CISSP (Certified Information Systems Security Professional) - Simplilearn | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

CISSP (Certified Information Systems Security Professional) - Simplilearn

  • On Demand Class Icon
    On Demand
    • HRDF SBL Claimable
    • Certificate of Attendance available
    • 180 days of access from date of purchase
    Starting From
    RM 2328.13
    32 Hours
  • Private Class Icon
    Private Class
    • All of our private classes are customized to your organization's needs.

      Click on the button below to send us your details and you will be contacted shortly.
    0 Days

Course Details

Expand All

Simplilearn's CISSP certification training is aligned to the (ISC) ² CBK 2015 and trains you in the industry's latest best practices, which will help you ace the exam in the first attempt. The certification helps you develop the expertise in defining the architecture, in designing, building, and maintaining a secure business environment for your organization using globally approved Information Security standards.

The CISSP certification is a globally recognized professional requirement in the IT Security domain.

This certification is best-suited for:

  • Security Consultants/Managers
  • IT Directors/Managers
  • Security Auditors/Architects
  • Security Systems Engineers
  • Chief Information Security Officers
  • Network Architects

By the end of this training, you will:

  • Be able to define the architecture, and design and manage the security of your organization.
  • Acquire the relevant knowledge and skills required to clear the CISSP certification exam.
  • Earn the requisite 30 CPEs required to take up the CISSP certification exam.
  • Develop working knowledge in the 8 domains areas prescribed by the CISSP Common Book of Knowledge, 2015.

Modules

Expand All
  • CISSP
  • About (ISC)²
  • CISSP Domains
  • Why CISSP?
  • How to Certify?
  • About CISSP Exam
  • Information Security Management
  • Confidentiality, Integrity, and Availability (CIA)
  • Security Policy Implementation
  • Information Risk Analysis and Risk Management
  • Managing Personnel Security and Managing Security Function
  • Computer crime
  • Major legal systems
  • Intellectual Property (IP) law
  • US Privacy laws and EU Council Directive (Law) on Data Protection
  • BCP process
  • Classify information and supporting assets
  • Determine and maintain ownership
  • Protect Privacy
  • Ensure appropriate retention
  • Establish handling requirements
  • Understand security engineering processes using secure design principles
  • Architecture Frameworks
  • Security Models
  • Evaluation Criteria
  • Enterprise and System Security Architecture
  • Distributed Systems
  • System Security Threats and identify Countermeasures
  • Cryptography
  • Physical security
  • Secure network architecture and design
  • Securing network components
  • Secure communication channels
  • Network Attacks and Countermeasures
  • Controlling physical and logical access to assets
  • Identification and authentication of people and devices
  • Integrate identity as a service and third-party identity services
  • Implement and manage authorization mechanisms
  • Prevent or mitigate access control attacks
  • Manage the identity and access provisioning lifecycle
  • Design and validate assessment and test strategies
  • Conduct security control testing
  • Collect security process data
  • Analyze and report test output
  • Conduct or facilitate internal and third-party audits
  • Understand and support investigations
  • Understand requirements for investigation types
  • Conduct logging and monitoring activities
  • Secure the provisioning of resources
  • Understand and apply foundational security operations concepts
  • Employ resource protection techniques
  • Conduct incident response
  • Operate and maintain preventative measures
  • Implement and support patch and vulnerability management
  • Participate in and understand change management processes
  • Implement recovery strategies. Implement disaster recovery processes
  • Recognize the importance of system environments and programming concepts
  • Discuss Object-Oriented Programming
  • Describe the system life cycle and systems development
  • Explain database and data warehousing environments
  • List the ten best practices for secure software development – (ISC)²

Reviews

0
based on 0 ratings reviews