CISSP stands for Certified Information Systems Security Professional.

CISSP Certification Training

This course offers all the information which ensures that the security leaders get an in-depth knowledge and understanding about the new threats, technologies, regulations, standards, and practices. CISSP training helps participants gain in-depth knowledge about computer security and access control systems. This training program covers a wide range of topics that will help participants in their preparation for CISSP certification exam. By attending CISSP, training participants will gain expertise on CISSP architecture. On course completion, they will gain the knowledge required for designing, building, and maintaining a secure business environment essential for an organization. CISSP certification is globally recognized and it is respected by most of the companies across the globe. In CISSP training program, the participant will gain good working knowledge of information security, cryptography, and security management practices.

Course Outline

This training prepares you to pass the premier security certification, CISSP and ensures you have the necessary skills to provide leadership in the information security programs. The course is aligned with the latest (ISC)2 exam and is trained by expert trainers to successfully pass the CISSP exam in the first attempt.The course demonstrates all the aspects of IT security, including architecture, design, management and controls.

Target Group

Industry sector(s):Information Technology, Information Security Designations:Security Consultant, Security Analyst, Security Manager, Security Systems Engineer, Security Auditor, Security Architect, Network Architect, Director of Security, IT Director/Manager, Chief Information Security Officer.

Exam structure

  • Mode: CBT (Pearson Vue)
  • of questions: 250
  • Duration: 3 hours*
  • Question type: Multiple choice, Drag & Drop, Hotspot
  • Scoring pattern: Scaled 0 – 1000 similar to standardised tests.
  • of questions correctly answered in an exam by an expert panel is given a scaled score of 700.

*Maximum administration time for CISSP CAT(Only English Form) is three (3) hours.  Exceptions will be provided only to candidates with medical accommodations that are pre-approved by (ISC)². There is no minimum administration time limit. Candidates may proceed through the exam at a pace to which they are comfortable. Effective December 18, 2017, the Certified Information Systems Security Professional (CISSP®) exam (English version only) will be available exclusively via CAT through (ISC)²-authorized Pearson VUE test centers in authorized markets. CISSP exams administered in languages other than English and all other (ISC)² certification exams will continue to be available as fixed-form, linear examinations.

Candidates’ scores are derived based on this. Results: Pass/ Fail. Failed candidates get extra details (rank order of domains by the percentage of questions answered correctly). Domain weightage: Security&Risk Management (16%), Asset Security (10%), Security Engineering (12%), Communication & Network Security (12%), Identity & Access Management (13%), Security Assessment & Testing (11%), Security Operations (16%), Software Development Security (10%).

Deliverables

  • 1 Year Access
  • 11 hrs Audio-Video Lectures
  • 2 Simulated Exams
  • Practice questions/Flashcards
  • Tool Kits

Course Curriculum

SECURITY AND RISK MANAGEMENT
Confidentiality, integrity, and availability concepts 00:00:00
Security governance principles 00:00:00
Compliance 00:00:00
Legal and regulatory issues 00:00:00
Professional ethic 00:00:00
Security policies, standards, procedures and guidelines 00:00:00
ASSET SECURITY
Information and asset classification 00:00:00
Ownership (e.g. data owners, system owners) 00:00:00
Appropriate retention 00:00:00
Data security controls 00:00:00
Handling requirements (e.g. markings, labels, storage) 00:00:00
SECURITY ENGINEERING
Engineering processes using secure design priciples 00:00:00
Security models fundamental concepts 00:00:00
Security evaluation models 00:00:00
Security capabilities of information systems 00:00:00
Security architectures, designs, and solution elements and vulnerabilities 00:00:00
Web-based systems vulnerabilities 00:00:00
Mobile systems vulnerabilities 00:00:00
Embedded devices and cyber-physical systems vulnerabilities 00:00:00
Cryptography 00:00:00
Site and facility design secure principles 00:00:00
Physical security 00:00:00
COMMUNICATION AND NETWORK SECURITY
Secure network architecture design (e.g. IP & non-IP protocols, segmentation) 00:00:00
Secure network components 00:00:00
Secure communication channels 00:00:00
Network attacks 00:00:00
IDENTITY AND ACCESS MANAGEMENT
Physical and logical assets control 00:00:00
Identification and authentication of people and devices 00:00:00
Identity as a service (e.g. cloud identity) 00:00:00
Third-party identity services (e.g. on-premise) 00:00:00
Access control attacks 00:00:00
Identity and access provisioning lifecycle (e.g. provisioning review) 00:00:00
SECURITY ASSESSMENT AND TESTING
Assessment and test strategies 00:00:00
Security process data (e.g. management and operational controls) 00:00:00
Security control testing 00:00:00
Test outputs (e.g. automated, manual) 00:00:00
Security architectures vulnerabilities 00:00:00
SECURITY OPERATIONS
Investigations support and requirements 00:00:00
Logging and monitoring activities 00:00:00
Provisioning of resources 00:00:00
Foundational security operations concepts 00:00:00
Resource protection techniques 00:00:00
Resource protection techniques 00:00:00
Preventative measures 00:00:00
Patch and vulnerability management 00:00:00
Change management processes 00:00:00
Recovery strategies 00:00:00
Disaster recovery processes and plans 00:00:00
Business continuity planning and exercises 00:00:00
Physical security 00:00:00
Personnel safety concerns 00:00:00
SOFTWARE DEVELOPMENT SECURITY
Security in the software development lifecycle 00:00:00
Development environment security controls 00:00:00
Software security effectiveness 00:00:00
Acquired software security impact 00:00:00

Course Reviews

4.5

4.5
19 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE
  • $550
  • 180 Days
178 STUDENTS ENROLLED

    Get a Free Consultation

    Related Courses

    Copyright © 2019 Certybox All Rights Reserved