Sale!

CISSP certificate preparation course (Live online 1/13/2024)

Original price was: $599.00.Current price is: $499.00.

The CISSP Certification is a widely recognized credential for professionals in the field of information technology security. It offers comprehensive training in both technical and managerial aspects of security. With this certification, you will gain the expertise needed to design, engineer, and oversee the security of your organization. It assists you in maintaining of a secure business environment through the use of international security framework. This training also handles industry best practices ensuring you’re prepared for the CISSP certification exam.

 

Category:

Certified Information Systems Security Professional Course Outline

Course Overview

CISSP (Certified Information Systems Security Professional) is a vendor-neutral certification to validate the technical skills and knowledge of the IT security professionals for implementing and managing a security program.

The course will cover common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks.

Duration

40 hours of instructor led training live online

Prerequisites

Candidates must have a minimum of five years’ cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Earning a four-year college degree will satisfy one year of the required experience. Previous network or systems experience is also advisable

Audience

This Certified Information Systems Security Professional (CISSP) training course is suitable for anyone who wants to gain in-depth knowledge about IS Security. However, this course will be more beneficial for learners aiming for the following positions

  • Chief Information Security Officers
  • Chief Security Officers
  • Senior Security Engineers
  • Security Consultants
  • Security Managers
  • Security Auditors
  • Security Architects
  • Network Architects

Course Outcome

After completing the course, you will be able to help your organization to reduce the risks of external and internal attacks on information technology systems, guard important data from cyber-attacks, assure business continuity, and keep confidential information secure from cyber security threats. This training will help learners add the necessary skills to climb the ladder of success in terms of value and career opportunities.

Course Material

  • (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
  • Summary for each chapter developed by the instructor.
  • Review questions and answers for each chapter developed by the instructor.

Course Syllabus

Domain 1: Security and Risk Management

  • Understand and Apply Security Concepts
  • Evaluate and Apply Security Governance Principles
  • Determine Compliance and Other Requirements
  • Legal and Regulatory Issues that Pertain to Information Security in a Global Context
  • Requirements for Investigation Types
  • Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines
  • Identify, Analyze, and Prioritize Business Continuity (BC) Requirements
  • Contribute to and Enforce Personnel Security Policies and Procedures
  • Understand and Apply Risk Management Concepts
  • Understand and Apply Threat Modelling Concepts and Methodologies
  • Apply Supply Chain Risk Management (SCRM) Concepts
  • Establish and Maintain a Security Awareness, Education, and Training Program

Domain 2: Asset Security

  • Identify and Classify Information and Assets
  • Establish Information and Asset Handling Requirements
  • Provision Resources Securely
  • Manage Data Lifecycle
  • Ensure Appropriate Asset Retention
  • Data Security Controls and Compliance Requirements

Domain 3: Security Architecture and Engineering

  • Research, Implement, and Manage Engineering Processes Using Secure Design Principles
  • Fundamental Concepts of Security Models
  • Select Controls Based Upon Systems Security Requirements
  • Security Capabilities of Information Systems
  • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Cryptographic Life Cycle
  • Methods of Cryptanalytic Attacks
  • Apply Security Principles to Site and Facility Design
  • Design Site and Facility Security Controls

Domain 4: Communication and Network Security

  • Implement Secure Design Principles in Network Architectures
  • Secure Network Components
  • Securing wireless networks
  • Remote aces security
  • Secure voice over IP systems
  • Secure email systems
  • Prevent and mitigate network attacks
  • Implement Secure Communication Channels According to Design

Domain 5: Identity and Access Management (IAM)

  • Control Physical and Logical Access to Assets
  • Manage Identification and Authentication of People, Devices, and Services
  • Integrate Identity as a Third-Party Service
  • Implement and Manage Authorization Mechanisms
  • Manage the Identity and Access Provisioning Lifecycle
  • Implement Authentication Systems

Domain 6: Security Assessment and Testing

  • Design and Validate Assessment, Test, and Audit Strategies
  • Conduct Security Control Testing
  • Collect Security Process Data
  • Analyze Test Output and Generate Report
  • Conduct or Facilitate Security Audits

Domain 7: Security Operations

  • Understand and Support Investigations
  • Requirements for Investigation Types
  • Conduct Logging and Monitoring Activities
  • Securely Provisioning Resources
  • Understand and Apply Foundational Security Operations Concepts
  • Apply Resource Protection Techniques
  • Conduct Incident Management
  • Operate and Maintain Detective and Preventative Measures
  • Implement and Support Patch and Vulnerability Management
  • Participate in Change Management Processes
  • Implement Recovery Strategies

Domain 8: Software Development Security

  • Integrate Security in the Software Development Life Cycle (SDLC)
  • Identify and Apply Security Controls in Development Environments
  • Assess the Effectiveness of Software Security
  • Assess Security Impact of Acquired Software
  • Define and Apply Secure Coding Guidelines and Standards