Register Now
Classroom Login
Call Now
Call Now 855-300-1473

Advanced Information Assurance and Security

Secure Your Success on the CISSP® Certification Exam−Course Recently Updated!

Advanced Information Assurance and Security

The Advanced Information Assurance and Securitycertificate has been updated based on the recent changes to (ISC)²CBK®. If you’re looking for comprehensive preparation for the Certified Information Systems Security Professional (CISSP®) or Systems Security Certified Practitioner (SSCP®) certification exam, then enrolling in the Advanced Information Assurance and Security course will be beneficial.

This in-depth 12-week IS Security course analyzes advanced facets of security management and practices to help you combat cryptographic attacks and other computer crimes that threaten your organization’s security. This advanced course also includes 650 sample questions that will help you prepare for the recently updated certification CISSP® or SSCP® exam.

Advanced Information Assurance and Security

This course is part of a Master Certificate Program

SAVE UP TO $1,090

Packages starting at $5,595

Register Now!

What You’ll Study

Physical Security

  • Securing a site
  • Risks associated with site security
  • Threats
  • Environmental protection mechanisms: preventative, detection, and suppression


  • History and purpose of cryptography
  • Secret Key Encryption
  • Public Key Encryption
  • Stenography and its uses

Access Control

  • Access control methods
  • Access control vulnerabilities and exposures
  • Administrative and physical controls
  • Technical and logical controls

Security Architecture and Design

  • Different security models and their strengths
  • System architecture protection schemes
  • The inter-relationship of system architecture components
  • CPU modes and protection rings
  • I/O device management

Telecommunications and Network Security 

  • How packets move in a network
  • Policy and management
  • Common types of power and environmental issues: brownouts, blackouts, and power surges
  • Different security controls
  • Issues with VOIP (voice-over-internet-protocol) security
  • Wireless networks and associated vulnerabilities

Business Continuity and Disaster Recovery Planning 

  • The incident response model
  • Different testing methods
  • Emergency response
  • Difference between business continuity and disaster recovery
  • Contingency planning requirements and critical business functions
  • Testing and implementing a disaster recovery plan

Legalities and Ethics

  • Digital forensics
  • The three phases of security: prevention, detection, and response
  • Search, seizure, and the admissibility of evidence into court
  • Governing principles of computer crime investigation
  • Associated computer crime laws
  • Investigative computer crime methodologies

Application Security 

  • Application lifecycle management
  • Application development methodologies
  • What SSE-CMM is and how it impacts an organization
  • The structure of SSE-CMM
  • Differences in device verses software security
  • System design specifications

Operations Security

  • Principles of good management
  • Operational resources that must be protected
  • Techniques and methods for protecting operational resources
  • Input and output controls
  • Penetration testing
  • Data protection methods for both data storage and data transmission

Information Security and Risk Management 

  • Risk management techniques and practices
  • Qualitative risk assessment process
  • Qualitative risk assessment skills
  • Difference between total risk and residual risk
  • Security flow throughout the organization
  • Policies, procedures, guidelines and responsibilities
  • HR policies and practices

Credit & Tuition

ACE credit recommendation 4 semester hours. Register today and earn 60 PDUs, 6.0 CEUs for $3,095.

Who Should Register?

This advanced IS Security course is ideal for IT professionals who manage security processes that are critical to today’s business and service environments. It provides managers and other IT professionals with the high-end skills necessary to achieve CISSP® or SSCP® certification through (ISC)