The course objective is to provide a comprehensive review of the knowledge required to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability. Taught by an (ISC)²-authorized instructor, the course covers seven Domains, including domain 1: access controls; domain 2: security operations and administration; domain 3: risk identification, monitoring and analysis; domain 4: incident response and recovery; domain 5: cryptography; domain 6: network and communications security; and domain 7: systems and application security.