910 likes | 943 Views
In this presentaion, we will look into the CISSP certification and the type of questions that appear in the CISSP Exam. The CISSP exam is one of the toughest in the field of cyber security. This video will help you gain an overview of this exam, the various domains in CISSP, and the different types of questions that can be asked under each of these domains. <br><br>The Certified Information Systems Security Professional (CISSP) is a globally recognized certification for information technology security professionals. Aligned with (ISC)u00b2 CBK 2018, our CISSP training covers all areas of IT security so you can become a strong information security professional.<br><br>CISSP Certification Course Overview:<br>The CISSP certification training develops your expertise in defining the IT architecture and in designing, building, and maintaining a secure business environment using globally approved information security standards. The course covers industry best practices and prepares you for the CISSP certification exam held by (ISC)u00b2.<br><br>CISSP Training Key Features:<br>- 67 hours of in-depth learning<br>- 5 simulation test papers to prepare you for CISSP certification<br>- Offers the requisite 30 CPEs for taking the CISSP examination<br><br>Eligibility:<br>The CISSP certification is the most globally recognized professional requirement in the IT Security domain. This CISSP training is best suited for those at the intermediate level of their career including; security consultants/managers, IT directors/managers, security auditors/architects, security system engineers, CIOs, and network architects.<br><br>Pre-requisites:<br>To obtain your CISSP certification, you must have a minimum of five years of full-time professional work experience in two or more of the 8 domains of the CISSP u2013 (ISC)u00b2 CBK 2018. A qualified individual with less than five years of experience will receive the (ISC)u00b2 associate title.<br><br>Learn more at https://www.simplilearn.com/cyber-security/cissp-certification-training<br>
E N D
What’s in it for you? • What is CISSP exam? • CISSP exam overview • Domains in CISSP • What to study and sample questions?
Questions Click here to watch the video
What is CISSP exam? CISSP is considered the gold standard in the field of information security
What is CISSP exam? This certifications expires after 3 years. You must provide professional certificate to retain the certification CISSP is considered the gold standard in the field of information security
What is CISSP exam? This certifications expires after 3 years. You must provide professional certificate to retain the certification CISSP is considered the gold standard in the field of information security The passing rate of this exam is less than 50%
What is CISSP exam? This certifications expires after 3 years. You must provide professional certificate to retain the certification CISSP is considered the gold standard in the field of information security To register for the exam, you must possess a minimum of five years of professional experience in the information security field The passing rate of this exam is less than 50%
CISSP exam overview Following are the features of CISSP exam Governing body
CISSP exam overview Following are the features of CISSP exam Governing body • 4 years college degree or additional credential from (ISC)2 approved list that will satisfy 1 year of required experience. • 5 years of paid full time work experience in 2 or more domains Professional experience
CISSP exam overview Following are the features of CISSP exam Exam fees $699 USD : Maintenance fees $85 USD for 3 years : Exam length 3 hours : Number of questions 100 - 150 :
CISSP exam overview Following are the features of CISSP exam 700 out of 1000 points Passing score : English Exam language : (ISC)2 authorized centres Testing centre : Question format Multiple choice :
CISSP exam overview CISSP exam weightage
+ Domains in CISSP Asset security Security and risk management Security architecture and engineering Software development security Communication and network security Security operations Security assessment and testing Identity and access management
+ Domain wise topics and questions Security and risk management Asset security Security architecture and engineering Software development security Communication and network security Security operations Security assessment and testing Identity and access management
1. Security and risk management - Questions This is the largest domain in CISSP. This domain teaches you all the details about information systems management
1. Security and risk management - Questions This is the largest domain in CISSP. This domain teaches you all the details about information systems management
1. Security and risk management - Questions • 1 The primary goal of the security awareness program is: To provide a platform for disclosing exposure and risk analysis To make everyone aware of potential risk and exposure A way of communicating security procedures To provide accurate risk and exposure results
1. Security and risk management - Questions • 1 The primary goal of the security awareness program is: To provide a platform for disclosing exposure and risk analysis To make everyone aware of potential risk and exposure A way of communicating security procedures To provide accurate risk and exposure results
1. Security and risk management - Questions • 2 A contingency plan should address which of the following? Potential risks Residual risks All the above Identified risks
1. Security and risk management - Questions • 2 A contingency plan should address which of the following? Potential risks Residual risks All the above Identified risks
1. Security and risk management - Questions • 3 When the cost of the countermeasures outweighs the cost of the risk, the best way to handle the risk is to: Reject the risk Transfer the risk Reduce the risk Accept the risk
1. Security and risk management - Questions • 3 When the cost of the countermeasures outweighs the cost of the risk, the best way to handle the risk is to: Reject the risk Transfer the risk Reduce the risk Accept the risk
+ Domain wise topics and questions Asset security Security and risk management Security architecture and engineering Software development security Communication and network security Security operations Security assessment and testing Identity and access management
2. Asset security - Questions Asset security domain consists of topics about the physical requirements of information security
2. Asset security - Questions Please explain the topics using this link Asset security domain consists of topics about the physical requirements of information security https://www.isc2.org/-/media/ISC2/Certifications/Exam-Outlines/CISSP-Exam-Outline-121417--Final.ashx
2. Asset security - Questions • 1 Which of the following is responsible for setting user clearances to computer-based information? Operators Data owners Data custodians Security administrators
2. Asset security - Questions • 1 Which of the following is responsible for setting user clearances to computer-based information? Operators Data owners Data custodians Security administrators
2. Asset security - Questions • 2 What is generally concerned with personal security? Management controls Operational controls Human resource controls Technical controls
2. Asset security - Questions • 2 What is generally concerned with personal security? Management controls Operational controls Human resource controls Technical controls
2. Asset security - Questions • 3 Which of the following factors determines the frequency of information security audits in any given environment? Asset value Management discretion Level of realized threats Risk
2. Asset security - Questions • 3 Which of the following factors determines the frequency of information security audits in any given environment? Asset value Management discretion Level of realized threats Risk
+ Domain wise topics and questions Asset security Security and risk management Software development security Security architecture and engineering Communication and network security Security operations Security assessment and testing Identity and access management https://www.isc2.org/-/media/ISC2/Certifications/Exam-Outlines/CISSP-Exam-Outline-121417--Final.ashx
3. Security architecture and engineering - Questions Security architecture domain consists of several important topics of information security such as cryptography, assessing vulnerabilities, etc.
3. Security architecture and engineering - Questions Please explain the topics using this link Security architecture domain consists of several important topics of information security such as cryptography, assessing vulnerabilities, etc. https://www.isc2.org/-/media/ISC2/Certifications/Exam-Outlines/CISSP-Exam-Outline-121417--Final.ashx
3. Security architecture and engineering - Questions • 1 When a computer uses more than one CPU in parallel to execute instructions, it is known as ________ Multiprocessing Multitasking Parallel running Multithreading
3. Security architecture and engineering - Questions • 1 When a computer uses more than one CPU in parallel to execute instructions, it is known as ________ Multiprocessing Multitasking Parallel running Multithreading
3. Security architecture and engineering - Questions • 2 • Who mediates all access relationships between subjects and objects of a system? Firewall Reference kernel Information flow model Security kernel
3. Security architecture and engineering - Questions • 2 • Who mediates all access relationships between subjects and objects of a system? Firewall Reference kernel Information flow model Security kernel
3. Security architecture and engineering - Questions • 3 • Which of the following is not a spam blocking architecture? Email-server based Client based Mail blocking service Application based
3. Security architecture and engineering - Questions • 3 • Which of the following is not a spam blocking architecture? Email-server based Client based Mail blocking service Application based
+ Domain wise topics and questions Asset security Security and risk management Security architecture and engineering Software development security Communication and network security Security operations Security assessment and testing Identity and access management https://www.isc2.org/-/media/ISC2/Certifications/Exam-Outlines/CISSP-Exam-Outline-121417--Final.ashx
4. Communication and network security - Questions The network security domain covers topics focussed on protecting the network of the organization
4. Communication and network security - Questions Please explain the topics using this link The network security domain covers topics focussed on protecting the network of the organization https://www.isc2.org/-/media/ISC2/Certifications/Exam-Outlines/CISSP-Exam-Outline-121417--Final.ashx
4. Communication and network security - Questions • 1 • What is the purpose of using a virtual private network (VPN) Secure remote access into a network Securely connect two networks together All the above Secure data tunnel within a network
4. Communication and network security - Questions • 1 • What is the purpose of using a virtual private network (VPN) Secure remote access into a network Securely connect two networks together All the above Secure data tunnel within a network
4. Communication and network security - Questions • 2 • Which of the following characteristics are not included in the TCP protocol? Connection Sequencing Connection less Flow control