CISSP Certification Online Course

CISSP Certification Online Courses in South Africa

 

2KO offers an online CISSP course in South Africa for students who are unable to attend full time CISSP training. 2KO Africa's CISSP (Certified Information Systems Security Professional) online course covers certification topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the ten domains of information system security knowledge. 2KO International supplies computer training all over Africa, starting from beginner level to advanced certification, and is also a top supplier of internationally recognised online computer courses from the comfort of home or work. 2KO's online courses are also available as full-time instructor led courses in Cape Town for groups of four or more students, giving our students hands on skills to help prepare for International CISSP certification exams.


About CISSP
The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.

Backed by (ISC), the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.

 

Download the course outline

2KO Africa's CISSP training course maps directly to the exam objectives and offers numerous features such as exam tips, case studies, and practice exams.

 

Certified Information Systems Security Professional CISSP

 

Access Control

General Concepts

Authentication

Principles

Types and Categories

Reference Monitor

Techniques

Models

Passwords

Smart Cards

Biometrics

Access Control Systems

Administration

Residuals

Accountability

Summary

Telecommunications and Network Security

 

OSI Reference Model

ISO/OSI Layers and Characteristics

Topologies

LAN Access Methods

Wireless

System and Security Management

Internet Protocols and Security

Firewall Terms and Types

Web Security

Common Attacks

Remote Access Security

Summary

Information Security Governance and Risk Management

 

Key Concepts

Definitions

Key Concepts

Risk Management

Risk Assessment

Useful Formulas

3rd Party Governance

Information Classification

Roles and Responsibilities

Written Guidance

Policies and Standards

Employment Policies

Employee Education Programs

Change Management

Summary

Software Architecture and Design

 

Problems

Databases

Query Language

Object Oriented

Applications Beyond the Database

Definitions

Application System Development

Controls

Compiled vs. Interpreted

Vulnerabilities

Botnets

Summary

Cryptography

 

Definitions

Cryptanalysis Terms

Symmetric Encryption

Asymmetric Encryption

Hybrid Encryption

Public Key Infrastructures

Hash Functions

Digital Signatures

Protocol Based

Pretty Good Privacy

Cracking Techniques

Summary

Security Architecture and Design

 

Abstract Levels

Computer Hardware

Operating Systems

Processors

Types of Storage

Information Security Architecture

Open and Closed Systems

Access Controls

Architectural Foundation

Modes of Operation

Certification and Accreditation

Evaluation Criteria

Security Models

Summary

Operations Security

 

Threats in an Operating Environment

Control Categories

Accountability

Trusted Recovery

Management and Administrative Control

Due Care and Diligence

Hardware and Software Controls

Email and Fax

Privilege

Physical Access

Monitoring Techniques

Problem Management

Threats and Vulnerabilities

Defense in Depth

Summary

Business Continuity and Disaster Recovery

 

The Basics

Reasons for BCP

Key Concepts

Definitions

Business Continuity Life Cycle

Project Initiation

Business Impact Analysis

Assessing Risk

Recovery Strategies

Off-Site Requirements

Data Redundancy

System Backups

Plan Development

Testing and Maintenance

Stages in an Incident

Summary

Legal Requirements and Investigations

 

Ethics

Code of Ethics

Laws

Intellectual Property

Proprietary Rights

Liability

Computer Crime

Computer Crime Laws

Computer Investigation

Investigation Steps

Computer Forensics

Evidence Admissibility

Summary

Physical and Environmental Security

 

Physical Security

Crime Prevention

Site Design and Configuration

Boundary Protection

Computing Facility Requirements

Fire Prevention

Fire Suppression

Fire Classes

Media Protection

Access Controls

Physical Security

Summary

Course Summary