Software lifecycle
    • Waterfall model
    • Spiral model
    • Top-down development
    • Bottom-up development
    • Hybrid development
    • Rapid prototyping model
    • Object-oriented development
    • Agents
    • Case tools and software prototyping
    • Software capability maturity model (CMM)
    • Software security effectiveness
    • Artificial intelligence
    • Database technology
 
  MGT414.4: Cryptography and Security Architecture and Design

The CISSP® exam itself is not hosted by SANS. You will need to make separate arrangements to take the CISSP® exam.

Overview

Cryptography plays a critical role in the protection of information. This section of the course presents examples showing the correct and incorrect ways to deploy cryptography, as well as the common mistakes that are made. The three types of crypto systems are examined to show how they work together to accomplish the established goals.

Understanding the components of a computer's hardware and how they interoperate with each other and with the software is critical to implement proper security measures. This section examines the different hardware components and how they interact to make a functioning computer.

CPE/CMU Credits: 8

Topics
  • Domain 5: Cryptography
    • History of cryptography
    • Goals of cryptography
    • Confidentiality
    • Integrity
    • Authentication
    • Non-repudiation
    • Cryptography lifecycle
    • General encryption techniques
    • Ways to encrypt data
    • Stream
    • Block
    • Types of cryptography
    • Symmetric
    • Asymmetric
    • Hash
    • Diffie-Hellman key exchange
    • Key management and PKI
    • Real-world implementations for crypto
    • Kerberos
    • Digital substitution
    • PGP
    • SSL
    • Types of encryption algorithms
    • DES
    • Triple-DES
    • AES
    • RSA
    • MD5
    • SHA
    • Applications of cryptography
    • Data at rest
    • Data in transit
    • Key management
    • Types of crypto attacks
    • Steganography and digital watermarking
  • Domain 6: Security Architecture and Design
    • Hardware
    • Memory
    • Addressing
    • Storage types
    • Types of memory
    • CPU terms
    • Pipelining
    • Complex instruction set computer (CISC)
    • Reduced instruction set computer (RISC)
    • Scalar processor
    • Superscalar processor
    • Multitasking
    • Multiprocessing
    • Operating system states
    • User
    • Privileged
    • Operating system protection mechanisms
    • Layering
    • Abstraction
    • Process isolation
    • Hardware segmentation
    • Operating system fundamentals
    • Single user
    • Multi user
    • Software languages
    • Software vulnerabilities and countermeasures
    • Network programming
    • API
    • Applets
    • System security evaluation
    • Certification and PCI
 
  MGT414.5: Security Operations and Business Continuity & Disaster Recovery Planning

The CISSP® exam itself is not hosted by SANS. You will need to make separate arrangements to take the CISSP® exam.

Overview

Non-technical aspects of security are just as critical as technical aspects. Security operations focus on the legal and managerial aspects of security and cover components, such as background checks and nondisclosure agreements, which can eliminate problems from occurring down the road.

This section examines business continuity planning (BCP), comparing the differences between BCP and disaster recovery planning (DRP). A lifecycle model for BCP/DRP is presented that provides scenarios for how each step should be developed.

CPE/CMU Credits: 8

Topics
  • Domain 7: Security Operations
    • Legal requirements
    • Privacy and protection
    • Configuration management and change control
    • Nondisclosure agreements
    • Sensitivity markings
    • Control types
    • Directive controls
    • Preventive controls
    • Detective controls
    • Corrective controls
    • Recovery controls
    • Auditing
    • Reporting concepts and mechanisms
    • Roles and responsibilities
    • Incident response
    • System resilience
  • Domain 8: Business Continuity and Disaster Recovery Planning
    • Business continuity planning (BCP)
    • Disaster recovery planning (DRP)
    • Network security policy
    • Sample disasters
    • BCP-DRP lifecycle
    • Business impact analysis (BIA)
    • Basic elements of continuity planning
    • Steps to building a plan
    • Project initiation
    • Risk analysis and reduction
    • Recovery strategies
    • Developing the continuity plan
    • Exercising and maintaining the plan
    • Training and awareness
    • Alternative sites
    • Hot sites
    • Warm sites
    • Cold sites
    • Hybrid
    • Mobile
    • Types of testing
 
  MGT414.6: Legal, Regulations, Investigations & Compliance, and Physical (Environmental) Security

The CISSP® exam itself is not hosted by SANS. You will need to make separate arrangements to take the CISSP® exam.

Overview

If you work in network security, understanding the law is critical during incident response and investigations. This section examines common types of laws and shows how critical ethics are during any type of investigation.

This section also discusses various aspects and controls of physical security. If you do not have proper physical security, it does not matter how good your network security is - someone can still obtain access to sensitive information.

CPE/CMU Credits: 7

Topics
  • Domain 9: Legal, Regulations, Investigations, and Compliance
    • Code of ethics
    • Types of law
    • Criminal
    • Civil
    • Regulatory
    • Computer security laws
    • International laws
    • Computer crime laws
    • Intellectual property rights
    • Legal liability
    • Investigation steps
    • Computer forensics
    • Rules of evidence
    • Embedding security into contracts and procurement
    • Advanced persistent threat (APT)
  • Domain 10: Physical (Environmental) Security
    • Significance of physical security
    • Personnel safety
    • Objectives
    • Safety
    • Counter-examples
    • Passwords
    • Disk encryption
    • Redundancy
    • Evacuation roles and procedures
    • Access control types
    • Deterrent
    • Preventive
    • Detective
    • Corrective
    • Preventing unauthorized access
    • Locks
    • Mantraps
    • Fences
    • CCTV
    • X-ray
    • Facility requirements
    • Technical controls
    • Environmental controls
    • Protection and securing of equipment
    • Biometrics
 
Additional Information
 
  Who Should Attend
  • Security professionals who want to understand the concepts covered in the CISSP® exam as determined by (ISC)2.
  • Managers who want to understand the critical areas of network security.
  • System, security, and network administrators who want to understand the pragmatic applications of the CISSP® 10 domains.
  • Security professionals and managers looking for practical ways to apply the 10 domains of knowledge to their current activities.

In short, if you desire a CISSP®, or your job requires it, MGT414 is the training for you.

 
  What You Will Receive

Students will receive with this class:

  • The course books for each of the 10 domains
  • Study guide
  • 400 questions to test their knowledge on each domain
 
  You Will Be Able To
  • Understand the 10 domains of knowledge that are covered on the CISSP® exam.
  • Analyze questions on the exam and be able to select the correct answer.
  • Apply the knowledge and testing skills learned in class to pass the CISSP® exam.Understand and explain all of the concepts covered in the 10 domains of knowledge.
  • Apply the skills learned across the 10 domains to solve security problems when you. return to work
 
  Press & Reviews

"This course breaks the huge CISSP study books down into manageable chunks, and helped me focus and identify weaknesses. The instructor's knowledge and teaching skills are excellent." - Jeff Jones, Constellation Energy Group

"This is a must for anyone who is considering taking the CISSP® exam" - Leigh Lopez, CSUN

"This class focuses like a laser on the key concepts you will need to understand the CISSP exam. Do not struggle with thousand page textbooks. Let this course be your guide!" - Carl Williams, Harris Corporation

"I have taken several CISSP prep courses in the last several years and this by far is the best. Finally I feel that I have the confidence to take the test. Thanks." - Jerry Carse, Sarum, LLC

 

Author Statement

The CISSP® certification has been around for almost 20 years and covers security from a 30,000 foot view. CISSP® covers a lot of theoretical information that is critical for a security professional to understand. However, this material can be dry, and since most students do not see the direct applicability to their jobs, they find it boring. The goal of this course is to bring the CISSP® 10 domains of knowledge to life. The practical workings of this information can be discovered by explaining important topics with stories, examples and case studies. I challenge you to attend the SANS CISSP® training course and find the exciting aspect of the 10 domains of knowledge.

- Eric Cole

Additional Resources

Take your learning beyond the classroom. Explore our site network for additional resources related to this course's subject matter.

*CPE/CMU credits not offered for the SelfStudy delivery method

Online options available. Train from any location.
Type
Topic
Course
/ Location
/ Instructor
Date
Register

Training Event
Management Mar 9, 2015 -
Mar 14, 2015
 

Training Event
Management
SANS 2015
Orlando, FL
Apr 11, 2015 -
Apr 18, 2015
 

Training Event
Management May 4, 2015 -
May 12, 2015
 

Community SANS
Management Mar 9, 2015 -
Mar 14, 2015
 

Community SANS
Management
Staff
Mar 23, 2015 -
Mar 28, 2015
 

Community SANS
Management
Staff
Apr 27, 2015 -
May 2, 2015
 

Community SANS
Management
Staff
Apr 27, 2015 -
May 30, 2015
 

Mentor
Management
Mentor Session
Atlanta, GA
Jan 22, 2015 -
Mar 26, 2015
 

Mentor
Management
Mentor Session
Medford, OR
Feb 12, 2015 -
Apr 16, 2015
 

Mentor
Management
Mentor Session
Clarksville, TN
Feb 25, 2015 -
Apr 29, 2015
 

Mentor
Management
Mentor Session
Portland, OR
Mar 17, 2015 -
May 19, 2015
 

Mentor
Management
Mentor Session
Lansing, MI
Mar 19, 2015 -
May 21, 2015
 

Mentor
Management
Mentor Session
Roseville, MN
Mar 19, 2015 -
May 21, 2015
 

vLive
Management
Online
Mar 3, 2015 -
Apr 9, 2015
 

vLive
Management
Online
Staff
Jun 9, 2015 -
Jul 16, 2015
 

vLive
Management
Online
Staff
Sep 8, 2015 -
Oct 14, 2015
 

vLive
Management
Online
Staff
Dec 7, 2015 -
Jan 27, 2016
 

OnDemand
Management
Online
Anytime  

SelfStudy
Management
Online
Anytime  

Onsite
All OnSite Course of Your Choice Your Choice  

*Course contents may vary depending upon location, see specific event description for details.