Home Link

For Businesses

Business Services

Helping the Businesses in our Community.

Regional Services

Everything you need to know to grow in Yavapai County.

Grant Assistance

From grant research to writing services.

Data and Analytics

Research for sustainable business growth.

Quest Grant

Learn for free and earn certificates with QUEST!

About Yavapai County

Everything you need to know about commerce Yavapai County.

For Employees & Job Seekers

Career Resources

Personalized training, career counseling, scholarships, and more!

On-Demand Courses

Learn new skills and get ready for your next career move.

Job Fairs and Events

Connect with employers through local job fairs and career events.

Hot Jobs

Top Jobs, Occupations, and Skills in Yavapai County

Job Postings Data Trends

Explore the latest data on job opportunities available from local employers

Events

Loading upcoming events...

On-Demand Training

On-Demand Course Options

See and compare the different course bundles and trainings available through the REDC.

A la carte Courses

Choose your own individual courses.

Blog

Keep up with the REDC and find more education resources in our blog.

Subject Matter Expert

Train employees and businesses in leadership, professional development, communication, and more

Back to all courses

CISSP® Exam Prep Course

$549
Self-Paced40 Course Hours | 25 Weeks
View Course
Cybersecurity & CISSP®
CISSP® Exam Prep Course

Description

The CISSP® Exam Prep Course prepares test-takers for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP® certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024. As security breaches outpace the available pool of security experts, the need for information security professionals with proper certifications will continue to grow. Among other titles, obtaining the CISSP® certification prepares one for a position as a Security Analyst, Chief Information Security Officer, or as a Security Architect.

credits

  • PMI PDUs: 40
    • Leadership PDUs: 5
      • Strategic & Business Management PDUs: 11.5
        • Technical PM PDUs: 23.5
          • IACET CEUs: 4

            features

            • Mobile-friendly
            • Real-world case studies
            • Guaranteed exam passing
            • Fully accessible
            • Games & Flashcards
            • Over 300 practice questions
            • Expert-supported
            • Video content
            • Audio-enabled
            • Badge and credit-awarding

            learning Outcomes

            • Discuss the foundational concepts of information security, such as the CIA triad
            • Know the different information security frameworks
            • Explain information security training and education
            • Discuss the information life cycle
            • Explain how information and data are classified
            • Learn about data and information privacy
            • Understand system and computer architecture
            • Explain and compare symmetric and asymmetric cryptography
            • Learn about physical security risks and mitigation
            • Compare different types of networks
            • Contrast the OSI model with the TCP/IP Model
            • Identify and differentiate among network, routing, and data link protocols
            • Describe the functions of common networking devices and how wireless networks work
            • Evaluate different identification methods and technologies
            • Assess and test various security controls
            • Describe business continuity and disaster recovery plans
            • Understand the role of security operations
            • Identify trusted recovery techniques
            • Relate the steps required in effective incident management
            • Discuss the role of auditing, monitoring, and detection in information security
            • Learn the steps of a digital forensics investigation
            • Explain the software development life cycle
            • Discuss the role of databases in information security
            • Recognize several software-based and network attacks

            related courses

            Home LinkThe REDC is a Division of Yavapai College.Go to yc.edu

            Sign up for the REDC Newsletter

            Stay in touch with the REDC and learn how we are impacting our community!
            Contact Us