Maricopa Community Colleges  ITS297   20056-20086 
Official Course Description: MCCCD Approval: 07/22/08
ITS297 20056-20086 LEC 4 Credit(s) 4 Period(s)
CISSP/SSCP Exam Preparation
Preparation for Certified Information Systems Security Professional/Systems Security Certified Practitioner (CISP/SSCP) certification. Comprehensive review of the Common Body of Knowledge (CBK). Includes each of the ten domains within the CBK.
Prerequisites: Certificate of Completion in Information Security Technology or permission of instructor or department.
Go to Competencies    Go to Outline
 
MCCCD Official Course Competencies:
 
ITS297   20056-20086 CISSP/SSCP Exam Preparation
1. Describe fully each of the 10 domains within the Common Body of Knowledge (CBK). (I-X)
2. Describe the key components of security management practices. (I)
3. Identify the purpose of, and describe the key elements of a Security Policy. (I)
4. Define the steps for Risk Management, including how to analyze and quantify risk. (I)
5. Identify and describe the security control types. (II)
6. Describe the steps of implementing Access Control Mechanisms, including all forms of authentication, biometrics, and effective password practices. (II)
7. Describe and implement all of the Access Control Models (Discretionary, Mandatory, and Role-based Access Control). (II)
8. Describe the computer architecture components. (III)
9. Describe different secure computing evaluation standards. (III)
10. Define the Key Components of Physical Security. (IV)
11. Describe methods to secure sites and facilities, from various threats including environmental. (IV)
12. Describe network topologies and protocols. (V)
13. Describe the historical aspects of Cryptography. (VI)
14. Identify weaknesses, and methods for breaking encryption. (VI)
15. Describe the differences between symmetric and asymmetric encryption. (VI)
16. Define the key components of Public Key Cryptography including key management and data encryption technology. (VI)
17. Describe the elements of a complete and effective Business Continuity Plan and Disaster Recovery Plan including performing and analyzing the results of a Business Impact Analysis, developing a Disaster Recovery Team, and determining appropriate prevention controls. (VII)
18. Describe management-level issues relative to computer law, investigations and ethics. (VIII)
19. Describe the key aspects of security relating to applications and systems development. (IX)
20. Describe change control, configuration management issues, software development, application development methodology, object-oriented programming, module interaction, cohesive and coupling, distributed computing, java security, database systems, database security mechanisms, data mining, artificial intelligence, artificial neural networks, malicious code, and attack types. (IX)
21. Describe audit components and various methods of data collection. (X)
22. Identify various monitoring devices and techniques. (X)
Go to Description    Go to top of Competencies
 
MCCCD Official Course Outline:
 
ITS297   20056-20086 CISSP/SSCP Exam Preparation
    I. Security Management
        A. Security Management Responsibilities
        B. Administering Security with Supporting Controls
        C. Fundamental Principles of Security: Availability, Integrity and Confidentiality
        D. Organizational Security Model
        E. Risk Management and Risk Analysis
        F. Information Classification and Documentation
        G. Separation of Duties/Responsibilities
        H. Employment Practices and Evaluations
        I. Security Awareness and Assessment
        J. Privacy Issues and Regulations
        K. Certification and Accreditation
        L. Security Planning Process and Policy Development
        M. Configuration controls and accepted industry practices
      II. Access Control
          A. Access Control Models, Methodologies and Implementations
          B. Understand and Identify Control Attacks
          C. Best Practices for Access Control Administration
          D. Remote Access Authentication
          E. Identification, Authentication, Authorization, and Accountability (AAA)
          F. Designing, Coordinating and Evaluating Penetration Testing
        III. Security Architecture
            A. Elements of Security Architecture
            B. Theoretical Concepts of Security Models
            C. System Security techniques: prevention, detection, and corrective controls
            D. Information Systems Evaluation Models
          IV. Physical Security
              A. Methods of Securing sites and facilities
              B. Environmental and safety measures
              C. Site Selection and Facility Design Configuration
              D. Perimeter and Building Grounds Protections
              E. Physical Security Threats
              F. Enterprise Identity Management
              G. Portable Devices and Components
            V. Telecommunications and Networking Security
                A. Securing Data, Voice, and Facsimile Communications
                B. Network Components and Physical Media Types
                C. Types of Networks and Topologies
                D. Network Communications and Protocols
                E. Network Based Attacks: prevention and controlling potential threats
                F. Wireless Technologies
                G. Remote Access Protocols
                H. Telecommunications Security Management and Techniques
                I. Configurations of Internets, Intranets, and Extranets
              VI. Cryptography
                  A. History of Cryptography
                  B. Goals of Cryptosystems
                  C. Types and uses of Cryptography
                  D. Methods of Encryption
                  E. Public Key Infrastructure (PKI)
                  F. Message Integrity
                  G. Key Management Techniques
                  H. E-mail Security Standards
                  I. Internet Security
                  J. Cryptographic Attacks
                  K. Digital Signatures
                  L. Message Digests
                  M. Certification
                  N. Alternative methods
                VII. Business Continuity Planning And Risk Response And Recovery
                    A. Business Continuity and Disaster Recovery Strategies
                    B. Business Impact Analysis
                    C. Business Continuity Planning Requirements
                    D. Asset Identification and Evaluation
                    E. Recovery and Restoration Plans
                    F. Testing and Evaluation of Threats, Vulnerabilities and Exposures.
                    G. Emergency Response plans
                    H. Incident Investigation and Handling
                    I. Backup Methods
                    J. Recovery Alternatives Evaluation
                  VIII. Law, Investigation, And Ethics
                      A. International Laws and Legal Systems
                      B. Professional Ethics
                      C. Parameters of Investigations
                      D. Forensic Procedures
                      E. Liability and Legal Ramifications
                    IX. Applications Security
                        A. Device versus Software Security
                        B. Application Environment and Security Controls
                        C. System Life Cycle and Security
                        D. Databases: Threats, Vulnerabilities, and Protections
                        E. Application and System Vulnerabilities and Threats
                        F. Types of Malicious Codes
                        G. Malicious Code and non-technical Attacks
                        H. Countermeasure Techniques and Awareness Programs
                        I. Software Copy/Download Protections
                        J. Mobile Code Threats
                      X. Operations Security And Audit And Monitoring
                          A. Resource Protection
                          B. Administrative Management and Control
                          C. Attack Response: handling of Violations Incidents and Breaches
                          D. Audit Processes and Types of Controls
                          E. Audit Log Review and Protection
                          F. Monitoring Devices and Techniques
                      Go to Description    Go to top of Competencies    Go to top of Outline