Certified Information Systems Security Professional (CISSP): Second Edition (Part 4 of 4)


Welcome to Part 4 of Certified Information Systems Security Professional (CISSP)®: Second Edition. In this fourth and final section of the course, you will use the different security methods presented in Part 3 to incorporate security into business while considering the legal requirements relevant to computer security. With a more focused approach on all the security methods presented and the proper legal requirements applied, you will be better equipped to create a secure working environment.

This course carries the following professional education credits: 0.5 CEUs. For more information on accreditation bodies, please visit www.elementk.com/products/certification-and-accreditation.


  • In this course, you will you will apply operations security measures, apply plans for business continuity and disaster recovery, and identify methods to comply with laws and regulations.

Hardware and Software Required:

  • Browser Microsoft Internet Explorer 7 (or higher)
  • Browser Mozilla Firefox 2 (or higher)
  • Browser Apple Safari 2 (or higher)
  • Operating System Microsoft Windows 2000, XP, Vista, or Windows 7
  • Operating System Apple Mac OS X 10.4 (or higher)
  • Processor Pentium III 1 GHz (or better)
  • Processor Macintosh Intel-based or PowerPC G4 (or better)
  • RAM 512 MB (1 GB or more recommended)
  • Internet connection 256K (broadband recommended)
  • Adobe Flash Player 8 (current version recommended)
  • Adobe Reader 7 (or higher)
  • Other requirements may apply to supplemental offline activities. Omitting these optional activities does not affect course completion.


User Reviews

Not yet rated. You will need to follow this course before you can write a review.

Course Info

  • Code: EL-CISSPSE 4-4
  • Duration: 5 hours
  • Price: Call for price

Next Step

Enquire Now
Tell a Friend