CISSP-Lab : CISSP- Certified Information Systems Security Professional LABS

CISSP-lab
CISSP- Certified Information Systems Security Professional LABS
ISBN : 978-1-61691-531-5
Gain hands-on expertise in (ISC)² CISSP certification exam with CISSP- Certified Information Systems Security Professional performance based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training.  The (ISC)²'s CISSP certification is an industry recognized credential and is designed to certify the competency of IT professionals to design, engineer, implement, and manage the overall information security program of an organization.

Labs

Online labs can be used to supplement training. uCertify labs are an inexpensive & safe way to explore and learn. uCertify labs are versatile - labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training.

Here's What You Get

Performance based lab
113+
Video tutorials
27+
Minutes
10+

Hands on Activities

Access Control

  • Identifying access control types
  • Disabling a service
  • Identifying drawbacks of Kerberos authentication
  • Identifying components of the Kerberos authentication protocol
  • Identifying authentication services
  • Creating a password for account
  • Configuring password policies
  • Enabling and disabling password expiration
  • Configuring NPS to provide RADIUS authentication
  • Configuring NPS network policy
  • Configuring the server
  • Creating and configuring a network
  • Identifying authorization mechanisms
  • Identifying responsibilities

Access Control Attacks and Monitoring

  • Identifying types of system attack
  • Identifying attacks
  • Identifying social engineering attacks
  • Filtering entries in Event Viewer
  • Viewing password hashes
  • Configuring audit policies
  • Viewing different event details
  • Identifying log types

Secure Network Architecture and Securing Network Components

  • Identifying OSI layer functions
  • Identifying OSI layers
  • Identifying connectionless communication
  • Identifying abbreviations for various Internet layer protocols
  • Identifying TCP/IP protocol layers
  • Identifying TCP/IP layers
  • Configuring IPv4 address
  • Identifying application layer protocols
  • Identifying steps in the encapsulation/decapsulation process
  • Identifying flag bit designator
  • Identifying gateway firewalls
  • Identifying hardware devices
  • Connecting systems to the Internet through a router
  • Identifying firewall techniques
  • Identifying types of cable
  • Identifying components of a coaxial cable
  • Configuring Windows 7 wireless settings
  • Configuring SSID
  • Identifying network topologies
  • Identifying UTP categories
  • Identifying steps in CSMA technology
  • Identifying LAN sub technologies

Secure Communications and Network Attacks

  • Identifying secure communication protocols
  • Identifying authentication protocols
  • Creating a remote access VPN connection
  • Identifying VPN protocols
  • Connecting to a server using Remote Desktop Connection
  • Creating a dial-up connection
  • Understanding NAT
  • Identifying switching technology properties
  • Installing Windows Virtual PC
  • Identifying specialized protocols
  • Creating a virtual PC machine
  • Understanding transparency
  • Identifying security solutions
  • Identifying phreaker tools
  • Understanding security boundaries
  • Identifying types of Denial of Service attacks

Security Governance Concepts, Principles, and Policies

  • Identifying security management plans
  • Identifying protection mechanisms
  • Identifying steps in a classification scheme

Risk and Personnel Management

  • Identifying risk actions
  • Understanding elements of risk
  • Identifying steps in quantitative risk analysis

Software Development Security

  • Identifying types of malware
  • Understanding agents
  • Identifying keys in a database
  • Identifying storage types
  • Identifying stages in a waterfall lifecycle model
  • Identifying generations of languages
  • Understanding object-oriented programming terms
  • Identifying levels in Software Capability Maturity Model
  • Identifying testing methods
  • Identifying primary phases of SDLC

Malicious Code and Application Attacks

  • Identifying types of viruses
  • Understanding application attacks
  • Identifying types of viruses
  • Installing the AVG antivirus and scanning a drive

Cryptography and Symmetric Key Algorithms

  • Checking the integrity of messages through MAC values
  • Identifying asymmetric algorithms
  • Identifying cryptographic attacks

PKI and Cryptographic Applications

  • Identifying sequence of sender's process in digital signature system
  • Backing up an encryption certificate and key
  • Understanding PKCS standards

Principles of Security Models, Design, and Capabilities

  • Identifying Information models
  • Identifying TCSEC categories

Security Architecture Vulnerabilities, Threats, and Countermeasures

  • Identifying computer activities
  • Disabling the COM and parallel ports
  • Installing SDRAM and DDR memory modules
  • Connecting speakers to a computer
  • Connecting a keyboard, mouse, and monitor to a computer
  • Understanding process scheduler
  • Identifying RAID levels
  • Identifying service associated with cloud computing

Security Operations

  • Identifying terms associated with data destruction
  • Identifying steps within an effective patch management program
  • Identifying security reviews

Incident Management

  • Identifying steps in incident response management
  • Identifying sequence in which the IDS instructs the TCP to reset connections
  • Working with a host-based IDS
  • Identifying malicious attacks
  • Identifying RAID level characteristics

Business Continuity Planning

  • Identifying phases in BCP process
  • Identifying man-made threats

Disaster Recovery Planning

  • Identifying processing sites in disaster recovery plan
  • Identifying disaster recovery plan tests

Laws, Regulations, and Compliance

  • Identifying CFAA provisions

Incidents and Ethics

  • Identifying computer crime types

Physical Security Requirements

  • Identifying physical access control mechanisms
  • Identifying terms associated with power issues
  • Identifying primary stages of fire

Exam Information

The Certified Information Systems Security Professional exam is a standalone certification from (ISC)² with the exam code CISSP.  The certification is targeted at professionals who want to develop policies and procedures in information security. The exam covers critical topics in security, including cloud computing, mobile security, application development security, risk management and more.

Prepare for the following certification

Career Prospects
  • Security Auditor
  • Security Analyst
  • Security Manager
  • Security Architect
  • Network Architect
  • Director of Security
  • Security Consultant
  • IT Director/Manager
  • Security Systems Engineer
  • Chief Information Security Officer
Exam FAQs
What is the exam registration fee?
USD 599

CISSP Certified Professionals must also pay an annual maintenance fee of USD 85 per year.

Where do I take the exam?
The (ISC)² CISSP exam is administered by Pearson VUE at testing centers worldwide. Click here to find a testing center near you.
What is the format of the exam?
Hotspot, Drag and drop, and Multiple choice
What are the pre-requisites of the exam?
Candidate must have minimum of five years cumulative paid full-time work experience in two or more of the 10 CISSP domains. Click here for more information.
How many questions are asked in the exam?
The exam contains 250 questions.
What is the duration of the exam?
360 minutes
What is the passing score?
700

(on a scale of 0-1000)

What is the exam's retake policy?
Test takers who do not pass the examination the first time will be able to retest after 30 days. Test takers who fail second time will need to wait 90 days prior to sitting for the examination again. In the unfortunate event that a candidate fails a third time, the next available time to sit for the examination will be 180 days after the most recent exam attempt. Candidates are eligible to sit for (ISC)² examinations a maximum of 3 times within a calendar year.
What is the validity of the certification?
(ISC)² CISSP certification expires three years from date of issue, after which the certification holder is required to renew their certification. Click here for more information.
Where can I find more information about this exam?
To know more about the CISSP-lab, click here.
uCertify

uCertify provides courses, simulator, labs, test prep kits for IT certifications including Microsoft, Oracle, Cisco, CompTIA, CIW, PMI, ISC2, Linux, Zend, Google, IC3 , Adobe and many more.

© 2002-2017 uCertify. All Rights Reserved
app_store
google_play