CISSP Certification Training Course

The Certified Information Systems Security Professional (CISSP) is a globally recognized certification for information technology security professionals. Aligned with (ISC)² CBK 2018, our CISSP training covers all areas of IT security so you can become a strong information security professional.

CISSP Certification Course Overview

The CISSP certification training develops your expertise in defining the IT architecture and in designing, building, and maintaining a secure business environment using globally approved information security standards. The CISSP training covers industry best practices and prepares you for the CISSP certification exam held by (ISC)².

Skills Covered

Security and risk management

Asset security Security architecture and design

Cryptography OSI and TCPIP models

IP addresses

Network security

Identity and access management

Security assessment and testing

Software development security

CISSP Certification Course Curriculum

Elgibility

The CISSP course is the most globally recognized professional requirement in the IT Security domain. This CISSP training is best suited for those at the intermediate level of their career including; security consultants/managers, IT directors/managers, security auditors/architects, security system engineers, CIOs, and network architects.

  • Course Introduction
  • 1.01 Security and Risk Management
  • 1.02 Information Security Management
  • 1.03 Security Controls
  • 1.04 Information Security Management and Governance
  • 1.05 Goals, Mission, and Objectives
  • 1.06 Due Care
  • 1.07 Security Policy
  • 1.08 Compliance
  • 1.09 Computer Crimes
  • 1.10 Legal Systems
  • 1.11 Intellectual Property (IP) Law
  • 1.12 Privacy
  • 1.13 General Data Protection Regulation
  • 1.14 Security
  • 1.15 Risk Analysis
  • 1.16 Types of Risk Analysis
  • 1.17 Security Control Assessment
  • 1.18 Threat Modeling
  • 1.19 Supply-Chain Risk Management
  • 1.20 Third-Party Management
  • 1.21 Business Continuity Planning
  • 1.22 Business Continuity Planning Phases
  • 1.23 Managing Personnel Security
  • 1.24 Security Awareness Training
  • 1.25 Program Effectiveness Evaluation
  • 1.26 Key Takeaways
  • Knowledge Check
  • 2.01 Asset Security
  • 2.02 Information Classification
  • 2.03 Data Classification
  • 2.04 Data Life Cycle
  • 2.05 Data Management
  • 2.06 Different Roles
  • 2.07 Data Remanence
  • 2.08 Privacy
  • 2.09 States of Data
  • 2.10 Data Loss Prevention
  • 2.11 Key Takeaways
  • Knowledge Check
  • 3.01 Introduction
  • 3.02 Security Engineering
  • 3.03 Security Architecture
  • 3.04 Security Models
  • 3.05 Evaluation Criteria
  • 3.06 System Security
  • 3.07 CPU
  • 3.08 Memory
  • 3.09 Security Mode
  • 3.10 Cloud Computing
  • 3.11 IOT
  • 3.12 Industrial Control System (ICS)
  • 3.13 Cryptography
  • 3.14 Encryption Methods
  • 3.15 DES
  • 3.16 Asymmetric Cryptography
  • 3.17 Public Key Infrastructure
  • 3.18 Cryptanalysis
  • 3.19 Key Management
  • 3.20 Critical Path Analysis
  • 3.21 Site Location
  • 3.22 Fire
  • 3.23 HVAC
  • 3.24 Key Takeaways
  • Knowledge Check
  • 4.01 Introduction
  • 4.02 Network Architecture and Design
  • 4.03 IP Addressing
  • 4.04 Network Protocols
  • 4.05 Transmission Media
  • 4.06 Firewall
  • 4.07 Intrusion Detection System and Intrusion Prevention System
  • 4.08 Network Access Control (NAC)
  • 4.09 Content Delivery Network (CDN)
  • 4.10 Networks
  • 4.11 Software-Defined Networking (SDN)
  • 4.12 Remote Access
  • 4.13 Internet Security Protocol (IPsec)
  • 4.14 Voice over Internet Protocol (VoIP)
  • 4.15 Phreaking
  • 4.16 Secure Access Protocols
  • 4.17 Wireless Technologies
  • 4.18 Network Attacks
  • 4.19 Key Takeaways
  • Knowledge Check
  • 5.01 Identity and Access Management
  • 5.02 Identity and Access Management
  • 5.03 Identity Management
  • 5.04 Biometrics
  • 5.05 Passwords
  • 5.06 Tokens
  • 5.07 Memory Cards and Smart Cards
  • 5.08 Access and Authorization Concepts
  • 5.09 Identity Management Implementation
  • 5.10 Kerberos
  • 5.11 Access Control Types
  • 5.12 Access Control Models
  • 5.13 Access Control Tools and Techniques
  • 5.14 Accountability
  • 5.15 Access Control Monitoring
  • 5.16 Identity Proofing
  • 5.17 Markup Languages
  • 5.18 Identity as a Service (IDaaS)
  • 5.19 Key Takeaways
  • Knowledge Check
  • 6.01 Security Assessment and Testing
  • 6.02 Security Assessment
  • 6.03 Vulnerability Assessment
  • 6.04 Penetration Testing
  • 6.05 Audits
  • 6.06 Log Management
  • 6.07 Synthetic Transaction and Real Transaction
  • 6.08 Testing
  • 6.09 Software Testing
  • 6.10 Interface
  • 6.11 Key Performance Indicators (KPI)
  • 6.12 Key Takeaways
  • Knowledge Check
  • 7.01 Security Operations
  • 7.02 Investigation
  • 7.03 Forensic Investigation
  • 7.04 Evidence
  • 7.05 Electronic Discovery
  • 7.06 Incident Management
  • 7.07 Security Operations Management
  • 7.08 Identity and Access Management
  • 7.09 Assets
  • 7.10 Malware
  • 7.11 Management
  • 7.12 Recovery and Backup
  • 7.13 Disaster Recovery
  • 7.14 Perimeter Security
  • 7.15 Key Takeaways
  • Knowledge Check
  • 8.01 Software Development Security
  • 8.02 Importance of Software Development Security
  • 8.03 Programming Concepts
  • 8.04 Systems Development Life Cycle
  • 8.05 Application Program Interface
  • 8.06 Software Security and Assurance
  • 8.07 Database and Data Warehouse Environments
  • 8.08 Knowledge Management
  • 8.09 Web Application Environment
  • 8.10 Security Threats and Attacks
  • 8.11 Key Takeaways
  • Knowledge Check
© 2020 All Rights Reserved by JOYATRES | Designed By LOONEYCODES