CISSP stands for Certified Information Systems Security Professional.
CISSP Certification Training
This course offers all the information which ensures that the security leaders get an in-depth knowledge and understanding about the new threats, technologies, regulations, standards, and practices. CISSP training helps participants gain in-depth knowledge about computer security and access control systems. This training program covers a wide range of topics that will help participants in their preparation for CISSP certification exam. By attending CISSP, training participants will gain expertise on CISSP architecture. On course completion, they will gain the knowledge required for designing, building, and maintaining a secure business environment essential for an organization. CISSP certification is globally recognized and it is respected by most of the companies across the globe. In CISSP training program, the participant will gain good working knowledge of information security, cryptography, and security management practices.
This training prepares you to pass the premier security certification, CISSP and ensures you have the necessary skills to provide leadership in the information security programs. The course is aligned with the latest (ISC)2 exam and is trained by expert trainers to successfully pass the CISSP exam in the first attempt.The course demonstrates all the aspects of IT security, including architecture, design, management and controls.
Industry sector(s):Information Technology, Information Security Designations:Security Consultant, Security Analyst, Security Manager, Security Systems Engineer, Security Auditor, Security Architect, Network Architect, Director of Security, IT Director/Manager, Chief Information Security Officer.
- Mode: CBT (Pearson Vue)
- of questions: 250
- Duration: 3 hours*
- Question type: Multiple choice, Drag & Drop, Hotspot
- Scoring pattern: Scaled 0 – 1000 similar to standardised tests.
- of questions correctly answered in an exam by an expert panel is given a scaled score of 700.
*Maximum administration time for CISSP CAT(Only English Form) is three (3) hours. Exceptions will be provided only to candidates with medical accommodations that are pre-approved by (ISC)². There is no minimum administration time limit. Candidates may proceed through the exam at a pace to which they are comfortable. Effective December 18, 2017, the Certified Information Systems Security Professional (CISSP®) exam (English version only) will be available exclusively via CAT through (ISC)²-authorized Pearson VUE test centers in authorized markets. CISSP exams administered in languages other than English and all other (ISC)² certification exams will continue to be available as fixed-form, linear examinations.
Candidates’ scores are derived based on this. Results: Pass/ Fail. Failed candidates get extra details (rank order of domains by the percentage of questions answered correctly). Domain weightage: Security&Risk Management (16%), Asset Security (10%), Security Engineering (12%), Communication & Network Security (12%), Identity & Access Management (13%), Security Assessment & Testing (11%), Security Operations (16%), Software Development Security (10%).
- 1 Year Access
- 11 hrs Audio-Video Lectures
- 2 Simulated Exams
- Practice questions/Flashcards
- Tool Kits
|SECURITY AND RISK MANAGEMENT|
|Confidentiality, integrity, and availability concepts||00:00:00|
|Security governance principles||00:00:00|
|Legal and regulatory issues||00:00:00|
|Security policies, standards, procedures and guidelines||00:00:00|
|Information and asset classification||00:00:00|
|Ownership (e.g. data owners, system owners)||00:00:00|
|Data security controls||00:00:00|
|Handling requirements (e.g. markings, labels, storage)||00:00:00|
|Engineering processes using secure design priciples||00:00:00|
|Security models fundamental concepts||00:00:00|
|Security evaluation models||00:00:00|
|Security capabilities of information systems||00:00:00|
|Security architectures, designs, and solution elements and vulnerabilities||00:00:00|
|Web-based systems vulnerabilities||00:00:00|
|Mobile systems vulnerabilities||00:00:00|
|Embedded devices and cyber-physical systems vulnerabilities||00:00:00|
|Site and facility design secure principles||00:00:00|
|COMMUNICATION AND NETWORK SECURITY|
|Secure network architecture design (e.g. IP & non-IP protocols, segmentation)||00:00:00|
|Secure network components||00:00:00|
|Secure communication channels||00:00:00|
|IDENTITY AND ACCESS MANAGEMENT|
|Physical and logical assets control||00:00:00|
|Identification and authentication of people and devices||00:00:00|
|Identity as a service (e.g. cloud identity)||00:00:00|
|Third-party identity services (e.g. on-premise)||00:00:00|
|Access control attacks||00:00:00|
|Identity and access provisioning lifecycle (e.g. provisioning review)||00:00:00|
|SECURITY ASSESSMENT AND TESTING|
|Assessment and test strategies||00:00:00|
|Security process data (e.g. management and operational controls)||00:00:00|
|Security control testing||00:00:00|
|Test outputs (e.g. automated, manual)||00:00:00|
|Security architectures vulnerabilities||00:00:00|
|Investigations support and requirements||00:00:00|
|Logging and monitoring activities||00:00:00|
|Provisioning of resources||00:00:00|
|Foundational security operations concepts||00:00:00|
|Resource protection techniques||00:00:00|
|Resource protection techniques||00:00:00|
|Patch and vulnerability management||00:00:00|
|Change management processes||00:00:00|
|Disaster recovery processes and plans||00:00:00|
|Business continuity planning and exercises||00:00:00|
|Personnel safety concerns||00:00:00|
|SOFTWARE DEVELOPMENT SECURITY|
|Security in the software development lifecycle||00:00:00|
|Development environment security controls||00:00:00|
|Software security effectiveness||00:00:00|
|Acquired software security impact||00:00:00|
No Reviews found for this course.