Join Mike Chapple for an in-depth discussion in this video What you need to know, part of CISSP Cert Prep: 6 Security Assessment and Testing.
- [Instructor] This course is designed for students who already have some hands-on experience with cybersecurity. Remember, you'll need either five years of full-time cybersecurity work experience, or four years of experience on a college degree in a relate field, before you can earn the CISSP credential. If you don't yet have the required experience, you can still take the exam and this course will help you prepare. After passing the exam, you'll then have six years to gain the required experience and become a fully certified CISSP.
If you're a security professional with some work experience under your belt, this course will help you fill in any gaps in your knowledge and build a solid foundation as you prepare to take the CISSP exam.
Looking for study partners?Join the CISSP Exam study group
Learn about security assessment and testing practices needed to prepare for the Certified Information Systems Security Professional (CISSP) exam. CISSP—the industry's gold standard certification—is necessary for many top jobs. This course helps you approach the exam with confidence by providing coverage of key topics, including threat assessment, log monitoring, and software testing. It also covers disaster recovery and security process assessment. Students who complete this course will be prepared to answer questions on the sixth CISSP exam domain: Security Assessment and Testing.
Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
Note: This course is part of a series releasing throughout 2018. A completed Learning Path of the series will be available once all the courses are released.
- Using security assessment tools
- Scanning for vulnerabilities
- Threat assessment techniques
- Performing penetration testing
- Reviewing monitor logs
- Performing code reviews
- Performing fuzz testing and misuse case testing
- Analyzing coverage
- Assessing disaster recovery sites and backups
- Testing BC/DR plans
- Collecting security process data and metrics
- Auditing and control management