Friday 28 March 2014

Certified Information Systems Security Professional (CISSP)

Course Overview

The Certified Information Systems Security Professional (CISSP) certification provides information security professionals with not only an objective measure of competence but also a globally recognized standard of achievement.This designation is the first credential accredited by ANSI to ISO Standard 17024:2003 in the field of information security.


Course Objectives

This course enables participants to:
  • Understand information security and risk management concepts and practices.
  • Differentiate between the tools available for the protection of information.
  • Explain the mechanisms required to provide assurance of information security controls.
  • Understand the threats and vulnerabilities to information technology.
  • Demonstrate competence in the 10 domains of the International Information Systems Security Certification Consortium (ISC)² CISSP CBK.

Who should Attend

Professionals seeking comprehensive knowledge of security and possibly CISSP certification.This includes,but not limited to,IT Consultants, Information security officers,Managers,Network administrators,Security device administrators,Security policy writers, Privacy officers,and Security engineers.

Degree Holder:


●  4 years of direct full-time security professional work experience in two or more of the ten domains of the  (ISC)2 CISSP CBK


Non-Degree Holder:

●  Min. of 5 years of direct full-time security professional work experience in two or more of the ten domains of the (ISC) 2 CISSP CBK

Course Duration

35 Hours (5 Days)

Course Outline

  • Operations Security
  • Access Control
  • Cryptography
  • Security Architecture and Design
  • Telecommunications and Network Security
  • Application Security
  • Disaster Recovery and Business Continuity
  • Legal, Regulations,Compliance, and Investigations
  • Physical (Environmental) Security
  • Information Security and Risk Management

Wednesday 26 March 2014

CISSP Sample Question

Question No:1

Which is NOT a property of a bridge?

A. Operates at Layer 2, the Data Link Layer
B. Operates at Layer 3, the Network Layer
C. Forwards the data to all other segments if the destination is not on the local segment
D. Can create a broadcast storm

Answer: B

Explanation:

The correct answer is Operates at Layer 3,the Network Layer. A bridge operates at Layer 2 and therefore does not use IP addressing to make routing decisions.

Question No:2

The definition A mark used in the sale or advertising of services to identify the services of one person and distinguish them from the services of others refers to a:

A. Trade name
B. Trademark
C. Service mark
D. Copyright

Answer: C

Explanation:

For answer a trademark is a distinctive mark of authenticity,through which the products of particular manufacturers or the vendible commodities of particular merchants may be distinguished from those of others.Answer a trade name is any designation which is adopted and used by a person to denominate goods which he markets,or services which he renders or business which he conducts. A trade name is descriptive of a manufacturer or dealer and applies to business and goodwill. A trademark is applicable only to vendible commodities.In answer a copyright is an intangible,incorporeal right granted by statute to the author or  originator of certain literary or artistic productions,whereby he is invested,for a statutorily prescribed period, with the sole and exclusive privilege of multiplying copies of the same and publishing and selling them. (These definitions were also taken from Blacks Law Dictionary,Abridged Fifth Edition,West Publishing Company,St. Paul Minnesota,1983.)