CISSP

CloudLabs

Projects

Assignment

24x7 Support

Lifetime Access

.

Course Overview

Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the International Information Systems Security Certification Consortium, also known as (ISC)².The CISSP curriculum covers subject matter in a variety of Information Security topics. The CISSP examination is based on what (ISC)² terms the Common Body of Knowledge (or CBK). According to (ISC)², “the CISSP CBK is a taxonomy – a collection of topics relevant to information security professionals around the world. The CISSP CBK establishes a common framework of information security terms and principles that allow information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession with a common understanding.

At the end of the training, participants will be able to:

Pre-requisite

None

Duarion

5 days

Course Outline

  1. Effectiveness
  2. Attacks
  1. Network architecture and design
  2. Communication channels
  3. Network components
  4. Network attacks
  1. Security governance and policy
  2. Information classification/ownership
  3. Contractual agreements and procurement processes
  4. Risk management concepts
  5. Personnel security
  6. Security education, training and awareness
  7. Certification and accreditation
  1. Systems development life cycle (SDLC)
  2. Application environment and security controls
  3. Effectiveness of application security
  1. Encryption concepts
  2. Digital signatures
  3. Cryptanalytic attacks
  4. Public Key Infrastructure (PKI)
  5. Information hiding alternatives
  1. Fundamental concepts of security models
  2. Capabilities of information systems (e.g. memory protection, virtualization)
  3. Countermeasure principles
  4. Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)
  1. Resource protection
  2. Incident response
  3. Attack prevention and response
  4. Patch and vulnerability management
  1. Business impact analysis
  2. Recovery strategy
  3. Disaster recovery process
  4. Provide training
  1. Legal issues
  2. Investigations
  3. Forensic procedures
  4. Compliance requirements/procedures
  1. Site/facility design considerations
  2. Perimeter security
  3. Internal security
  4. Facilities security

Reviews