-
Kennesaw State University’s Community and Professional Education is an official ISC2® Academic Training Partner.
-
Our instructors are verified security experts who hold the CISSP® and have completed intensive training to teach ISC2® content.
-
Our curriculum is developed by ISC2® – creator of the CISSP CBK® – to ensure your training is relevant and up-to-date.
-
All required learning materials and a CISSP® certification voucher are included in the cost of the class.
-
In the latest Cybersecurity Workforce Study, ISC2® found that earning a cybersecurity certification was valuable to 86% - 90% of employees with an array of backgrounds from those with no prior cybersecurity job experience all the way to industry professionals.
-
Unlike boot camp courses, this program will teach you the essentials of information systems security while also helping prepare you for the CISSP® exam once other exam eligibility requirements are met.
-
You will complete a hands-on project to apply your knowledge to the real world.
-
You will receive the tools, advice, and practice needed to optimize your study and preparation to pursue the CISSP® certification exam.
-
In addition to your technical skills, you will strengthen your soft skills, including critical thinking, effective professional communication, and presentation skills.
-
Spotlight your information systems security skills through an official digital badge from Kennesaw State University that can be displayed on your LinkedIn page. You will also earn a certificate of completion from Kennesaw State University.
-
You will graduate with the skills and confidence to pursue entry-level information security roles or further your education with additional cybersecurity study.
-
Explain how to align overall organizational operational goals with security functions and implementations
-
Determine how to protect assets of an organization throughout their lifecycle
-
Identify the controls used to enforce various levels of confidentiality, integrity, and availability
-
Apply security design principles to select appropriate solutions for vulnerabilities present in common information system types and architectures
-
Explain the importance of cryptography and the security services it can provide in today’s digital and information age
-
Evaluate physical security elements related to information security needs
-
Explain all the elements that comprise communication and network security
-
Identify the key technologies and protocols used to keep data safe across each OSI layer on a network
-
Select appropriate physical and digital access control models to safeguard systems and information and meet business security requirements
-
Recognize common strategies used to test and audit security systems
-
Apply appropriate security controls and countermeasures to optimize an organization’s operational function and capacity
-
Assess information system risks to an organization’s daily operations
-
Determine appropriate controls to mitigate specific threats and vulnerabilities
-
Apply information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout their lifecycle