CISSP schools/courses

Certified Information System Security Professional programs, certificates, diplomas and degrees (On campus, Online or On-site)
Total 45 training courses/programs at schools in Oklahoma City, OK, USA



ONLC Training Centers in Oklahoma

Campuses/Training Centers: Oklahoma City, Tulsa
Phone No.: 800-288-8221

Certified Information System Security Professional (CISSP)

Course Format: Public Course/Instructor-Led/Open Enrollment  V

Upon successful completion of this course, students will be able to:
analyze information systems access control.
analyze security architecture and design.
analyze network security systems and telecommunications.
analyze information security management goals.
analyze information security classification and program development.
analyze risk management criteria and ethical codes of conduct.
analyze application security.
analyze cryptography characteristics and elements.
analyze physical security.
analyze operations security.
apply business continuity and disaster recovery plans.
identify legal issues, regulations, compliance standards, and investigation practices relating to information systems security.

Course Content
Lesson 1: Information Systems Access Control
Topic 1A: Data Access Principles
Topic 1B: System Access and Authentication
Topic 1C: Penetration Tests

Lesson 2: Security Architecture and Design
Topic 2... [Read More]


New Horizons Oklahoma City

Campus/Training Center: Oklahoma City
Phone No.: 405-516-4000

CISSP: Certified Information Systems Security Professional

Course Format: Public Course/Instructor-Led/Open Enrollment  V

Outline :
Lesson 1: Information Security and Risk Management
Information Security Management
Security Awareness Training and Education
Risk Management
Ethics


Lesson 2: Access Control
Definitions and Key Concepts
Information Classification
Access Control Categories and Types
Access Control Threats
Access to Systems/Data
Access Control Technologies
Assurance Mechanisms


Lesson 3: Cryptography
Key Concepts and Definitions
History
Encryption Systems
Symmetric and Asymmetric Algorithms
Message Integrity Controls
Digital Signatures
Management of Cryptographic Systems
Threats and Attacks


Lesson 4: Physical Security
Definitions and Key Concepts
Site Location
Layered Defense Model
Infrastructure Support Systems
Equipment Protection


Lesson 5: Security Architecture and Design
Components and Principles
System Security Techniques
Hardware
Software
S... [Read More]


Northeastern University College of Professional Studies

Campus/Training Center: Online
Phone No.: 1.877.668.7727

CISSP

Course Format: Online/Virtual Classroom/Webinar  V

Includes all ten domains that make up the body of knowledge covered by the CISSP examination. Offers students an opportunity to obtain the knowledge and technical concepts required to achieve this certification. Topics include security management practices, access control systems, telecommunications and network security, cryptography, security architecture and models, operations security, applications and systems development, business continuity planning and disaster recovery planning, law, investigation, and ethics, and physical security. The CISSP certification is governed by the International Information Systems Security Certifications Consortium and is universally recognized as a key component in the selection process for management-level information security positions.


ProTech Professional Technical Services, Inc.

Campus/Training Center: Online
Phone No.: 800-373-9188, 412-810-8855

CISSP (Certificate)

Course Format: Online/Virtual Classroom/Webinar  V

This intensive training course in designed for individuals who are getting prepared to become CISSP certified. In this class, you will be hearing 3.5-4 hour lectures from subject matter experts (SMEs) on each of the ten domains in the Common Body of Knowledge covered in the CISSP exam.

Duration:
5 Days/Lecture &, Lab

Audience:
This course is designed for the information security practitioner who is looking to achieve professional certification as a CISSP (Certified Information Systems Security Professional).

Topics:

Security Management Domain
Business Continuity Planning and Disaster Recovery Planning Domain
Law, Investigations &, Ethics Domain
Operations Security Domain
Physical Security Domain
Access Control Systems
Applications and Systems Development Security Domain
Cryptography Domain
Security Architecture and Models Domain


Skillsoft

Campus/Training Center: Online
Phone No.: 603-324-3000

CISSP (Certificate)

Course Format: Online/Virtual Classroom/Webinar  V

SkillSoft Mentors are available to help students with their studies for the Certified Information Systems Security Professional (CISSP) exam. You can reach them by entering a Mentored Chat Room or by using the E-mail My Mentor service.

Target Audience
Individuals who are studying the associated SkillSoft content in preparation for, or to become familiar with, the skills and competencies being measured by the actual certification exam.

Prerequisites
Familiarity with the exam objectives listed below and skills and competencies being measured in the associated certification exam.

Expected Duration (hours)
0.0

Lesson Objectives

Mentoring Certified Information Systems Security Professional (CISSP)
Access Control
Application Development Security
Business Continuity and Disaster Recovery Planning
Cryptography
Information Security Governance and Risk Management
Legal, Regulations, Investigations and Compliance
Operation... [Read More]

CISSP 2012 Domain: Security Architecture and Design

Course Format: Online/Virtual Classroom/Webinar  V

Computer administrators have a variety of mechanisms that can be used to secure modern enterprise environments. Several access control standards and models have been created by the international community to secure both personnel access and information recovery within an enterprise environment. This course examines hardware and software systems, memory storage types, security models, and security controls. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers

Expected Duration (hours)
2.5

Lesson Objectives

CISSP 2012 Domain: S... [Read More]

CISSP 2012 Domain: Software Development Security

Course Format: Online/Virtual Classroom/Webinar  V

Poorly written systems or applications can allow an attacker to exploit coding errors and thus interrupt the orderly processes of the system or application. This course discusses methods to increase the security of operating system and application development and thwart attacker attempts to manipulate source code. It also covers application and database development models such as the SDLC and how choosing the right model supports security. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers

Expected Duration (hours)
2.0

Lesson Obje... [Read More]

CISSP 2012 Domain: Physical (Environment) Security

Course Format: Online/Virtual Classroom/Webinar  V

Physical security is the foundation for all networking security mechanisms. Unless a network is physically secure from threats, all other types of security can be negated. This course focuses on the need for, and implementation of physical security and how it is used as an all encompassing backbone for enterprise security. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers

Expected Duration (hours)
2.0

Lesson Objectives

CISSP 2012 Domain: Physical (Environment) Security
recognize threats to an organization’s physica... [Read More]

CISSP 2012 Domain: Legal, Regulations, Investigations, and Compliance

Course Format: Online/Virtual Classroom/Webinar  V

Computer crime is a major area of concern for everyone from the standard end user to the enterprise environment. Government agencies and corporate groups have come together to create rules and laws that deal with computer crimes and how perpetrators should be dealt with. This course brings together different aspects of computer crime, such as types of crime, laws to deal with crimes, and the ethics that must be used when investigating crime. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers

Expected Duration (hours)
2.0

Lesson Ob... [Read More]

CISSP 2012 Domain: Business Continuity and Disaster Recovery Planning

Course Format: Online/Virtual Classroom/Webinar  V

Business continuity is an essential part of any enterprise. When a disaster occurs, it is imperative that a company be prepared, and has policies and people in place to step in and restore normal business operations. This course discusses the processes that are used to create a business continuity and disaster recovery plan and strategies for critical resource recovery. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers

Expected Duration (hours)
1.5

Lesson Objectives

CISSP 2012 Domain: Business Continuity and Disaster Recov... [Read More]

CISSP 2012 Domain: Operations Security

Course Format: Online/Virtual Classroom/Webinar  V

In today’s enterprise environment, security operations takes on many faces, but always comes back to making sure that all aspects of the operation of an enterprise environment are secured and functioning correctly. This course delves into the mechanisms used to track security threats, resource protection, and securing the enterprise environment. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers

Expected Duration (hours)
2.5

Lesson Objectives

CISSP 2012 Domain: Operations Security
recognize the activities involved i... [Read More]

CISSP 2012 Domain: Cryptography

Course Format: Online/Virtual Classroom/Webinar  V

Cryptography has been used for thousands of years to secure messages, identities, vital information, and communications mechanisms. This course covers the invention of cryptography, the use of algorithms and ciphers, and the secure mechanisms used for message authentication and certificate authority. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers

Expected Duration (hours)
2.0

Lesson Objectives

CISSP 2012 Domain: Cryptography
define key cryptographic terms
identify the characteristics of quantum cryptography
mat... [Read More]

CISSP 2012 Domain: Information Security Governance and Risk Management

Course Format: Online/Virtual Classroom/Webinar  V

Information Security Governance and Risk Management is an all encompassing domain that the information security professional must constantly be aware of. This course examines the frameworks and planning structures used to make sure that information assets are protected within an organization. This course also examines the governance, organizational structures and cultures, and the awareness training that should be imparted to employees at all levels. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers

Expected Duration (hours)
2.5

... [Read More]

Pages: 1 2 3 4

Ask for Training
Add Courses