cissp-certification-training
Highest Rated

CISSP Certification

CISSP training is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the CISSP CBK (Common Body of Knowledge). CISSP certification will help you to gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

  • Gain the required skills to design the architecture and manage IT security in an enterprise environment through this authorized CISSP course.
  • Define architecture, design and management of the security of your organization.
  • Earn the requisite 30 CPEs required to take up the CISSP certification exam.
  • Develop working knowledge in the 8 domains prescribed by the CISSP Common Book of Knowledge, 2015.
  • Define and relate information security governance and Risk Management Framework including the policies, concepts, principles, structures and standards that are established for the protection of information assets and how to assess the effectiveness of that protection.
  • Develop deep understanding of the basics of telecommunication and network security concepts, required components for minimizing security risks, securing channels of communication, and techniques for preventing and detecting network-based attacks.
  • Identify the processes of security operations and how to protect and control information processing assets in a centralized or distributed environment in this CISSP training.

       

(12,000)
Enroll Now  

CISSP Certification

Enroll Now
Catogory

Cyber Security

Duration Time

45 hours

Price

Rs. 2000

CISSP training is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the CISSP CBK (Common Body of Knowledge). CISSP certification will help you to gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

CISSP certification 5-day course concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. And the CISSP course covers the 8 domains of the CISSP Common Body of Knowledge as reorganized in early 2015 and fully includes the updates that came into effect from 1 April 2018.  The CISSP training will broaden and deepen your understanding of the domains and give preparation for the (ISC)2 CISSP certification examination.

Certified Information Systems Security Professional (CISSP) Certification was designed to recognize mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The CISSP certification is managed by the International Information Systems Security Certification Consortium (ISC)², to recognize individuals who have distinguished themselves as experienced, knowledgeable, and proficient information security practitioners. CISSP training can enhance a professional's career and provide added credibility. CISSP course is an approved certification for certain job classifications identified within DoD Directive 8570.

What is CISSP?

The CISSP (Certified Information Systems Security Professional) certification has become a pre-requisite for anyone developing a senior career in information security. The CISSP certification provides information security professionals with an objective measure of competence and a globally recognized standard of achievement. The CISSP training credential suits mid and senior-level managers who are working towards, or have already attained positions as, CISOs, CSOs or Senior Security Engineers.

CISSP certification was developed and is maintained by (ISC)², the International Information Systems Security Certification Consortium. At the heart of CISSP is an information security common body of knowledge (CBK), which is divided into eight domains.

CISSP Certification Modules


  • Confidentiality, integrity and availability concepts.
  • Security governance principles.
  • Compliance.
  • Legal and regulatory issues.
  • Professional ethics.
  • Security policies, standards, procedures and guidelines.
  • Information and asset classification.
  • Ownership (e.g. data owners, system owners).
  • Protect privacy.
  • Appropriate retention.
  • Data security controls.
  • Handling requirements (e.g. markings, labels, storage).
  • Engineering processes using secure design principles.
  • Security models fundamental concepts.
  • Security evaluation models.
  • Security capabilities of information systems.
  • Security architectures, designs and solution element vulnerabilities.
  • Web-based system vulnerabilities.
  • Mobile system vulnerabilities.
  • Embedded devices and cyber-physical system vulnerabilities.
  • Cryptography.
  • Site and facility design secure principles.
  • Physical security.
  • Secure network architecture design (e.g. IP and non-IP protocols, segmentation).
  • Secure network components.
  • Secure communication channels.
  • Network attacks.
  • Physical and logical assets control.
  • Identification and authentication of people and devices.
  • Identity-as-a-Service (e.g. cloud identity).
  • Third-party identity services (e.g. on-premise).
  • Access control attacks.
  • Identity and access provisioning lifecycle (e.g. provisioning review).
  • Assessment and test strategies.
  • Security process data (e.g. management and operational controls).
  • Security control testing.
  • Test outputs (e.g. automated, manual).
  • Security architecture vulnerabilities.
  • Investigations support and requirements.
  • Logging and monitoring activities.
  • Provisioning of resources.
  • Foundational security operations concepts.
  • Resource protection techniques.
  • Incident management.
  • Preventative measures.
  • Patch and vulnerability management.
  • Change management processes.
  • Recovery strategies.
  • Disaster recovery processes and plans.
  • Business continuity planning and exercises.
  • Physical security.
  • Personnel safety concerns.
  • Security in the software development lifecycle.
  • Development of environment security controls.
  • Software security effectiveness.
  • Acquired software security impact.

Course Outline

  • Security and Risk Management (Security, Risk, Compliance, Law, Regulations and Business Continuity)
    • Confidentiality, integrity and availability concepts.
    • Security governance principles.
    • Compliance.
    • Legal and regulatory issues.
    • Professional ethics.
    • Security policies, standards, procedures and guidelines.
  • Asset Security (Protecting Security of Assets)
    • Information and asset classification.
    • Ownership (e.g. data owners, system owners).
    • Protect privacy.
    • Appropriate retention.
    • Data security controls.
    • Handling requirements (e.g. markings, labels, storage).
  • Security Engineering (Engineering and Management of Security)
    • Engineering processes using secure design principles.
    • Security models fundamental concepts.
    • Security evaluation models.
    • Security capabilities of information systems.
    • Security architectures, designs and solution element vulnerabilities.
    • Web-based system vulnerabilities.
    • Mobile system vulnerabilities.
    • Embedded devices and cyber-physical system vulnerabilities.
    • Cryptography.
    • Site and facility design secure principles.
    • Physical security.
  • Communication and Network Security (Designing and Protecting Network Security)
    • Secure network architecture design (e.g. IP and non-IP protocols, segmentation).
    • Secure network components.
    • Secure communication channels.
    • Network attacks.
  • Identity and Access Management (Controlling Access and Managing Identity)
    • Physical and logical assets control.
    • Identification and authentication of people and devices.
    • Identity-as-a-Service (e.g. cloud identity).
    • Third-party identity services (e.g. on-premise).
    • Access control attacks.
    • Identity and access provisioning lifecycle (e.g. provisioning review).
  • Security Assessment and Testing (Designing, Performing and Analysing Security Testing)
    • Assessment and test strategies.
    • Security process data (e.g. management and operational controls).
    • Security control testing.
    • Test outputs (e.g. automated, manual).
    • Security architecture vulnerabilities.
  • Security Operations (Foundational Concepts, Investigations, Incident Management and Disaster Recovery)
    • Investigations support and requirements.
    • Logging and monitoring activities.
    • Provisioning of resources.
    • Foundational security operations concepts.
    • Resource protection techniques.
    • Incident management.
    • Preventative measures.
    • Patch and vulnerability management.
    • Change management processes.
    • Recovery strategies.
    • Disaster recovery processes and plans.
    • Business continuity planning and exercises.
    • Physical security.
    • Personnel safety concerns.
  • Software Development Security (Understanding, Applying and Enforcing Software Security)
    • Security in the software development lifecycle.
    • Development of environment security controls.
    • Software security effectiveness.
    • Acquired software security impact.

What do I need to do to unlock my Eduinpro certificate?

Online Classroom:

  • Attend one complete batch
  • Successful completion and evaluation of any one of the given projects

Online Self-learning:

  • Complete 85% of the course
  • Successful completion and evaluation of any one of the given projects

Featured Review

Generic placeholder image
Anup Acharya

I Attended a 2 day weekend course by EduInPro for the CISSP Certification certification. The instructor was very knowledgeable and engaging. Had Excellent learning and experience.
Generic placeholder image
Bhibudatta

I attended training for CISSP Certification and the training was very interactive and helpful. Got clarity on many concepts related to Scrum Master role.
Generic placeholder image
Sreeram Narayan

I came across EduInPro for CISSP Certification . The training was interesting and trainer made the class fun and interesting and the sessions very knowledgeable on the topic!
Generic placeholder image
Namratha Kulkarni

Course with EduInpro was a well-organized one with an excellent tutor. The course included both theoretical and practical real-life cases and hands-on sessions which made training interesting.
Generic placeholder image
Iqbal Arif

EduInPro’s CISSP Certification was excellent and it got numerous concepts together in a simple, practical and detailed package. I highly recommend EduInPro’s PMP training even if you don't plan to sit for the PMP exam.
Generic placeholder image
Ruthvik Sharma

I came across EduInPro’s CISSP Certification online and its self-paced module encouraged me to take up the course and made me more proactive with my learning. I took detailed notes, and attended the classes to fit in with my busy schedule and was happy with the course.
Generic placeholder image
Garima Khera

EduInPro’s CISSP Certification training were so well designed. The hands-on projects helped me understand the theory sessions in depth and apply them on my website.
FREQUENTLY ASKED QUESTIONS
(ISC)² has an obligation to its membership to maintain the relevancy of its credentials. These enhancements are the result of a rigorous, methodical processes that (ISC) ² follows to routinely update its credential exams. This process ensures that the examinations and subsequent continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today's practicing information security professionals.
The content of the CISSP has been refreshed to reflect the most pertinent issues that information security professionals currently face, along with the best practices for mitigating those issues. Some topics have been updated while others have been realigned. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization’s information security program within an ever-changing security landscape.
Domains change because it is a reflection of a change in the knowledge, skills and abilities, as indicated by experts through the Job Task Analysis process.
The changes will begin on April 15, 2018.
The refreshed CISSP exam will be available in English, French, German, Brazilian Portuguese, Spanish, Japanese, Simplified Chinese and Korean.
No. The CISSP exam will have the same number of items, and the time required to take the exam will be the same.
(ISC) ² exams are experience-based that include experience-based questions that cannot be learned by studying alone. If you already have the experience in the domains covered in CISSP and believe that you have sufficiently studied those domains, you should feel confident that you are qualified to take the new exam and pass it. (ISC) ² cannot guarantee you will pass the exam.
No. For the CISSP, a candidate is required to have a minimum of 5 years cumulative paid full-time work experience in 2 or more of the 8 domains of the CISSP CBK.
The Official (ISC) ² CISSP Training Course (classroom-based and online-instructor led) will be available in April 2018. The Official (ISC) ² CISSP CBK, Practice Test Book and CISSP for Dummies will be available in the third quarter of 2018.
Contact Us

80-95942111

Request more information

Recent Courses

Card image cap
Best Seller
PMI’s Risk Management Professional (PMI-RMP)
(12,000)

Card image cap
Best Seller
Search Engine Optimization Certification
(12,000)

SUBSCRIBE FOR WEEKLY NEWSLETTER

Contact info

#7, 2nd Main, 3rd Phase, JP Nagar, Bangalore-560078(INDIA)

+91-80-95942111

info@sitegalleria.com

Skype