TECH BRIEF

(ISC)2 offers live instruction online

Web-based information security course uses live instruction via WebEx technology

The International Information Systems Security Certification Consortium is offering an online information security course, the Live Online Official (ISC)2 Certified Information Systems Security Professional Common Body of Knowledge Review Seminar.

The course is taught by (ISC)2-authorized instructors using live instruction via WebEx technology. It will offer a high-level review of the 10 CISSP CBK domains, (ISC)2 representatives said.

The seminar will be delivered in two separate two-hour sessions per week over the course of 10 weeks and will include real-life experiences of CISSPs. During the live sessions, students will be able to ask the instructor questions and get immediate feedback.

Live OnLine course materials will be archived online and accessible anytime. Students will also be able to use e-mail to ask questions of  their instructors.

“Live OnLine provides the same quality instruction as our award-winning, in-person seminars, but it is accessible anywhere and virtually any time, allowing busy professionals and those in the military to take classes remotely and at their convenience with no travel expense required,” said W. Hord Tipton, executive director of (ISC)2. “While we have offered self-paced e-learning courses for several years, for the first time now, Live OnLine offers invaluable live interaction with a knowledgeable instructor.”

Topics covered by the seminar include access control, application security, business continuity and disaster recovery planning, cryptography, information security governance and risk management and operations security.

Participants will need a PC that’s capable of downloading a WebEx client and equipped with Windows NT or later operating system and speakers or a headset. Each student will also receive a copy of the official (ISC)2 Guide to the CISSP CBK study guide and a hard copy of the course materials.

For more information: http://www.isc2.org/liveonline/

About the Author

Trudy Walsh is a senior writer for GCN.

inside gcn

  • automated security (Oskari Porkka/Shutterstock.com)

    How to create a secure cyber environment

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group