CISSP : Certified Information Systems Security Pro

Certified Information Systems Security Pro
ISBN : 978-1-61691-171-3
Gain hands-on expertise in (ISC)² CISSP certification exam with CISSP - Certified Information Systems Security Pro. The course focuses on the objectives covered in (ISC)² CISSP exam and helps in engineering, implementing and managing overall information security program to protect organizations from growing sophisticated attacks. The (ISC)²'s CISSP certification is an industry recognized credential and is designed to certify the competency of IT professionals to design, engineer, implement, and manage the overall information security program of an organization.


uCertify uses content from well known publishers, instructors, and subject matter experts. They have a minimum of 15 years of experience in their fields. uCertify brings these textbooks to life. It is full of interactive activities that keep the learner engaged. uCertify brings all available learning resources for a topic in one place so that the learner can efficiently learn without going to multiple places. Challenge questions are also embedded in the chapters so learners can attempt those while they are learning about that particular topic. This helps them grasp the concepts better because they can go over it again right away which improves learning. At the end of every lesson, uCertify courses guide the learners on the path they should follow.

uCertify platform supports 50+ different types of interactive activities, connect the idea, or try it yourself lab activities embedded throughout its course. These interactive activities keep learners engaged and make learning fun.

Here's What You Get

Exercises Flashcards Quizzes Glossary

Each lesson comes with Exercises, Flashcards & Quizzes. There is no limit to the number of times learners can attempt these. Exercises come with detailed remediation, which ensures that learners are confident on the topic before proceeding. Flashcards help master the key concepts. Glossary defines the key terms.

Exercise Questions
Glossary of terms

Test Prep & Practice Questions

uCertify provides full length practice tests. These tests closely follow the exam objectives and are designed to simulate real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure that learners are prepared for the certification exam.

Here's What You Get

Pre-assessments Questions
Full Length Tests
Post-Assessments Questions


Full Remediation

Each question comes with detailed remediation explaining not only why an answer option is correct but also why the incorrect answer options are incorrect.

Unlimited Practice

Each test can be taken unlimited number of times until the learner feels they are prepared. Learner can review the test and read detailed remediation. Detailed test history is also available.

Learn, Test and Review Mode

Each test set comes with learn, test and review modes. In learn mode, learners will attempt a question and will get immediate feedback and complete remediation as they move on to the next question. In test mode, learners can take a timed test simulating the actual exam conditions. In review mode, learners can read through one item at a time without attempting it.


Mentoring is Add-on licence, please select while purchasing. Our Mentors are available 24/7 to provide you an expert support via online chating. They are subject matter experts and ready to provide answer to your questions.

Exam Information

The Certified Information Systems Security Professional exam is a standalone certification from (ISC)² with the exam code CISSP. The certification is targeted at professionals who want to develop policies and procedures in information security. The exam covers critical topics in security, including cloud computing, mobile security, application development security, risk management and more.

Prepare for the following certification

Career Prospects
  • Security Auditor
  • Security Analyst
  • Security Manager
  • Security Architect
  • Network Architect
  • Director of Security
  • Security Consultant
  • IT Director/Manager
  • Security Systems Engineer
  • Chief Information Security Officer
Exam FAQs
What is the exam registration fee?
USD 599

CISSP Certified Professionals must also pay an annual maintenance fee of USD 85 per year.

Where do I take the exam?
The (ISC)² CISSP exam is administered by Pearson VUE at testing centers worldwide. Click here to find a testing center near you.
What is the format of the exam?
  • Hotspot
  • Drag and drop
  • Multiple choice
What are the pre-requisites of the exam?
Candidate must have a minimum of five years cumulative paid full-time work experience in two or more of the 10 CISSP domains. Click here for more information.
How many questions are asked in the exam?
The exam contains 250 questions.
What is the duration of the exam?
360 minutes
What is the passing score?

(on a scale of 0-1000)

What is the exam's retake policy?
Test takers who do not pass the examination the first time will be able to retest after 30 days. Test takers who fail second time will need to wait 90 days prior to sitting for the examination again. In the unfortunate event that a candidate fails a third time, the next available time to sit for the examination will be 180 days after the most recent exam attempt. Candidates are eligible to sit for (ISC)² examinations a maximum of 3 times within a calendar year.
What is the validity of the certification?
(ISC)² CISSP certification expires three years from the date of issue, after which the certification holder is required to renew their certification. Click here for more information.
Where can I find more information about this exam?
To know more about the CISSP, click here.

Table of Content

Here's What you will Learn

Lesson 1: Access Control

  • Access Control Overview
  • Identification and Authentication Techniques
  • Access Control Techniques
  • Authorization Mechanisms
  • Identity and Access Provisioning Life Cycle
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 2: Access Control Attacks and Monitoring

  • Understanding Access Control Attacks
  • Preventing Access Control Attacks
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 3: Secure Network Architecture and Securing Network Components

  • OSI Model
  • Secure Network Components
  • Cabling, Wireless, Topology, and Communications Technology
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 4: Secure Communications and Network Attacks

  • Network and Protocol Security Mechanisms
  • Virtual Private Network
  • Remote Access Security Management
  • Network Address Translation
  • Switching Technologies
  • WAN Technologies
  • Virtualization
  • Miscellaneous Security Control Characteristics
  • Manage Email Security
  • Secure Voice Communications
  • Security Boundaries
  • Network Attacks and Countermeasures
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 5: Security Governance Concepts, Principles, and Policies

  • Security Management Planning
  • Security Governance
  • Security Roles and Responsibilities
  • Protection Mechanisms
  • Privacy Requirements Compliance
  • Control Frameworks: Planning to Plan
  • Security Management Concepts and Principles
  • Develop and Implement Security Policy
  • Change Control/Management
  • Data Classification
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 6: Risk and Personnel Management

  • Manage Third-Party Governance
  • Risk Management
  • Manage Personnel Security
  • Develop and Manage Security Education, Training, and Awareness
  • Manage the Security Function
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 7: Software Development Security

  • Application Issues
  • Databases and Data Warehousing
  • Data/Information Storage
  • Knowledge-Based Systems
  • Systems Development Controls
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 8: Malicious Code and Application Attacks

  • Malicious Code
  • Password Attacks
  • Application Attacks
  • Web Application Security
  • Reconnaissance Attacks
  • Masquerading Attacks
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 9: Cryptography and Symmetric Key Algorithms

  • Historical Milestones in Cryptography
  • Cryptographic Basics
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Life Cycle
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 10: PKI and Cryptographic Applications

  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Applied Cryptography
  • Cryptographic Attacks
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 11: Principles of Security Models, Design, and Capabilities

  • Understand the Fundamental Concepts of Security Models
  • Objects and Subjects
  • Understand the Components of Information Systems Security Evaluation Models
  • Understand Security Capabilities Of Information Systems
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 12: Security Architecture Vulnerabilities, Threats, and Countermeasures

  • Computer Architecture
  • Avoiding Single Points of Failure
  • Distributed Architecture
  • Security Protection Mechanisms
  • Common Flaws and Security Issues
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 13: Security Operations

  • Security Operations Concepts
  • Resource Protection
  • Patch and Vulnerability Management
  • Change and Configuration Management
  • Security Audits and Reviews
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 14: Incident Management

  • Managing Incident Response
  • Implement Preventive Measures Against Attacks
  • Understand System Resilience and Fault Tolerance
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 15: Business Continuity Planning

  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Assessment
  • Continuity Planning
  • BCP Documentation
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 16: Disaster Recovery Planning

  • The Nature of Disaster
  • Recovery Strategy
  • Recovery Plan Development
  • Training and Documentation
  • Testing and Maintenance
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 17: Laws, Regulations, and Compliance

  • Categories of Laws
  • Laws
  • Compliance
  • Contracting and Procurement
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 18: Incidents and Ethics

  • Investigations
  • Major Categories of Computer Crime
  • Incident Handling
  • Ethics
  • Summary
  • Exam Essentials
  • Review Questions

Lesson 19: Physical Security Requirements

  • Site and Facility Design Considerations
  • Forms of Physical Access Controls
  • Technical Controls
  • Environment and Life Safety
  • Equipment Failure
  • Privacy Responsibilities and Legal Requirements
  • Summary
  • Exam Essentials
  • Review Questions

uCertify provides courses, simulator, labs, test prep kits for IT certifications including Microsoft, Oracle, Cisco, CompTIA, CIW, PMI, ISC2, Linux, Zend, Google, IC3 , Adobe and many more.

© 2002-2017 uCertify. All Rights Reserved