Course Overview
CISSP is the gold standard for security certifications. It covers the breadth of information security’s deep technical and managerial concepts.
Course Objectives
Domain 1: Security and Risk Management
Domain 2: Asset Security
Domain 3: Security Engineering
Domain 4: Communication and Network Security
Domain 5: Identity and Access Management
Domain 6: Security Assessment and Testing
Domain 7: Security Operations
Domain 8: Security in the Software Development Life Cycle
Who Should Attend?
Anyone who wants to benefit from all theknowledge to pass the CISSP exam.
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
1 - Understanding Information Security Concepts in Domain 1 - Security and Risk Management
- Defining Security
- Security Governance
- Effective Security Program
- Compliance
- Global Legal and Regulatory Issues
- Understand Professional Ethics
- Develop and Implement Security Policy
- Business Continuity (BC) & Disaster Recovery (DR) Requirements
- Manage Personnel Security
- Risk Management Concepts
- Threat Modeling
- Acquisitions Strategy and Practice
- Security Education, Training, and Awareness
2 - Understanding Information Security Concepts in Domain 2 - Asset Security Managing Data: Determining and Maintaining Data Ownership
- Data Standards
- Protecting Data
- Classifying Information and Supporting Assets
- Protecting Privacy
- Ensuring Appropriate Retention
- Determining Data Security Controls
- Selecting Standards
3 - Understanding Information Security Concepts in Domain 3 - Security Engineering:
- Using Security Design Principles in The Engineering Lifecycle
- Understanding Fundamental Concepts of Security Models
- Exploring Information Systems Security Evaluation Models
- Ensuring Security Capabilities of Information Systems
- Discovering Vulnerabilities of Security Architectures
- Securing Databases
- Analyzing Vulnerabilities and Threats
- Applying and Using Cryptography
- Site Planning
- Implementing and Operating Facilities Security
4 - Understanding Information Security Concepts in Domain 4- Communication and Network Security
- Secure Network Architecture and Design
- Implications of Multi-Layer Protocols
- Converged Protocols
- Securing Network Components
- Secure Communication Channels
- Network Attacks
5 - Understanding Information Security Concepts in Domain 5 - Identity and Access Management
- Physical and Logical Access to Assets
- Identification and Authentication of People and Devices
- Identity Management Implementation
- Identity as a Service (IDaaS)
- Integrate Third-Party Identity Services
- Implement and Manage Authorization Mechanisms
- Prevent or Mitigate Access Control Attacks
- Identity and Access Provisioning Lifecycle
6 - Understanding Information Security Concepts in Domain 6 - Security Assessment and Testing
- Assessment and Test Strategies
- Collect Security Process Data
- Internal and Third-Party Audits
7 - Understanding Information Security Concepts in Domain 7 Security Operations
- Investigations
- Provisioning of Resources through Configuration Management
- Foundational Security Operations Concepts
- Resource Protection
- Incident Response
- Preventative Measures against Attacks
- Patch and Vulnerability Management
- Change and Configuration Management
- The Disaster Recovery Process
- Test Plan Review
- Business Continuity and Other Risk Areas
- Access Control
- Internal Security
- Building and Inside Security
- Personnel Safety
8 - Understanding Information Security Concepts in Domain 8 - Security in the Software Development Life Cycle
- Software Development Security Outline
- Environment and Security Controls
- Security of the Software Environment
- Software Protection Mechanisms
- Assess the Effectiveness of Software Security
- Assess Software Acquisition Security