Course Description: In this course, students will analyze a wide range of information systems security subjects that are organized into 8 domains for CISSP exam certification. This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors in the field who are pursuing CISSP training and certification. Through the study of all 8 CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam.
Required Text:
- Harris, S. (2012). CISSP All In One Exam Guide (6th ed.). Boston, MA: Course Technology, Cengage Learning.
Optional Resources:
- Additional course materials (and class textbooks) will be identified in class and within materials made available through laulima.hawaii.edu.
Prerequisites: ISA 330
Student Learning Outcomes
- Students will be able to list the first principles of security (ILO 4; BASLO 1; ISALO 1).
- Students will be able to describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies (ILO 3; BASLO 2; ISALO 1).
- Students will be able to analyze common security features and identify specific design principles that have been violated (ILO 4; BASLO 2; ISALO 3).
- Given a specific scenario, students will be able to identify the needed design principle (ILO 3; BASLO 2; ISALO2).
- Students will be able to describe why good human machine interfaces are important to system use (ILO 4; BASLO 2; ISALO 2).
- Students will understand the interaction between security and system usability and the importance for minimizing the affects of security mechanisms (ILO 4; BASLO 2; ISALO 3).
- Students shall be able to list the fundamental concepts of the Information Assurance / Cyber Defense discipline (ILO 4; BASLO 2; ISALO 1).
- Students will be able to describe how the fundamental concepts of cyber defense can be used to provide system security (ILO 4; BASLO 2; ISALO 1).
- Students will be able to examine the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed (ILO 3; BASLO 3; ISALO 2).
- Students will be able to identify the elements of a cryptographic system (ILO 4; BASLO 1; ISALO 2).
- Students will be able to describe the differences between symmetric and asymmetric algorithms (ILO 4; BASLO 2; ISALO 2).
- Students will be able to describe which cryptographic protocols, tools and techniques are appropriate for a given situation (ILO 3; BASLO 2; ISALO 2).
- Students will be able to describe how cryptography can be used, strengths and weaknesses, modes, and issues that have to be addressed in an implementation (e.g. key management), etc. (ILO 4; BASLO 2; ISALO 3).