Location
-
Format
What’s this? Ways to train
Classroom
Live, instructor-led training in a standard, professional classroom environmentVirtual
Live, instructor-led training conducted over the internet, with hands-on labsOnline
An online, HTML5, self-paced learning experience available for all coursesOn-site
Private training for your entire team, delivered at your location, a training center, or onlineVideo classroom
Learn more about our training formats
High-definition video of our most popular courses, streamed to your laptop or personal device
-
32 Hours
-
HRDF SBL Claimable
-
Certificate of Attendance available
-
180 days of access from date of purchase
-
0 Days
-
All of our private classes are customized to your organization's needs.
-
Click on the button below to send us your details and you will be contacted shortly.
Already purchased this offering? Log in
Request more information
Inquiry for: Myself My Company
By providing your contact details, you agree to our Privacy Policy
Thank You
Our learning consultant will get back to you in 1 business day
CISSP (Certified Information Systems Security Professional) - Simplilearn
WHAT YOU WILL LEARN
Simplilearn's CISSP certification training
is aligned to the (ISC) ² CBK 2015 and trains you in the industry's latest best
practices, which will help you ace the exam in the first attempt. The
certification helps you develop the expertise in defining the architecture, in
designing, building, and maintaining a secure business environment for your
organization using globally approved Information Security standards.
AUDIENCE
The CISSP certification is a
globally recognized professional requirement in the IT Security domain.
This certification is best-suited for:
- Security Consultants/Managers
- IT Directors/Managers
- Security Auditors/Architects
- Security Systems Engineers
- Chief Information Security Officers
- Network Architects
COURSE OBJECTIVES
By the end of this training, you will:
- Be able to define the architecture, and design and manage the security of your organization.
- Acquire the relevant knowledge and skills required to clear the CISSP certification exam.
- Earn the requisite 30 CPEs required to take up the CISSP certification exam.
- Develop working knowledge in the 8 domains areas prescribed by the CISSP Common Book of Knowledge, 2015.
Modules
- CISSP
- About (ISC)²
- CISSP Domains
- Why CISSP?
- How to Certify?
- About CISSP Exam
- Information Security Management
- Confidentiality, Integrity, and Availability (CIA)
- Security Policy Implementation
- Information Risk Analysis and Risk Management
- Managing Personnel Security and Managing Security Function
- Computer crime
- Major legal systems
- Intellectual Property (IP) law
- US Privacy laws and EU Council Directive (Law) on Data Protection
- BCP process
- Classify information and supporting assets
- Determine and maintain ownership
- Protect Privacy
- Ensure appropriate retention
- Establish handling requirements
- Understand security engineering processes using secure design principles
- Architecture Frameworks
- Security Models
- Evaluation Criteria
- Enterprise and System Security Architecture
- Distributed Systems
- System Security Threats and identify Countermeasures
- Cryptography
- Physical security
- Secure network architecture and design
- Securing network components
- Secure communication channels
- Network Attacks and Countermeasures
- Controlling physical and logical access to assets
- Identification and authentication of people and devices
- Integrate identity as a service and third-party identity services
- Implement and manage authorization mechanisms
- Prevent or mitigate access control attacks
- Manage the identity and access provisioning lifecycle
- Design and validate assessment and test strategies
- Conduct security control testing
- Collect security process data
- Analyze and report test output
- Conduct or facilitate internal and third-party audits
- Understand and support investigations
- Understand requirements for investigation types
- Conduct logging and monitoring activities
- Secure the provisioning of resources
- Understand and apply foundational security operations concepts
- Employ resource protection techniques
- Conduct incident response
- Operate and maintain preventative measures
- Implement and support patch and vulnerability management
- Participate in and understand change management processes
- Implement recovery strategies. Implement disaster recovery processes
- Recognize the importance of system environments and programming concepts
- Discuss Object-Oriented Programming
- Describe the system life cycle and systems development
- Explain database and data warehousing environments
- List the ten best practices for secure software development – (ISC)²
Course Reviews
0
0 Ratings