LearnKey Training

CISSP Information Security & Risk Management 2008

CISSP Information Security & Risk Management 2008

Back to Product Page

CISSP Information Security & Risk Management 2008

1 Sessions -
3 Hours of Interactive Training

Information Security & Risk Management is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers the CIA triangle, security risk assessment, policy and other CBK elements of the Security Management Practices domain. At the conclusion of this course, you will be familiar with the issues and concepts of the Information Security & Risk Management domain required to pass the CISSP exam.

  • One of the valuable domains which leads to CISSP certification
  • Boost your earning potential through accreditation in CISSP
  • Information security skills are in demand throughout the world

About The Author
Michael Solomon, CISSP, PMP®, TICSA, is a speaker, consultant and trainer who specializes in project management and database application-level security topics. Since 1987 Solomon has worked on IT projects or instructed for more than 60 organizations including EarthLink, Nike, Lucent Technologies, BellSouth, UPS, Boart Longyear, and the U.S. Coast Guard. Solomon holds an MS in Computer Science from Emory University (1998), and a BS in Computer Science from Kennesaw State University (1987) where he was also an instructor from 1998 - 2001. He has been a contributor to various certification books.

Session 1

Section A: Introduction

  • Why CISSP?
  • Requirements
  • Required Domains

Section B: The Security Triangle

  • Securing the System
  • Confidentiality
  • Integrity
  • Availability

Section C: Security Management Training

  • Information Security Governance
  • Audit Frameworks for Compliance
  • Security Administration
  • Organizational
  • Physical Risks
  • Human Risks
  • Risk Management Terms
  • Risk Management Options
  • Legal Responsibility
  • Risk Assessment Methodologies
  • Risk Assessment Team

Section D: Risk Assessment

  • Overview
  • Cost vs. Benefit
  • Single Loss Expectancy
  • Annual Loss Expectancy
  • Calculating Overall Risk
  • Pros and Cons
  • Qualitative Assessment
  • Selecting Controls

Section E: Security Policy

  • Overview
  • Security Policy Types
  • Standards
  • Guidelines
  • Procedures

Section F: Job Policies and Training

  • Hiring Practices
  • Termination Practices
  • Job Descriptions
  • Job Activities
  • Security Awareness
  • Tailoring Training
  • ISO Responsibilities

Section G: Ethics

  • Overview
  • (ISC)2 Code of Ethics
  • Ten Commandments
  • RFC 1087
  • Ethics Topics
  • Common Computer Ethics Fallacies