CISSP Third Edition Pearson uCertify Course

Gear up to prepare for the ISC2 CISSP certification exam with CISSP Third edition course. The comprehensive study guide provides complete coverage of all the objectives covered in the ISC2 CISSP exam and provide knowledge and skills on the topics such as security capabilities of Information Systems, security architecture maintenance, vulnerabilities of security architectures, designs, and solution elements, vulnerabilities in web-based systems, vulnerabilities in mobile systems, vulnerabilities in embedded devices, and a lot more.

Here's what you will get

The vendor-neutral ISC2 CISSP certification is the ideal credential for those with proven deep technical and managerial competence to design, engineer, implement, and manage the overall information security program to protect organizations. The CISSP certification is created and managed by one of the most prestigious security organizations in the world and has a number of stated goals. Although not critical for passing the exam, having knowledge of the organization and of these goals is helpful in understanding the motivation behind the creation of the exam.

Glossary of terms
Test prep
Pre-assessment Questions
Full Length Tests
Post-Assessment Questions

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Exam FAQs
What are the prerequisites for this exam?

ISC2 has the following pre-requisites:

  • At least five years of cumulative, paid, full-time work experience.
  • In two or more of the eight domains of the (ISC)2 CISSP Common Body of Knowledge (CBK).
What is the exam registration fee? USD 699
Where do I take the exam? Pearson VUE
What is the format of the exam? Multiple choice questions and advanced innovative questions
How many questions are asked in the exam? The exam contains 100-150 questions.
What is the duration of the exam? 180 minutes
What is the passing score? 700

(on a scale of 0-1000)

What is the exam's retake policy?
  • A candidate may sit for CISSP exam up to three times within a 12-month period.
  • If a candidate does not pass the exam the first time, he/she may retest after 30 test-free days.
  • If a candidate does not pass the exam the second time, he/she may retest after an additional 90 test-free days.
  • If a candidate does not pass the exam the third time, he/she may retest after 180 test-free days from their most recent exam attempt.
What is the validity of the certification? Three years
Where can I find more information about this exam? To know more about the Pearson-CISSP-2018, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • Security Auditor
  • Director of Security
  • Security Consultant
  • IT Director/Manager
  • Security Systems Engineer
  • Chief Information Security Officer

Here's what you will learn

  • The Goals of the CISSP Certification
  • The Value of the CISSP Certification
  • The Common Body of Knowledge
  • Steps to Becoming a CISSP
  • Facts About the CISSP Exam
  • About the CISSP Cert Guide, Third Edition
  • Security Terms
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Documentation
  • Business Continuity
  • Personnel Security Policies and Procedures
  • Risk Management Concepts
  • Geographical Threats
  • Threat Modeling
  • Security Risks in the Supply Chain
  • Security Education, Training, and Awareness
  • Review All Key Topics
  • Asset Security Concepts
  • Identify and Classify Information and Assets
  • Information and Asset Ownership
  • Protect Privacy
  • Asset Retention
  • Data Security Controls
  • Information and Asset Handling Requirements
  • Review All Key Topics
  • Engineering Processes Using Secure Design Principles
  • Security Model Concepts
  • System Security Evaluation Models
  • Certification and Accreditation
  • Control Selection Based upon Systems Security Requirements
  • Security Capabilities of Information Systems
  • Security Architecture Maintenance
  • Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Vulnerabilities in Web-Based Systems
  • Vulnerabilities in Mobile Systems
  • Vulnerabilities in Embedded Devices
  • Cryptography
  • Cryptographic Types
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Public Key Infrastructure
  • Key Management Practices
  • Message Integrity
  • Digital Signatures
  • Applied Cryptography
  • Cryptanalytic Attacks
  • Digital Rights Management
  • Site and Facility Design
  • Site and Facility Security Controls
  • Review All Key Topics
  • Secure Network Design Principles
  • IP Networking
  • Protocols and Services
  • Converged Protocols
  • Wireless Networks
  • Communications Cryptography
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks
  • Review All Key Topics
  • Access Control Process
  • Physical and Logical Access to Assets
  • Identification and Authentication Concepts
  • Identification and Authentication Implementation
  • Identity as a Service (IDaaS) Implementation
  • Third-Party Identity Services Integration
  • Authorization Mechanisms
  • Provisioning Life Cycle
  • Access Control Threats
  • Prevent or Mitigate Access Control Threats
  • Review All Key Topics
  • Design and Validate Assessment and Testing Strategies
  • Conduct Security Control Testing
  • Collect Security Process Data
  • Analyze and Report Test Outputs
  • Conduct or Facilitate Security Audits
  • Review All Key Topics
  • Investigations
  • Investigation Types
  • Logging and Monitoring Activities
  • Resource Provisioning
  • Security Operations Concepts
  • Resource Protection
  • Incident Management
  • Detective and Preventive Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery
  • Testing Disaster Recovery Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety and Security
  • Review All Key Topics
  • Software Development Concepts
  • Security in the System and Software Development Life Cycles
  • Security Controls in Development
  • Assess Software Security Effectiveness
  • Security Impact of Acquired Software
  • Secure Coding Guidelines and Standards
  • Review All Key Topics
Pearson-CISSP-2018_pro Pearson-CISSP-2018_pro
CISSP Third Edition Pearson uCertify Course
ISBN : 9781644590089
Rating :