CISSP
CloudLabs
Projects
Assignment
24x7 Support
Lifetime Access
.
Course Overview
Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the International Information Systems Security Certification Consortium, also known as (ISC)².The CISSP curriculum covers subject matter in a variety of Information Security topics. The CISSP examination is based on what (ISC)² terms the Common Body of Knowledge (or CBK). According to (ISC)², “the CISSP CBK is a taxonomy – a collection of topics relevant to information security professionals around the world. The CISSP CBK establishes a common framework of information security terms and principles that allow information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession with a common understanding.
At the end of the training, participants will be able to:
Pre-requisite
None
Duarion
5 days
Course Outline
- Effectiveness
- Attacks
- Network architecture and design
- Communication channels
- Network components
- Network attacks
- Security governance and policy
- Information classification/ownership
- Contractual agreements and procurement processes
- Risk management concepts
- Personnel security
- Security education, training and awareness
- Certification and accreditation
- Systems development life cycle (SDLC)
- Application environment and security controls
- Effectiveness of application security
- Encryption concepts
- Digital signatures
- Cryptanalytic attacks
- Public Key Infrastructure (PKI)
- Information hiding alternatives
- Fundamental concepts of security models
- Capabilities of information systems (e.g. memory protection, virtualization)
- Countermeasure principles
- Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)
- Resource protection
- Incident response
- Attack prevention and response
- Patch and vulnerability management
- Business impact analysis
- Recovery strategy
- Disaster recovery process
- Provide training
- Legal issues
- Investigations
- Forensic procedures
- Compliance requirements/procedures
- Site/facility design considerations
- Perimeter security
- Internal security
- Facilities security