Description

CISSP is the most renowned certification in the information security domain. Our CISSP certification training program aims to equip participants with in-demand technical and administrative competence to design, architect, and manage an organization’s security posture by applying internationally accepted information security standards. The training offers an in-depth understanding of eight domains that comprise CISSP common body knowledge (CBK) and prepares you for the CISSP exam held by the (ISC)2.

Note:

CISSP® is a registered mark of The International Information Systems Security Certification Consortium ((ISC)2).

Course Objectives

Competently identify and handle security threats

Thoroughly understand the 8 essential core domains of the common body of knowledge

Target Audience

Chief Information Security Officer

Chief Information Officer

Director of Security

IT Director/Manager

Security Systems Engineer

Security Analyst

Security Manager

Security Auditor

Security Architect

Security Consultant

Network Architect

IT professionals who wish to take up the CISSP Exam

Basic Understanding

CISSP Exam Prerequisites

Candidates who wish to take up the Certified Information Systems Security Professional (CISSP) exam have a minimum 5 years of work experience in two or more of the 8 domains prescribed by ISC2 in their CISSP Common Body of Knowledge (CBK)

There can be a waiver of 1 year from the required 5-year experience if the candidate has a 4-year college degree or any additional certification credential from ISC2 approved course list.

Course Content

No sessions available.

Simpliv Logo
Simpliv LLC
39658 Mission Boulevard,
Fremont, CA 94539, USA

CISSP Certification Training

Session 1: Security and Risk Management

  1. Understand, adhere to, and promote professional ethics
  2. Understand and apply security concepts
  3. Evaluate and apply security governance principles
  4. Determine compliance and other requirements
  5. Understand legal and regulatory issues that pertain to information security in a holistic context
  6. Understand requirements for investigation types
  7. Develop, document, and implement security policy, standards, procedures, and guidelines
  8. Identify, analyze, and prioritize Business Continuity (BC) requirements
  9. Contribute to and enforce personnel security policies and procedures
  10. Understand and apply risk management concepts
  11. Understand and apply threat modelling concepts and methodologies
  12. Apply Supply Chain Risk Management (SCRM) concepts
  13. Establish and maintain a security awareness, education, and training program

Session 2: Asset Security

  1. Identify and classify information and assets
  2. Establish information and asset handling requirements
  3. Provision resources securely
  4. Manage data lifecycle
  5. Ensure appropriate asset retention
  6. Determine data security controls and compliance requirements

Session 3: Security Architecture and Engineering

  1. Research, implement and manage engineering processes using secure design principles
  2. Understand the fundamental concepts of security models
  3. Select controls based upon systems security requirements
  4. Understand security capabilities of Information Systems (IS)
  5. Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  6. Select and determine cryptographic solutions
  7. Understand methods of cryptanalytic attacks
  8. Apply security principles to site and facility design
  9. Design site and facility security controls

Session 4: Communication and Network Security

  1. Assess and implement secure design principles in network architectures
  2. Secure network components
  3. Implement secure communication channels according to design

Session 5: Identity and Access Management (IAM)

  1. Control physical and logical access to assets
  2. Manage identification and authentication of people, devices, and services
  3. Federated identity with a third-party service
  4. Implement and manage authorization mechanisms
  5. Manage the identity and access provisioning lifecycle
  6. Implement authentication systems

Session 6: Security Assessment and Testing

  1. Design and validate assessment, test, and audit strategies
  2. Conduct security control testing
  3. Collect security processes data
  4. Analyze test output and generate report
  5. Conduct or facilitate security audits

Session 7: Security Operations

  1. Understand and comply with investigations
  2. Conduct logging and monitoring activities
  3. Perform Configuration Management (CM)
  4. Apply foundational security operations and concepts
  5. Apply resource protection
  6. Conduct incident management
  7. Operate and maintain detective and preventative measures
  8. Implement and support patch and vulnerability management
  9. Understand and participate in change management processes
  10. Implement recovery strategies
  11. Implement Disaster Recovery (DR) processes
  12. Test Disaster Recovery Plans (DRP)
  13. Participate in Business Continuity (BC) planning and exercises
  14. Implement and manage physical security
  15. Address personnel safety and security concerns

Session 8: Software Development Security

  1. Understand and integrate security in the Software Development Life Cycle (SDLC)
  2. Assess the effectiveness of software security
  3. Assess security impact of acquired software
  4. Define and apply secure coding guidelines and standards

Coupons

No offers available at this time.

Live Support

Call

+510-849-6155

Mail to

support@simplivlearning.com

Similar Courses

Our Trusted Clients