cissp-certification-training
Highest Rated

CISSP Certification

CISSP training is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the CISSP CBK (Common Body of Knowledge). CISSP certification will help you to gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

  • Gain the required skills to design the architecture and manage IT security in an enterprise environment through this authorized CISSP course.
  • Define architecture, design and management of the security of your organization.
  • Earn the requisite 30 CPEs required to take up the CISSP certification exam.
  • Develop working knowledge in the 8 domains prescribed by the CISSP Common Book of Knowledge, 2015.
  • Define and relate information security governance and Risk Management Framework including the policies, concepts, principles, structures and standards that are established for the protection of information assets and how to assess the effectiveness of that protection.
  • Develop deep understanding of the basics of telecommunication and network security concepts, required components for minimizing security risks, securing channels of communication, and techniques for preventing and detecting network-based attacks.
  • Identify the processes of security operations and how to protect and control information processing assets in a centralized or distributed environment in this CISSP training.

       

(12,000)
Enroll Now  

CISSP Certification

Enroll Now
Catogory

Cyber Security

Duration Time

45 hours

Price

Rs. 2000

The CISSP (Certified Information Systems Security Professional) certification has become a pre-requisite for anyone developing a senior career in information security. The CISSP certification provides information security professionals with an objective measure of competence and a globally recognized standard of achievement. The CISSP training credential suits mid and senior-level managers who are working towards, or have already attained positions as, CISOs, CSOs or Senior Security Engineers. CISSP certification was developed and is maintained by (ISC)², the International Information Systems Security Certification Consortium. At the heart of CISSP is an information security common body of knowledge (CBK), which is divided into eight domains.

CISSP Certification Modules


  • Confidentiality, integrity and availability concepts.
  • Security governance principles.
  • Compliance.
  • Legal and regulatory issues.
  • Professional ethics.
  • Security policies, standards, procedures and guidelines.
  • Information and asset classification.
  • Ownership (e.g. data owners, system owners).
  • Protect privacy.
  • Appropriate retention.
  • Data security controls.
  • Handling requirements (e.g. markings, labels, storage).
  • Engineering processes using secure design principles.
  • Security models fundamental concepts.
  • Security evaluation models.
  • Security capabilities of information systems.
  • Security architectures, designs and solution element vulnerabilities.
  • Web-based system vulnerabilities.
  • Mobile system vulnerabilities.
  • Embedded devices and cyber-physical system vulnerabilities.
  • Cryptography.
  • Site and facility design secure principles.
  • Physical security.
  • Secure network architecture design (e.g. IP and non-IP protocols, segmentation).
  • Secure network components.
  • Secure communication channels.
  • Network attacks.
  • Physical and logical assets control.
  • Identification and authentication of people and devices.
  • Identity-as-a-Service (e.g. cloud identity).
  • Third-party identity services (e.g. on-premise).
  • Access control attacks.
  • Identity and access provisioning lifecycle (e.g. provisioning review).
  • Assessment and test strategies.
  • Security process data (e.g. management and operational controls).
  • Security control testing.
  • Test outputs (e.g. automated, manual).
  • Security architecture vulnerabilities.
  • Investigations support and requirements.
  • Logging and monitoring activities.
  • Provisioning of resources.
  • Foundational security operations concepts.
  • Resource protection techniques.
  • Incident management.
  • Preventative measures.
  • Patch and vulnerability management.
  • Change management processes.
  • Recovery strategies.
  • Disaster recovery processes and plans.
  • Business continuity planning and exercises.
  • Physical security.
  • Personnel safety concerns.
  • Security in the software development lifecycle.
  • Development of environment security controls.
  • Software security effectiveness.
  • Acquired software security impact.

Course Outline

  • Security and Risk Management (Security, Risk, Compliance, Law, Regulations and Business Continuity)
    • Confidentiality, integrity and availability concepts.
    • Security governance principles.
    • Compliance.
    • Legal and regulatory issues.
    • Professional ethics.
    • Security policies, standards, procedures and guidelines.
  • Asset Security (Protecting Security of Assets)
    • Information and asset classification.
    • Ownership (e.g. data owners, system owners).
    • Protect privacy.
    • Appropriate retention.
    • Data security controls.
    • Handling requirements (e.g. markings, labels, storage).
  • Security Engineering (Engineering and Management of Security)
    • Engineering processes using secure design principles.
    • Security models fundamental concepts.
    • Security evaluation models.
    • Security capabilities of information systems.
    • Security architectures, designs and solution element vulnerabilities.
    • Web-based system vulnerabilities.
    • Mobile system vulnerabilities.
    • Embedded devices and cyber-physical system vulnerabilities.
    • Cryptography.
    • Site and facility design secure principles.
    • Physical security.
  • Communication and Network Security (Designing and Protecting Network Security)
    • Secure network architecture design (e.g. IP and non-IP protocols, segmentation).
    • Secure network components.
    • Secure communication channels.
    • Network attacks.
  • Identity and Access Management (Controlling Access and Managing Identity)
    • Physical and logical assets control.
    • Identification and authentication of people and devices.
    • Identity-as-a-Service (e.g. cloud identity).
    • Third-party identity services (e.g. on-premise).
    • Access control attacks.
    • Identity and access provisioning lifecycle (e.g. provisioning review).
  • Security Assessment and Testing (Designing, Performing and Analysing Security Testing)
    • Assessment and test strategies.
    • Security process data (e.g. management and operational controls).
    • Security control testing.
    • Test outputs (e.g. automated, manual).
    • Security architecture vulnerabilities.
  • Security Operations (Foundational Concepts, Investigations, Incident Management and Disaster Recovery)
    • Investigations support and requirements.
    • Logging and monitoring activities.
    • Provisioning of resources.
    • Foundational security operations concepts.
    • Resource protection techniques.
    • Incident management.
    • Preventative measures.
    • Patch and vulnerability management.
    • Change management processes.
    • Recovery strategies.
    • Disaster recovery processes and plans.
    • Business continuity planning and exercises.
    • Physical security.
    • Personnel safety concerns.
  • Software Development Security (Understanding, Applying and Enforcing Software Security)
    • Security in the software development lifecycle.
    • Development of environment security controls.
    • Software security effectiveness.
    • Acquired software security impact.

What do I need to do to unlock my Eduinpro certificate?

Online Classroom:

  • Attend one complete batch
  • Successful completion and evaluation of any one of the given projects

Online Self-learning:

  • Complete 85% of the course
  • Successful completion and evaluation of any one of the given projects

Featured Review

Generic placeholder image
Ankit Prakash

Cras sit amet nibh libero, in gravida nulla. Nulla vel metus scelerisque ante sollicitudin. Cras purus odio, vestibulum in vulputate at, tempus viverra turpis. Fusce condimentum nunc ac nisi vulputate fringilla. Donec lacinia congue felis in faucibus.
Generic placeholder image
Ankit Prakash

Cras sit amet nibh libero, in gravida nulla. Nulla vel metus scelerisque ante sollicitudin. nunc ac nisi vulputate fringilla. Donec lacinia congue felis in faucibus.
FREQUENTLY ASKED QUESTIONS
(ISC)² has an obligation to its membership to maintain the relevancy of its credentials. These enhancements are the result of a rigorous, methodical processes that (ISC) ² follows to routinely update its credential exams. This process ensures that the examinations and subsequent continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today's practicing information security professionals.
The content of the CISSP has been refreshed to reflect the most pertinent issues that information security professionals currently face, along with the best practices for mitigating those issues. Some topics have been updated while others have been realigned. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization’s information security program within an ever-changing security landscape.
Domains change because it is a reflection of a change in the knowledge, skills and abilities, as indicated by experts through the Job Task Analysis process.
The changes will begin on April 15, 2018.
The refreshed CISSP exam will be available in English, French, German, Brazilian Portuguese, Spanish, Japanese, Simplified Chinese and Korean.
No. The CISSP exam will have the same number of items, and the time required to take the exam will be the same.
(ISC) ² exams are experience-based that include experience-based questions that cannot be learned by studying alone. If you already have the experience in the domains covered in CISSP and believe that you have sufficiently studied those domains, you should feel confident that you are qualified to take the new exam and pass it. (ISC) ² cannot guarantee you will pass the exam.
No. For the CISSP, a candidate is required to have a minimum of 5 years cumulative paid full-time work experience in 2 or more of the 8 domains of the CISSP CBK.
The Official (ISC) ² CISSP Training Course (classroom-based and online-instructor led) will be available in April 2018. The Official (ISC) ² CISSP CBK, Practice Test Book and CISSP for Dummies will be available in the third quarter of 2018.
Contact Us

80-95942111

Request more information

Recent Courses

Card image cap
Best Seller
PMI’s Risk Management Professional (PMI-RMP)
(12,000)

Card image cap
Best Seller
Search Engine Optimization Certification
(12,000)

SUBSCRIBE FOR WEEKLY NEWSLETTER

Contact info

Class aptent taciti sociosqu ad litora torquent per

#7, 2nd Main, 3rd Phase, JP Nagar, Bangalore-560078(INDIA)

+91-80-95942111

info@sitegalleria.com

Skype