Course Description: In this course, students will analyze a wide range of information systems security subjects that are organized into 8 domains for CISSP exam certification. This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors in the field who are pursuing CISSP training and certification.  Through the study of all 8 CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam.

Required Text:

  • Harris, S. (2012). CISSP All In One Exam Guide (6th ed.). Boston, MA: Course Technology, Cengage Learning.

Optional Resources:

  • Additional course materials (and class textbooks) will be identified in class and within materials made available through laulima.hawaii.edu.

Prerequisites: ISA 330

Student Learning Outcomes

  1. Students will be able to list the first principles of security (ILO 4; BASLO 1; ISALO 1).
  2. Students will be able to describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies (ILO 3; BASLO 2; ISALO 1).
  3. Students will be able to analyze common security features and identify specific design principles that have been violated (ILO 4; BASLO 2; ISALO 3).
  4. Given a specific scenario, students will be able to identify the needed design principle (ILO 3; BASLO 2; ISALO2).
  5. Students will be able to describe why good human machine interfaces are important to system use (ILO 4; BASLO 2; ISALO 2).
  6. Students will understand the interaction between security and system usability and the importance for minimizing the affects of security mechanisms (ILO 4; BASLO 2; ISALO 3).
  7. Students shall be able to list the fundamental concepts of the Information Assurance / Cyber Defense discipline (ILO 4; BASLO 2; ISALO 1).
  8. Students will be able to describe how the fundamental concepts of cyber defense can be used to provide system security (ILO 4; BASLO 2; ISALO 1).
  9. Students will be able to examine the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed (ILO 3; BASLO 3; ISALO 2).
  10. Students will be able to identify the elements of a cryptographic system (ILO 4; BASLO 1; ISALO 2).
  11. Students will be able to describe the differences between symmetric and asymmetric algorithms (ILO 4; BASLO 2; ISALO 2).
  12. Students will be able to describe which cryptographic protocols, tools and techniques are appropriate for a given situation (ILO 3; BASLO 2; ISALO 2).
  13. Students will be able to describe how cryptography can be used, strengths and weaknesses, modes, and issues that have to be addressed in an implementation (e.g. key management), etc. (ILO 4; BASLO 2; ISALO 3).