CISSP Certification Training | Certified Information Systems Security Professional Training

CISSP Certification Training | Certified Information Systems Security Professional Training

Print Friendly, PDF & Email

Introduction:

CISSP Certification Training | Certified Information Systems Security Professional Training Course hands-on

This CISSP Certification Training course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge). With CISSP Certification Training, you will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity. You will learn how to determine who or what may have altered data or system information, potentially affecting the integrity of those asset and match an entity, such as a person or a computer system, with the actions that entity takes against valuable assets, allowing organizations to have a better understanding of the state of their security posture. Policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets are also covered in this course.

ENO CISSP Certification Training courseware materials are always up to date and synchronized with the latest (ISC)² exam objectives. Our industry leading course curriculum combined with our award-winning CISSP training provided by expert instructors delivers the platform you need in order to pass the CISSP exam with flying colors.

Duration: 5 days

CISSP Certification Training
 

CISSP Certification TrainingRelated Courses
 

Customize It:

» If you are familiar with some aspects of CISSP Certification Training, we can omit or shorten their discussion.
» We can adjust the emphasis placed on the various topics or build the CISSP Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
» If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CISSP Certification Training course in manner understandable to lay audiences.

Audience / Target Group:

The target audience for this CISSP Certification Training course is defined here:

» Anyone whose position requires CISSP certification
» Individuals who want to advance within their current computer security careers or migrate to a related career

Prerequisites:

Candidates must have a minimum of five years of work experience in two or more of the eight domains indicated in the CISSP Common Body of Knowledge® (CBK):

» Security and Risk Management
» Asset Security
» Security Engineering
» Communications and Network Security
» Identity and Access Management
» Security Assessment and Testing
» Security Operations
» Software Development Security

You should have a minimum of five years of experience working in IT Infrastructure and Cybersecurity.

» Cybersecurity Foundations
» Security+ Certification Prep Course

Objectives:

Upon completing this CISSP Certification Training course, learners will be able to meet these objectives:

After completing this CISSP Certification Training course, attendees will be able to:

1.Security and Risk Management
2.Asset Security
3.Security Engineering
4.Communications and Network Security
5.Identity and Access Management
6.Security Assessment and Testing
7.Security Operations
8.Software Development Security

CISSP Certification Training – Course Outline:

1. Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)

Understand and Apply Concepts of Confidentiality, Integrity, and Availability
Apply Security Governance Principles
Compliance
Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
Understand Business Continuity Requirements
Contribute to Personnel Security Policies
Understand and Apply Risk Management Concepts
Understand and Apply Threat Modeling
Integrate Security Risk Considerations into Acquisitions Strategy and Practice
Establish and Manage Security Education, Training, and Awareness

2. Asset Security (Protecting Security of Assets)

Classify Information and Supporting Assets
Determine and Maintain Ownership
Protect Privacy
Ensure Appropriate Retention
Determine Data Security Controls
Establish Handling Requirements

3. Security Engineering (Engineering and Management of Security)

Implement and Manage an Engineering Life Cycle Using Security Design Principles
Understand Fundamental Concepts of Security Models
Select Controls and Countermeasures Based Upon Information Systems Security Standards
Understand the Security Capabilities of Information Systems
Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Assess and Mitigate Vulnerabilities in Web-based Systems
Assess and Mitigate Vulnerabilities in Mobile Systems
Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
Apply Cryptography
Apply Secure Principles to Site and Facility Design
Design and Implement Facility Security

4. Communications and Network Security (Designing and Protecting Network Security)

Apply Secure Design Principles to Network Architecture
Securing Network Components
Design and Establish Secure Communication Channels
Prevent or Mitigate Network Attacks

5. Identity and Access Management (Controlling Access and Managing Identity)

Control Physical and Logical Access to Assets
Manage Identification and Authentication of People and Devices
Integrate Identity as a Service (IDaaS)
Integrate Third-Party Identity Services
Implement and Manage Authorization Mechanisms
Prevent or Mitigate Access Control Attacks
Manage the Identity and Access Provisioning Life Cycle

6. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)

Design and Validate Assessment and Test Strategies
Conduct Security Control Testing
Collect Security Process Data
Conduct or Facilitate Internal and Third-Party Audits

7. Security Operations (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

Understand and Support Investigations
Understand Requirements for Investigation Types
Conduct Logging and Monitoring Activities
Secure the Provisioning of Resources through Configuration Management
Understand and Apply Foundational Security Operations Concepts
Employ Resource Protection Techniques
Conduct Incident Response
Operate and Maintain Preventative Measures
Implement and Support Patch and Vulnerability Management
Participate in and Understand Change Management Processes
Implement Recovery Strategies
Implement Disaster Recovery Processes
Test Disaster Recovery Plan
Participate in Business Continuity Planning
Implement and Manage Physical Security
Participate in Personnel Safety

8. Software Development Security (Understanding, Applying, and Enforcing Software Security)

Understand and Apply Security in the Software Development Life Cycle
Enforce Security Controls in the Development Environment
Assess the Effectiveness of Software Security
Assess Software Acquisition Security

Whether you are looking for general information or have a specific question, we want to help!

 
Request More Information

Time frame:

No Comments Yet.

Leave a comment

0