1 / 86

CISSP Tutorial | CISSP Tutorial For Beginners | CISSP Certification | CISSP Training | Simplilearn

This presentation on CISSP speaks about why CISSP, what is CISSP, CISSP exam, its's requirements, and the various CISSP domains. Watching this video will help you understand the importance of the CISSP certification and what exactly CISSP is. Certified Information Systems Security Professional (CISSP) certification is an advanced level cybersecurity certification; it trains a candidate to become an information assurance professional. This is one of the toughest cybersecurity certifications. CISSP has eight domains; they are Security and Risk Management, Asset Security, Security Engineering, Communications, and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security. You will be able to understand each of these domains as each of these are explained individually in this presentation.<br><br>Below topics are explained in this CISSP Presentation:<br>1. Why CISSP?<br>2. What is CISSP?<br>3. CISSP exam<br>4. CISSP exam requirements<br>5. CISSP domains<br><br><br>CISSP Certification Course Overview:<br>The CISSP certification training develops your expertise in defining the IT architecture and in designing, building, and maintaining a secure business environment using globally approved information security standards. The course covers industry best practices and prepares you for the CISSP certification exam held by (ISC)u00b2.<br><br>CISSP Training Key Features:<br>- 67 hours of in-depth learning<br>- 5 simulation test papers to prepare you for CISSP certification<br>- Offers the requisite 30 CPEs for taking the CISSP examination<br><br>Eligibility:<br>The CISSP certification is the most globally recognized professional requirement in the IT Security domain. This CISSP training is best suited for those at the intermediate level of their career including; security consultants/managers, IT directors/managers, security auditors/architects, security system engineers, CIOs, and network architects.<br><br>Pre-requisites:<br>To obtain your CISSP certification, you must have a minimum of five years of full-time professional work experience in two or more of the 8 domains of the CISSP u2013 (ISC)u00b2 CBK 2018. A qualified individual with less than five years of experience will receive the (ISC)u00b2 associate title.<br><br>Learn more at https://www.simplilearn.com/cyber-security/cissp-certification-training

Simplilearn
Download Presentation

CISSP Tutorial | CISSP Tutorial For Beginners | CISSP Certification | CISSP Training | Simplilearn

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What’s in it for you? Why CISSP? What is CISSP? Exam Requirements CISSP Exam CISSP Domains

  2. Why CISSP?

  3. Click here to watch the video

  4. Why CISSP? Cyber Security has various certifications like CCNA, CompTIA, CISM, CISA, CEH. In addition to these, the most in-demand certification is the CISSP (Certified Information System Security Professional)

  5. Why CISSP? The demand for CISSP certified professionals has grown rapidly, when compared to the other cyber security professionals. There are nearly 50,000 job postings for the same Source: INFOSEC

  6. What is CISSP?

  7. What is CISSP? Certified Information Systems Security Professional (CISSP) certification is an advanced level cyber security certification; it trains a candidate to become an information assurance professional. This is one of the toughest cyber security certifications.

  8. What is CISSP? A candidate with a CISSP certification will be able to define the design, architecture, controls, and management of highly secure business environments

  9. Exam Requirements

  10. Exam Requirements To be eligible for the CISSP certification, a candidate must have at least 5 years of work experience in the field of the information security domain. Before taking up this certification, it is suggested that the candidate clears other certifications like CCNA, CompTIA Security+, CEH, CISM, CISA, and so on.

  11. Exam Requirements The CISSP Certification is suitable for professionals working in the following fields: • Security Consultants and Managers • Network and Security Architects • IT Directors • Security Auditors • Chief Information Security officers

  12. CISSP Exam

  13. CISSP Exam The CISSP Certification is developed by the International Information Systems Security Certification Consortium (ISC)2.

  14. CISSP Exam The CISSP Certification is developed by the International Information Systems Security Certification Consortium (ISC)2. Certificate Provider

  15. CISSP Exam The CISSP Certification is developed by the International Information Systems Security Certification Consortium (ISC)2. Certificate Provider $699 Exam Fees

  16. CISSP Exam The CISSP Certification is developed by the International Information Systems Security Certification Consortium (ISC)2. • 250 Questions in 6 Hours • Type of questions: Multiple choice No. of questions in the exam and duration

  17. CISSP Exam The CISSP Certification is developed by the International Information Systems Security Certification Consortium (ISC)2. • 250 Questions in 6 Hours • Type of questions: Multiple choice No. of questions in the exam and duration 700 out of 1000 Pass Mark

  18. CISSP Domains

  19. CISSP Domains The CISSP Certification has a total of 8 domains: Security and Risk Management • Software • Development Security • Asset Security Security Operations Security Engineering Security Assessment and Testing • Communications and Network Security • Identity and Access Management

  20. Security and Risk Management

  21. CISSP Exam 1. Security and Risk Management This domain mainly consists of the fundamentals of security policies, compliance law and regulations, professional ethics, risk management, and threat modeling

  22. CISSP Exam 1. Security and Risk Management Information Security Cyber Security Under security policies, Information Security and Cyber Security play a vital role • Processes and tools deployed to protect sensitive information • Set of techniques used to protect the integrity of networks

  23. CISSP Exam 1. Security and Risk Management The following approaches are adopted to implement cyber security Compliance - based Ad - hoc Risk - based • Security measures are decided based on regulations Here, security measures are based on no specific criteria Security measures are based on unique risks in an organization

  24. CISSP Exam 1. Security and Risk Management To protect the information within a company Confidentiality, Integrity, and Availability (CIA) security model is designed Integrity CIA triad Confidentiality Availability

  25. CISSP Exam 1. Security and Risk Management The GRC trilogy is a structured approach adopted by organizations to align IT objectives with business objectives Compliance Governance Risk Management

  26. CISSP Exam 1. Security and Risk Management The GRC trilogy is a structured approach adopted by organizations to align IT objectives with business objectives Compliance Governance Risk Management Governance is taken care of by the senior professionals of an organization. Such a program has goals like ensuring goals are achieved, providing strategic plans, and so on

  27. CISSP Exam 1. Security and Risk Management The GRC trilogy is a structured approach adopted by organizations to align IT objectives with business objectives Compliance Governance Risk Management In risk management, the organizations look into mitigating all types of risks such as investment, physical, and cyber risks

  28. CISSP Exam 1. Security and Risk Management The GRC trilogy is a structured approach adopted by organizations to align IT objectives with business objectives Compliance Governance Risk Management Compliance refers to abiding by the defined laws and regulations

  29. CISSP Exam 1. Security and Risk Management The GRC trilogy is a structured approach adopted by organizations to align IT objectives with business objectives Compliance Governance Risk Management Did you know that the senior management of an organization develops a security policy that is implemented to achieve the organization’s goals? Compliance refers to abiding by the defined laws and regulations

  30. CISSP Exam 1. Security and Risk Management The GRC trilogy is a structured approach adopted by organizations to align IT objectives with business objectives Let’s have a look at the characteristics of these security policies Compliance Governance Risk Management Compliance refers to abiding by the defined laws and regulations

  31. CISSP Exam 1. Security and Risk Management They should support the vision and mission

  32. CISSP Exam 1. Security and Risk Management All the business units should be integrated They should support the vision and mission

  33. CISSP Exam 1. Security and Risk Management All the business units should be integrated They should support the vision and mission They should be updated regularly

  34. CISSP Exam 1. Security and Risk Management All the business units should be integrated They should support the vision and mission Security policies should be easy to understand They should be updated regularly

  35. 1. Security and Risk Management A risk analysis team is formed in an organization to perform the analysis of each known risk. The steps to perform risk analysis is as shown below:

  36. 1. Security and Risk Management A risk analysis team is formed in an organization to perform the analysis of each known risk. The steps to perform risk analysis is as shown below: 1 2 3 Identify countermeasures to mitigate the risks Assessment of the value of the company’s assets Analyzing risks to assets

  37. 1. Security and Risk Management A risk analysis team is formed in an organization to perform the analysis of each known risk. The steps to perform risk analysis is as shown below: 1 2 3 Identify countermeasures to mitigate the risks Assessment of the value of the company’s assets Analyzing risks to assets

  38. 1. Security and Risk Management A risk analysis team is formed in an organization to perform the analysis of each known risk. The steps to perform risk analysis is as shown below: 1 2 3 Identify countermeasures to mitigate the risks Assessment of the value of the company’s assets Analyzing risks to assets

  39. 1. Security and Risk Management A risk analysis team is formed in an organization to perform the analysis of each known risk. The steps to perform risk analysis is as shown below: 1 2 3 Identify countermeasures to mitigate the risks Assessment of the value of the company’s assets Analyzing risks to assets

  40. Asset Security

  41. CISSP Exam 2. Asset Security Asset Security is the second domain of the CISSP. It deals with the collection and protection of information. These are the steps we will be looking into Data Classification Data Management Data Remanence Data Loss Prevention

  42. CISSP Exam 2. Asset Security 1. Data Classification Data is classified by the data owner

  43. CISSP Exam 2. Asset Security 1. Data Classification The classification of data is done based on certain set criteria’s

  44. CISSP Exam 2. Asset Security 1. Data Classification Data classification is annually reviewed

  45. CISSP Exam 2. Asset Security 2. Data Management In data management the information lifecycle is managed

  46. CISSP Exam 2. Asset Security 2. Data Management Data management ensures that the data complies to the standards

  47. CISSP Exam 2. Asset Security 2. Data Management Data management also ensures data validity and integrity

  48. CISSP Exam 2. Asset Security 3. Data Remanence • Data Remanence is defined as the remains of the digital data that is present even after erasing the data

  49. CISSP Exam 2. Asset Security 3. Data Remanence Security professionals should be well versed with techniques to avoid Data Remanence

More Related