Scroll to top button

PS-CISSP-complete : Pearson CISSP Cert Guide with Labs

Pearson CISSP Cert Guide with Labs
ISBN : 978-1-61691-967-2

Gain hands-on expertise in (ISC)2 CISSP certification exam by Pearson CISSP Cert Guide course and performance based labs. Performance based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. CISSP certification is vendor-neutral credential designed for IT security practitioners to validate their technical and managerial skills, credibility and, experience. CISSP exam is designed to engineer, implement, and manage the overall information security program to protect organizations from growing sophisticated attacks.



uCertify uses content from well known publishers, instructors, and subject matter experts. They have a minimum of 15 years of experience in their fields. uCertify brings these textbooks to life. It is full of interactive activities that keep the learner engaged. uCertify brings all available learning resources for a topic in one place so that the learner can efficiently learn without going to multiple places. Challenge questions are also embedded in the chapters so learners can attempt those while they are learning about that particular topic. This helps them grasp the concepts better because they can go over it again right away which improves learning. At the end of every lesson, uCertify courses guide the learners on the path they should follow.

uCertify platform supports 50+ different types of interactive activities, connect the idea, or try it yourself lab activities embedded throughout its course. These interactive activities keep learners engaged and make learning fun.

Here's What You Get

Flashcards Quizzes Glossary

Each lesson comes with Flashcards & Quizzes. There is no limit to the number of times learners can attempt these. Flashcards help master the key concepts. Glossary defines the key terms.

Glossary of terms
Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.


Test Prep & Practice Questions

uCertify provides full length practice tests. These tests closely follow the exam objectives and are designed to simulate real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure that learners are prepared for the certification exam.

Here's What You Get

Pre-assessments Questions
Full Length Tests
Post-Assessments Questions


Full Remediation

Each question comes with detailed remediation explaining not only why an answer option is correct but also why the incorrect answer options are incorrect.

Unlimited Practice

Each test can be taken unlimited number of times until the learner feels they are prepared. Learner can review the test and read detailed remediation. Detailed test history is also available.

Learn, Test and Review Mode

Each test set comes with learn, test and review modes. In learn mode, learners will attempt a question and will get immediate feedback and complete remediation as they move on to the next question. In test mode, learners can take a timed test simulating the actual exam conditions. In review mode, learners can read through one item at a time without attempting it.


Online labs can be used to supplement training. uCertify labs are an inexpensive & safe way to explore and learn. uCertify labs are versatile - labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training.

Here's What You Get

Performance based lab
Video tutorials

Hands on Activities


Security and Risk Management

  • Understanding defense in depth layers
  • Identifying types of computer crimes
  • Identifying intellectual property law
  • Implementing physical security
  • Identifying access control types
  • Identifying terms associated with risks
  • Understanding security concept cycle
  • Understanding quality model

Asset Security

  • Identifying keys in a database
  • Understanding Information Life Cycle
  • Identifying RAID levels
  • Identifying RAID level characteristics
  • Understanding measures of risk calculation

Security Engineering

  • Installing SDRAM and DDR memory modules
  • Identifying types of memory
  • Identifying Information models
  • Identifying TCSEC categories
  • Identifying service associated with cloud computing
  • Locking an iPhone with a password
  • Understanding hybrid encryption
  • Installing a subordinate Certification Authority
  • Backing up an encryption certificate and key
  • Identifying sequence of sender's process in digital signature system
  • Checking the integrity of messages through MAC values
  • Viewing password hashes
  • Understanding hash function process
  • Identifying types of system attack
  • Identifying man-made threats
  • Identifying fire extinguisher classes
  • Identifying types of outages

Communication and Network Security

  • Creating and configuring a network
  • Identifying steps in the encapsulation/decapsulation process
  • Identifying TCP/IP protocol layers
  • Identifying OSI layer functions
  • Identifying OSI layers
  • Identifying connectionless communication
  • Configuring IPv4 address
  • Understanding NAT
  • Identifying LAN sub technologies
  • Identifying transmission types
  • Spotting the intranet network
  • Identifying private IP address classes
  • Identifying application layer protocols
  • Obtaining IP address information from a DHCP server
  • Configuring Windows 7 wireless settings
  • Configuring SSID
  • Identifying WLAN standards
  • Configuring NPS network policy
  • Turning on Windows 7 firewall logs
  • Working with a host-based IDS
  • Connecting systems to the Internet through a firewall router
  • Identifying components of a coaxial cable
  • Identifying steps in CSMA technology
  • Identifying abbreviations for various Internet layer protocols
  • Identifying a network topology
  • Identifying a network device
  • Identifying network infrastructure devices
  • Identifying types of cable
  • Understanding twisted pair categories
  • Creating a virtual PC machine
  • Creating a remote access VPN connection
  • Connecting to a server using Remote Desktop Connection
  • Creating a dial-up connection
  • Configuring NPS to provide RADIUS authentication
  • Identifying authentication protocols
  • Identifying attacks
  • Understanding ICMP attacks

Identity and Access Management

  • Understanding biometric enrollment and authentication process
  • Configuring smart card authentication
  • Configuring account time limits
  • Turning off the guest account
  • Configuring Kerberos Policy settings
  • Creating a password for account
  • Configuring password policies
  • Configuring audit policies
  • Identifying components of the Kerberos authentication protocol
  • Identifying drawbacks of Kerberos authentication
  • Identifying authorization mechanisms
  • Identifying access control models
  • Identifying passwords threats
  • Identifying types of malwares

Security Assessment and Testing

  • Filtering entries in Event Viewer
  • Understanding steps of penetration testing
  • Viewing different event details

Security Operations

  • Understanding forensic investigation process
  • Identifying steps in incident response management
  • Installing the AVG antivirus and scanning a drive
  • Disabling a service
  • Understanding sandboxing
  • Identifying security reviews
  • Identifying steps in patch management life cycle
  • Identifying processing sites in disaster recovery plan
  • Identifying various alternate site
  • Identifying disaster recovery plan tests
  • Identifying phases in BCP process

Software Development Security

  • Understanding object-oriented programming terms
  • Identifying protection mechanisms
  • Identifying primary phases of SDLC
  • Identifying stages in a waterfall lifecycle model
  • Identifying phases of SDLC
  • Identifying CMMI maturity levels
  • Identifying types of viruses
  • Understanding application attacks
  • Identifying types of malware

Exam Information

The Certified Information Systems Security Professional exam is a standalone certification from ISC2 with the exam code CISSP. The certification is targeted at professionals who want to develop policies and procedures in information security. The exam covers critical topics in security, including cloud computing, mobile security, application development security, risk management and more.

Career Prospects

  • Security Consultant
  • Security Manager
  • Security Auditor
  • Security Architect
  • Security Analyst
  • Security Systems Engineer
  • Director of Security
  • Network Architect
  • Chief Information Security Officer
  • IT Director/Manager

Exam FAQs
What is the exam registration fee?
USD 599
How many questions are asked in the exam?
The exam contains 250 questions.
What is the passing score?

(on a scale of 0-1000)

What is the exam's retake policy?

Test takers who do not pass the exam the first time will be able to retest after 30 days.  Test takers that fail a second time will need to wait 90 days prior to sitting for the exam again.  In the unfortunate event that a candidate fails a third time, the next available time to sit for the exam will be 180 days after the most recent exam attempt.  Candidates are eligible to sit for (ISC)exams a maximum of 3 times within a calendar year.

Table of Content

Here's What you will Learn

Lesson 1: Introduction

  • The Goals of the CISSP Certification
  • The Value of the CISSP Certification
  • The Common Body of Knowledge
  • Steps to Becoming a CISSP

Lesson 2: Security and Risk Management

  • Security Terms
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Documentation
  • Business Continuity
  • Personnel Security Policies
  • Risk Management Concepts
  • Threat Modeling
  • Security Risks in Acquisitions
  • Security Education, Training, and Awareness
  • Review All Key Topics

Lesson 3: Asset Security

  • Asset Security Concepts
  • Classify Information and Assets
  • Asset Ownership
  • Asset Management
  • Asset Privacy
  • Data Retention
  • Data Security and Controls
  • Asset Handling Requirements
  • Review All Key Topics

Lesson 4: Security Engineering

  • Engineering Using Secure Design Principles
  • Security Model Concepts
  • System Security Evaluation Models
  • Security Capabilities of Information Systems
  • Certification and Accreditation
  • Security Architecture Maintenance
  • Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Vulnerabilities in Web-Based Systems
  • Vulnerabilities in Mobile Systems
  • Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Cryptography
  • Cryptographic Types
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Public Key Infrastructure
  • Key Management Practices
  • Digital Signatures
  • Digital Rights Management (DRM)
  • Message Integrity
  • Cryptanalytic Attacks
  • Geographical Threats
  • Site and Facility Design
  • Building and Internal Security
  • Environmental Security
  • Equipment Security
  • Review All Key Topics

Lesson 5: Communication and Network Security

  • Secure Network Design Principles
  • IP Networking
  • IPv4
  • Protocols and Services
  • Converged Protocols
  • Wireless Networks
  • Communications Cryptography
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks
  • Review All Key Topics

Lesson 6: Identity and Access Management

  • Access Control Process
  • Physical and Logical Access to Assets
  • Identification and Authentication Concepts
  • Identification and Authentication Implementation
  • Identity as a Service (IDaaS) Implementation
  • Third-Party Identity Services Implementation
  • Authorization Mechanisms
  • Access Control Threats
  • Prevent or Mitigate Access Control Threats
  • Review All Key Topics

Lesson 7: Security Assessment and Testing

  • Assessment and Testing Strategies
  • Security Control Testing
  • Collect Security Process Data
  • Analyze and Report Test Outputs
  • Internal and Third-Party Audits
  • Review All Key Topics

Lesson 8: Security Operations

  • Investigations
  • Investigation Types
  • Logging and Monitoring Activities
  • Resource Provisioning
  • Security Operations Concepts
  • Resource Protection
  • Incident Management
  • Preventive Measures
  • Patch Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery
  • Testing Recovery Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Privacy and Safety
  • Review All Key Topics

Lesson 9: Software Development Security

  • Software Development Concepts
  • Security in the System and Software Development Life Cycle
  • Security Controls in Development
  • Assess Software Security Effectiveness
  • Security Impact of Acquired Software
  • Review All Key Topics

Copyright © 2002-2017 uCertify / All Rights Reserved.