CISSP Certification Training
Introduction to CISSP
Get an overview of the Certified Information Systems Security Professional (CISSP) certification, including its importance, benefits, and the domains covered in the exam. Understand the role of CISSP in information security and its relevance to cybersecurity professionals.
Security and Risk Management
Study the principles of security and risk management. Learn about confidentiality, integrity, availability, risk assessment, and management frameworks. Understand the legal and regulatory issues in information security.
Asset Security
Explore asset security concepts, including the classification and handling of information and assets. Learn about data security controls, data retention policies, and the lifecycle of data.
Security Architecture and Engineering
Dive into security architecture and engineering principles. Learn about designing and implementing secure network architectures, secure systems, and the use of security models and concepts.
Communication and Network Security
Understand communication and network security. Study network security protocols, secure network architecture, and the implementation of network security measures to protect data in transit.
Identity and Access Management
Learn about identity and access management (IAM) principles. Explore user access controls, authentication methods, and access management practices to ensure secure access to information systems.
Security Assessment and Testing
Study security assessment and testing techniques. Learn about vulnerability assessments, penetration testing, and security audits. Understand how to evaluate and improve the security posture of information systems.
Security Operations
Explore the principles of security operations. Learn about incident response, disaster recovery, and business continuity planning. Understand how to manage and respond to security incidents and operational challenges.
Software Development Security
Study software development security practices. Learn about secure software development lifecycle (SDLC), code review, and secure coding practices to prevent vulnerabilities in software applications.
Case Studies and Hands-On Labs
Engage in case studies and hands-on labs to apply CISSP concepts. Practice real-world scenarios and security challenges to reinforce learning and prepare for the CISSP exam.
Exam Preparation and Study Tips
Prepare for the CISSP certification exam with study tips, practice exams, and review materials. Familiarize yourself with the exam format, question types, and strategies to maximize your chances of success.
CISSP Certification syllabus
Security and Risk Management
- Confidentiality, Integrity, and Availability Concepts
- Security Governance Principles
- Compliance
- Legal and Regulatory Issues
- Professional Ethics
- Security Policies, Standards, Procedures, and Guidelines
Asset Security
- Information and Asset Classification
- Ownership
- Protect Privacy
- Appropriate Retention
- Data Security Controls
- Handling Requirements
Security Architecture and Engineering
- Engineering Processes using Secure Design Principles
- Security Models Fundamental Concepts
- Security Evaluation Models
- Security Capabilities of Information Systems
- Security Architectures, Designs, and Solution Elements
- Web-based Systems Vulnerabilities
- Mobile Systems Vulnerabilities
- Embedded Devices and Cyber-Physical Systems Vulnerabilities
- Cryptography
- Site and Facility Design Secure Principles
- Physical Security
Communication and Network Security
- Secure Network Architecture Design
- Secure Network Components
- Secure Communication Channels
- Network Attacks
Identity and Access Management (IAM)
- Physical and Logical Assets Control
- Identification and Authentication of People and Devices
- Identity as a Service
- Third-party Identity Services
- Access Control Attacks
- Identity and Access Provisioning Lifecycle
Security Assessment and Testing
- Assessment and Test Strategies
- Security Process Data
- Security Control Testing
- Test Outputs
- Security Architectures Vulnerabilities
Security Operations
- Investigations Support and Requirements
- Logging and Monitoring Activities
- Provisioning of Resources
- Foundational Security Operations Concepts
- Resource Protection Techniques
- Incident Management
- Preventative Measures
- Patch and Vulnerability Management
- Change Management Processes
- Recovery Strategies
- Disaster Recovery Processes and Plans
- Business Continuity Planning and Exercises
- Physical Security
- Personnel Safety Concerns
Software Development Security
- Security in the Software Development Lifecycle
- Development Environment Security Controls
- Software Security Effectiveness
- Acquired Software Security Impact
Additional Resources
Training
Basic Level Training
Duration : 1 Month
Advanced Level Training
Duration : 1 Month
Project Level Training
Duration : 1 Month
Total Training Period
Duration : 3 Months
Course Mode :
Available Online / Offline
Course Fees :
Please contact the office for details