Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification Consortium, (ISC)2 .Individuals possessing this vendor neutral credential are high in demand by corporations all over the world who want to protect their organizations from a growing spurt of sophisticated cyber attacks. Enroll & Get Certified now!
Course Price At
Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification Consortium, (ISC)2 .Individuals possessing this vendor neutral credential are high in demand by corporations all over the world who want to protect their organizations from a growing spurt of sophisticated cyber attacks.
Led by an (ISC)² authorized instructor, CISSP training seminar provides a comprehensive review of information security concepts and industry best practices, covering the ” 8 domains “ of the CISSP Common Body of Knowledge:
Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories.
This CISSP training is intended for professionals who want to acquire the credibility and mobility to advance within their current Information Security careers. To claim the CISSP certificate from ISC2 it is mandatory that you have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP – CBK 2018. Incase you do not have the required five years of experience, you will be awarded an ISC2 associate title which will be replaced with the CISSP certificate after you gain and submit proof of your experience.
Topic Covered:
1.1 Understand and apply concepts of confidentiality, integrity and availability
1.2 Apply security governance principles through:
1.3 Compliance
1.4 Understand legal and regulatory issues that pertain to information security in a global context
1.5 Understand professional ethics
1.6 Develop and implement documented security policy, standards, procedures, and guidelines
1.7 Understand business continuity requirements
1.8 Contribute to personnel security policies
1.9 Understand and apply risk management concepts
1.10 Understand and apply threat modeling
1.11 Integrate security risk considerations into acquisition strategy and practice
1.12 Establish and manage information security education, training, and awareness
Topic Covered:
2.1 Classify information and supporting assets (e.g., sensitivity, criticality)
2.2 Determine and maintain ownership (e.g., data owners, system owners, business/mission owners)
2.3 Protect privacy
2.4 Ensure appropriate retention (e.g., media, hardware, personnel)
2.5 Determine data security controls (e.g., data at rest, data in transit)
2.6 Establish handling requirements (markings, labels, storage, destruction of sensitive information)
Topic Covered:
3.1 Implement and manage engineering processes using secure design principles
3.2 Understand the fundamental concepts of security models (e.g., Confidentiality, Integrity, and Multi-level Models)
3.3 Select controls and countermeasures based upon systems security evaluation models
3.4 Understand security capabilities of information systems (e.g., memory protection, virtualization, trusted platform module, interfaces, fault tolerance)
3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
3.6 Assess and mitigate vulnerabilities in web-based systems (e.g., XML, OWASP)
3.7 Assess and mitigate vulnerabilities in mobile systems
3.8 Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems (e.g., network-enabled devices, Internet of things (loT))
3.9 Apply cryptography
3.10 Apply secure principles to site and facility design
3.11 Design and implement physical security
Topic Covered:
4.1 Apply secure design principles to network architecture (e.g., IP & non-IP protocols, segmentation)
4.2 Secure network components
4.3 Design and establish secure communication channels
4.4 Prevent or mitigate network attacks
1.6 Develop and implement documented security policy, standards, procedures, and guidelines
1.7 Understand business continuity requirements
1.8 Contribute to personnel security policies
1.9 Understand and apply risk management concepts
1.10 Understand and apply threat modeling
1.11 Integrate security risk considerations into acquisition strategy and practice
1.12 Establish and manage information security education, training, and awareness
Topic Covered:
5.1 Control physical and logical access to assets
5.2 Manage identification and authentication of people and devices
5.3 Integrate identity as a service (e.g., cloud identity)
5.4 Integrate third-party identity services (e.g., on-premise)
5.5 Implement and manage authorization mechanisms
5.6 Prevent or mitigate access control attacks
5.7 Manage the identity and access provisioning life cycle (e.g., provisioning, review)
Topic Covered:
6.1 Design and validate assessment and test strategies
6.2 Conduct security control testing
6.3 Collect security process data (e.g., management and operational controls)
6.4 Analyze and report test outputs (e.g., automated, manual)
6.5 Conduct or facilitate internal and third party audits
Topic Covered:
7.1 Understand and support investigations
7.2 Understand requirements for investigation types
7.3 Conduct logging and monitoring activities
7.4 Secure the provisioning of resources
7.5 Understand and apply foundational security operations concepts
7.6 Employ resource protection techniques
7.7 Conduct incident management
7.8 Operate and maintain preventative measures
7.9 Implement and support patch and vulnerability management
7.10 Participate in and understand change management processes (e.g., versioning, baselining, security impact analysis)
7.11 Implement recovery strategies
7.12 Implement disaster recovery processes
7.13 Test disaster recovery plans
7.14 Participate in business continuity planning and exercises
7.15 Implement and manage physical security
7.16 Participate in addressing personnel safety concerns (e.g., duress, travel, monitoring)
Topic Covered:
8.1 Understand and apply security in the software development lifecycle
8.2 Enforce security controls in development environments
8.3 Assess the effectiveness of software security
8.4 Assess security impact of acquired software
Top-rated instructors imparting in-depth training, hands-on exercises with high energy workshop
The training program includes several lab assignments, developed as per real industry scenarios.
Training begins taking a fresh approach from basic, unique modules, flexible, and enjoyable.
Basic to intermediate and eventually advanced practicing full hands-on lab exercises till you master.
Refresh training for experts for mastering and enhancing the skills on the subjects with fresh course modules.
Includes evaluation, feedback, and tips to handle critical issues in live setup after you are placed in a job.
This certificate proves that you have taken a big leap in mastering the domain comprehensively.
Now you are equipped with real-industry knowledge, required skills, and hands-on experience to stay ahead of the competition.
Post the certificate on LinkedIn and job sites to boost your profile. Notify your friends and colleagues by sharing it on Twitter and Facebook.