Premium Features

Previous Buy now to get complete version Next
  • Home
uCertify Logo
  • login
  • Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Powered by uCertify
  • Request Demo
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

CISSP Third Edition Pearson uCertify

(Pearson-CISSP-2018-complete) / ISBN: 978-1-64459-010-2
This course includes
Lessons
TestPrep
LiveLab
Pearson-CISSP-2018-complete : CISSP Third Edition Pearson uCertify
6 Reviews
Try this course Pre-Assessment and first two Lessons free No credit card required
Are you an instructor? Teach using uCertify products
Request a free evaluation copy

CISSP Third Edition Pearson uCertify

Gain hands-on experience to pass the (ISC)² CISSP exam with the CISSP Third edition course and lab. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The CISSP training course and lab completely cover all the objectives of the CISSP certification exam and include topics such as information and asset ownership, protect privacy, asset retention, data security controls, and more.
Here's what you will get

The (ISC)² CISSP certification is a vendor-neutral and highly acknowledged cybersecurity credential. This certification is for those with deep technical and managerial competence to design, engineer, implement, and manage overall information security programs to protect organizations. The CISSP certification is created and managed by one of the most prestigious security organizations in the world and has several stated goals.

Lessons
  • 9+ Lessons
  • 1+ Exercises
  • 149+ Quizzes
  • 920+ Flashcards
  • 920+ Glossary of terms
TestPrep
  • 298+ Pre Assessment Questions
  • 2+ Full Length Tests
  • 300+ Post Assessment Questions
  • 600+ Practice Test Questions
LiveLab
  • 49+ LiveLab
  • 49+ Video tutorials
  • 09:08+ Hours
Video Lessons
  • 13+ Videos
  • 01:52+ Hours
Here's what you will learn
Download Course Outline
Lesson 1: Introduction
  • The Goals of the CISSP Certification
  • The Value of the CISSP Certification
  • The Common Body of Knowledge
  • Steps to Becoming a CISSP
  • Facts About the CISSP Exam
  • About the CISSP Cert Guide, Third Edition
Lesson 2: Security and Risk Management
  • Security Terms
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Documentation
  • Business Continuity
  • Personnel Security Policies and Procedures
  • Risk Management Concepts
  • Geographical Threats
  • Threat Modeling
  • Security Risks in the Supply Chain
  • Security Education, Training, and Awareness
  • Review All Key Topics
Lesson 3: Asset Security
  • Asset Security Concepts
  • Identify and Classify Information and Assets
  • Information and Asset Ownership
  • Protect Privacy
  • Asset Retention
  • Data Security Controls
  • Information and Asset Handling Requirements
  • Review All Key Topics
Lesson 4: Security Architecture and Engineering
  • Engineering Processes Using Secure Design Principles
  • Security Model Concepts
  • System Security Evaluation Models
  • Certification and Accreditation
  • Control Selection Based upon Systems Security Requirements
  • Security Capabilities of Information Systems
  • Security Architecture Maintenance
  • Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Vulnerabilities in Web-Based Systems
  • Vulnerabilities in Mobile Systems
  • Vulnerabilities in Embedded Devices
  • Cryptography
  • Cryptographic Types
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Public Key Infrastructure
  • Key Management Practices
  • Message Integrity
  • Digital Signatures
  • Applied Cryptography
  • Cryptanalytic Attacks
  • Digital Rights Management
  • Site and Facility Design
  • Site and Facility Security Controls
  • Review All Key Topics
Lesson 5: Communication and Network Security
  • Secure Network Design Principles
  • IP Networking
  • Protocols and Services
  • Converged Protocols
  • Wireless Networks
  • Communications Cryptography
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks
  • Review All Key Topics
Lesson 6: Identity and Access Management (IAM)
  • Access Control Process
  • Physical and Logical Access to Assets
  • Identification and Authentication Concepts
  • Identification and Authentication Implementation
  • Identity as a Service (IDaaS) Implementation
  • Third-Party Identity Services Integration
  • Authorization Mechanisms
  • Provisioning Life Cycle
  • Access Control Threats
  • Prevent or Mitigate Access Control Threats
  • Review All Key Topics
Lesson 7: Security Assessment and Testing
  • Design and Validate Assessment and Testing Strategies
  • Conduct Security Control Testing
  • Collect Security Process Data
  • Analyze and Report Test Outputs
  • Conduct or Facilitate Security Audits
  • Review All Key Topics
Lesson 8: Security Operations
  • Investigations
  • Investigation Types
  • Logging and Monitoring Activities
  • Resource Provisioning
  • Security Operations Concepts
  • Resource Protection
  • Incident Management
  • Detective and Preventive Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery
  • Testing Disaster Recovery Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety and Security
  • Review All Key Topics
Lesson 9: Software Development Security
  • Software Development Concepts
  • Security in the System and Software Development Life Cycles
  • Security Controls in Development
  • Assess Software Security Effectiveness
  • Security Impact of Acquired Software
  • Secure Coding Guidelines and Standards
  • Review All Key Topics

Hands on Activities (Live Labs)

Security and Risk Management

  • Setting Up Kerberos Delegation
  • Assigning Permissions to Folders
  • Taking Incremental Backup
  • Taking a Full Backup
  • Configuring RAID 5

Asset Security

  • Completing the Chain of Custody
  • Restricting Local Accounts
  • Using Windows Firewall
  • Configuring Linux Firewall Using Iptable 

Security Architecture and Engineering

  • Generating a Symmetric Key
  • Generating an Asymmetric Key
  • Encrypting the Disk
  • Encrypting a File or Folder
  • Using OpenSSL to Create a Public/Private Key Pair
  • Observing an MD5-Generated Hash Value
  • Observing an SHA-Generated Hash Value
  • Causing a DarkComet Trojan Infection
  • Using the John the Ripper Tool
  • Attacking a Website Using XSS Injection
  • Conducting a Cross-Site Request Forgery Attack
  • Using Social Engineering Techniques to Plan an Attack
  • Configuring Audit Group Policy 
  • Enabling Intrusion Prevention and Detection
  • Using Burp Suite

Communication and Network Security

  • Configuring VLAN
  • Configuring a VPN
  • Using Ettercap for ARP Spoofing
  • Setting Up a Honeypot
  • Creating ACL (Access Control Lists) in router
  • Configuring IPSec
  • Configuring Static Routing
  • Configuring Dynamic Routing
  • Configuring Static NAT
  • Configuring Dynamic NAT
  • Defending against IP Spoofing
  • Performing Session Hijacking Using Burp Suite

Identity and Access Management (IAM)

  • Configuring Extended Access Control List
  • Configuring User Access Control Settings in Windows
  • Creating ACL with Iptables
  • Creating a Password Policy in Windows
  • Creating a Password Policy in Linux

Security Assessment and Testing

  • Reviewing an Authorization Letter for Penetration Testing
  • Using nmap for Scanning
  • Scanning Ports Using Metasploit
  • Exploiting Windows 7 Using Metasploit
  • Enabling a Keylogger in a Target Machine

Security Operations

  • Conducting Vulnerability Scanning Using Nessus
  • Configuring Snort

Software Development Security

  • Exploiting a Website Using SQL Injection
Exam FAQs
What are the prerequisites for this exam? To qualify for this cybersecurity certification, you must pass the exam and have at least five years of cumulative, paid work experience in two or more of the eight domains of the (ISC) CISSP Common Body of Knowledge (CBK).
What is the exam registration fee? USD 699
Where do I take the exam? Pearson VUE
What is the format of the exam? Multiple choice and advanced innovative questions
How many questions are asked in the exam? The exam contains 100-150 questions.
What is the duration of the exam? 240 minutes
What is the passing score? 700
What is the exam's retake policy?
  • If you don’t pass the exam the first time, you can retest after 30 days.
  • If you don’t pass a second time, you can retest after an additional 90 days.
  • If you don’t pass a third time, you can retest after 180 days from your most recent exam attempt.
What is the validity of the certification? Three years
Where can I find more information about this exam? Know more about the CISSP
What are the career opportunities after passing this exam?
  • Security Auditor
  • Security Analyst
  • Security Manager
  • Security Architect
  • Network Architect
  • Director of Security
Customer Testimonials
Waleed Rafique
I found the course to be best among all. The course is designed in such a way that even a beginner can learn it very easily and ultimately achieve the goal of completing the certification in one go.
Abraham Terhemen Adeke
uCertify CISSP 2018 course is very exciting because I had encounter new questions, the course is great and for sure it helps a lot on my exam preparation, thanks for giving me an opportunity to this kind of exam preparation. The course has covered every single detail that any CISSP student must know. More interesting thing I would like to specially mention is, "Even If you are an absolute beginner they have provided all the modules to make it easy to learn".
Christopher Banda
The uCertify CISSP course will allow the learners to practice after going through each chapter and knowledge area in detail and test himself. All course questions are based on real ISC2 CISSP certification exam that will help you to prepare for your certification thoroughly. I encourage everyone who is preparing for Certified Information Systems Security Professional (CISSP) certification to go through uCertify courses and labs. This uCertify exam will really prep you for the actual exam. I will definitely recommend to you all and my friends to use uCertify course and labs for prep.

Show more

×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept