CISSP Certification
Enroll Now
Cyber Security
45 hours
Rs. 2000
CISSP training is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the CISSP CBK (Common Body of Knowledge). CISSP certification will help you to gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.
CISSP certification 5-day course concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. And the CISSP course covers the 8 domains of the CISSP Common Body of Knowledge as reorganized in early 2015 and fully includes the updates that came into effect from 1 April 2018. The CISSP training will broaden and deepen your understanding of the domains and give preparation for the (ISC)2 CISSP certification examination.
Certified Information Systems Security Professional (CISSP) Certification was designed to recognize mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The CISSP certification is managed by the International Information Systems Security Certification Consortium (ISC)², to recognize individuals who have distinguished themselves as experienced, knowledgeable, and proficient information security practitioners. CISSP training can enhance a professional's career and provide added credibility. CISSP course is an approved certification for certain job classifications identified within DoD Directive 8570.
What is CISSP?
The CISSP (Certified Information Systems Security Professional) certification has become a pre-requisite for anyone developing a senior career in information security. The CISSP certification provides information security professionals with an objective measure of competence and a globally recognized standard of achievement. The CISSP training credential suits mid and senior-level managers who are working towards, or have already attained positions as, CISOs, CSOs or Senior Security Engineers.
CISSP certification was developed and is maintained by (ISC)², the International Information Systems Security Certification Consortium. At the heart of CISSP is an information security common body of knowledge (CBK), which is divided into eight domains.
CISSP Certification Modules
- Confidentiality, integrity and availability concepts.
- Security governance principles.
- Compliance.
- Legal and regulatory issues.
- Professional ethics.
- Security policies, standards, procedures and guidelines.
- Information and asset classification.
- Ownership (e.g. data owners, system owners).
- Protect privacy.
- Appropriate retention.
- Data security controls.
- Handling requirements (e.g. markings, labels, storage).
- Engineering processes using secure design principles.
- Security models fundamental concepts.
- Security evaluation models.
- Security capabilities of information systems.
- Security architectures, designs and solution element vulnerabilities.
- Web-based system vulnerabilities.
- Mobile system vulnerabilities.
- Embedded devices and cyber-physical system vulnerabilities.
- Cryptography.
- Site and facility design secure principles.
- Physical security.
- Secure network architecture design (e.g. IP and non-IP protocols, segmentation).
- Secure network components.
- Secure communication channels.
- Network attacks.
- Physical and logical assets control.
- Identification and authentication of people and devices.
- Identity-as-a-Service (e.g. cloud identity).
- Third-party identity services (e.g. on-premise).
- Access control attacks.
- Identity and access provisioning lifecycle (e.g. provisioning review).
- Assessment and test strategies.
- Security process data (e.g. management and operational controls).
- Security control testing.
- Test outputs (e.g. automated, manual).
- Security architecture vulnerabilities.
- Investigations support and requirements.
- Logging and monitoring activities.
- Provisioning of resources.
- Foundational security operations concepts.
- Resource protection techniques.
- Incident management.
- Preventative measures.
- Patch and vulnerability management.
- Change management processes.
- Recovery strategies.
- Disaster recovery processes and plans.
- Business continuity planning and exercises.
- Physical security.
- Personnel safety concerns.
- Security in the software development lifecycle.
- Development of environment security controls.
- Software security effectiveness.
- Acquired software security impact.
Course Outline
- Security and Risk Management (Security, Risk, Compliance, Law, Regulations and Business Continuity)
- Confidentiality, integrity and availability concepts.
- Security governance principles.
- Compliance.
- Legal and regulatory issues.
- Professional ethics.
- Security policies, standards, procedures and guidelines.
- Asset Security (Protecting Security of Assets)
- Information and asset classification.
- Ownership (e.g. data owners, system owners).
- Protect privacy.
- Appropriate retention.
- Data security controls.
- Handling requirements (e.g. markings, labels, storage).
- Security Engineering (Engineering and Management of Security)
- Engineering processes using secure design principles.
- Security models fundamental concepts.
- Security evaluation models.
- Security capabilities of information systems.
- Security architectures, designs and solution element vulnerabilities.
- Web-based system vulnerabilities.
- Mobile system vulnerabilities.
- Embedded devices and cyber-physical system vulnerabilities.
- Cryptography.
- Site and facility design secure principles.
- Physical security.
- Communication and Network Security (Designing and Protecting Network Security)
- Secure network architecture design (e.g. IP and non-IP protocols, segmentation).
- Secure network components.
- Secure communication channels.
- Network attacks.
- Identity and Access Management (Controlling Access and Managing Identity)
- Physical and logical assets control.
- Identification and authentication of people and devices.
- Identity-as-a-Service (e.g. cloud identity).
- Third-party identity services (e.g. on-premise).
- Access control attacks.
- Identity and access provisioning lifecycle (e.g. provisioning review).
- Security Assessment and Testing (Designing, Performing and Analysing Security Testing)
- Assessment and test strategies.
- Security process data (e.g. management and operational controls).
- Security control testing.
- Test outputs (e.g. automated, manual).
- Security architecture vulnerabilities.
- Security Operations (Foundational Concepts, Investigations, Incident Management and Disaster Recovery)
- Investigations support and requirements.
- Logging and monitoring activities.
- Provisioning of resources.
- Foundational security operations concepts.
- Resource protection techniques.
- Incident management.
- Preventative measures.
- Patch and vulnerability management.
- Change management processes.
- Recovery strategies.
- Disaster recovery processes and plans.
- Business continuity planning and exercises.
- Physical security.
- Personnel safety concerns.
- Software Development Security (Understanding, Applying and Enforcing Software Security)
- Security in the software development lifecycle.
- Development of environment security controls.
- Software security effectiveness.
- Acquired software security impact.
What do I need to do to unlock my Eduinpro certificate?
Online Classroom:
- Attend one complete batch
- Successful completion and evaluation of any one of the given projects
Online Self-learning:
- Complete 85% of the course
- Successful completion and evaluation of any one of the given projects
Featured Review

Anup Acharya
I Attended a 2 day weekend course by EduInPro for the CISSP Certification certification. The instructor was very knowledgeable and engaging. Had Excellent learning and experience.

Bhibudatta
I attended training for CISSP Certification and the training was very interactive and helpful. Got clarity on many concepts related to Scrum Master role.

Sreeram Narayan
I came across EduInPro for CISSP Certification . The training was interesting and trainer made the class fun and interesting and the sessions very knowledgeable on the topic!

Namratha Kulkarni
Course with EduInpro was a well-organized one with an excellent tutor. The course included both theoretical and practical real-life cases and hands-on sessions which made training interesting.

Iqbal Arif
EduInPro’s CISSP Certification was excellent and it got numerous concepts together in a simple, practical and detailed package. I highly recommend EduInPro’s PMP training even if you don't plan to sit for the PMP exam.

Ruthvik Sharma
I came across EduInPro’s CISSP Certification online and its self-paced module encouraged me to take up the course and made me more proactive with my learning. I took detailed notes, and attended the classes to fit in with my busy schedule and was happy with the course.

Garima Khera
EduInPro’s CISSP Certification training were so well designed. The hands-on projects helped me understand the theory sessions in depth and apply them on my website.