top of page
cissp background 5.jpg

CISSP Course Outline


Chapter 1: Introduction
Chapter 2: Security Governance Through Principles and Policies
Chapter 3: Personnel Security and Risk Management Concepts
Chapter 4: Business Continuity Planning
Chapter 5: Laws, Regulations, and Compliance
Chapter 6: Protecting Security of Assets
Chapter 7: Cryptography and Symmetric Key Algorithms
Chapter 8: PKI and Cryptographic Applications
Chapter 9: Principles of Security Models, Design, and Capabilities
Chapter 10: Security Vulnerabilities, Threats, and Countermeasures
Chapter 11: Physical Security Requirements
Chapter 12: Secure Network Architecture and Securing Network Components
Chapter 13: Secure Communications and Network Attacks
Chapter 14: Managing Identity and Authentication
Chapter 16: Security Assessment and Testing
Chapter 17: Managing Security Operations
Chapter 18: Preventing and Responding to Incidents
Chapter 19: Disaster Recovery Planning
Chapter 20: Investigations and Ethics
Chapter 21: Software Development Security
Chapter 22: Malicious Code and Application Attacks

bottom of page