0 likes | 2 Views
CISSP stands for Certified Information Systems Security Professional. Our instructors have developed a unique teaching style to help an aspiring candidate to master the art of Cyber Security. CISSP Exam Prep Course is based around teaching the eight fundamental domains of Information Security, which provide Candidates with all the information they require to obtain a broad understanding of Information Security and pass the CISSP exam.<br><br>We Proudly deliver Outstanding Learning Services to our global learners, our award-winning courses are designed using highly interactive learning strategies whi
E N D
CISSP® - Certified Information Systems Security Professional Certification Training https://edvistaar.in/
Table of Contents: Program Overview Key Learning Outcomes Program Features Exam Details Delivery Mode Prerequisites Course Curriculum Customer Reviews Target Audience About Us ProgramOverview: CISSP certification training develops your expertise in defining IT architecture and designing, building, and maintaining a secure business environment using globally approved information security standards. This course covers industry best practices and prepares you for the CISSP certification exam held by (ISC). Program Features: 40 hours of online self-paced learning 36 hours of instructor-led training Five simulation test papers to prepare you for CISSP certification Offers the requisite 30 CPEs for taking the CISSP examination CISSP exam voucher (Except for Africa) Delivery Mode: Blended - Online self-paced learning and live virtual classroom Prerequisites: Candidates must have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Earning a four year college degree or regional equivalent or an additional credential from the (ISC)2 approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience. A candidate that doesn’t have the required experience to become a CISSP may become an Associate of (ISC)2 by successfully passing the CISSP examination. The Associate of (ISC)2 will then have six years to earn the five years required experience.
Target Audience: The CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions: Chief Information Security Officer Chief Information Officer Director of Security IT Director/Manager Security Systems Engineer Security Analyst Security Manager Security Auditor Security Architect Security Consultant Network Architect Key Learning Outcomes: By the end of this CISSP training, you will: Be able to define the architecture, design, and management of the security of your organization Acquire the relevant knowledge and skills required to pass the CISSP certification exam Perform risk analysis and prevent data loss Learn about security architecture, engineering, models, and cryptography Gain familiarity with communications and network security, identity and access management, and security testing and operations
Exam Details: The CISSP exam uses Computerized Adaptive Testing (CAT) for all English exams. CISSP exams in all other languages are administered as linear, fixed-form exams. 1. CISSP CAT Examination Information
Course Curriculum: Lesson 01 - Security and Risk Management Introduction Introduction to Security and Risk Management Understand, Adhere to, and Promote Professional Ethics Knowledge Check Understand and Apply Security Concepts Evaluate and Apply Security Governance Principles Goals, Mission, and Objectives Control Frameworks, Due Care, and Due Diligence Knowledge Check Determine Compliance and Other Requirements Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context Types of Intellectual Properties (IP) Law OECD Principles, GDPR, and Data Protection principles Data Protection Principles Understand Requirements for Investigation Types Knowledge Check Develop, Document, and Implement Security Policy, Standards,Procedures, and Guidelines Knowledge Check Need for Business Continuity Planning (BCP) Business Continuity Planning Phases Business Impact Analysis Identify Preventive Controls Knowledge Check
Contribute to and Enforce Personnel Security Policies and Procedures Introduction to Risk Management Concepts Risk Analysis Risk Analysis and Assessment Countermeasure Selection Risk Handling and Security Control Assessment Security Control Assessment (SCA) Risk Monitoring and Continuous Improvement Knowledge Check Understand and Apply Threat Modeling Concepts and Methodologies Threat Modeling Steps DREAD Rating Knowledge Check Apply Supply Chain Risk Management (SCRM) Concepts Third-Party Management and Risks Third-Party Risk Management Life Cycle Knowledge Check Establish and Maintain a Security Awareness, Education, and Training Program Program Effectiveness: Evaluation Knowledge Check Quick Recap Knowledge Check
Lesson 02 - Asset Security Introduction Introduction to Asset Security Identify and Classify Information and Assets Information Classification Objectives Knowledge Check Establish Information and Asset Handling Requirements Provision Resources Securely Manage Data Life Cycle Data Life Cycle: Create, Store, and Use Data Life Cycle: Share, Archive, and Destroy Data Remanence and Data Destruction Knowledge Check Ensure Appropriate Asset Retention Data and Data Security Controls How to Select Controls Digital Rights Management (DRM) Data Loss Prevention (DLP) Quick Recap Knowledge Check Lesson 03 - Security Architecture and Engineering Introduction Introduction to Security Engineering Research, Implement, and Manage Engineering Processes Using Trust but Verify and Zero Trust Privacy by Design Knowledge Check Understand the Fundamental Concepts of Security Models State Machine Model, Multilevel Lattice Model, Non-Interference Model, and Information Flow Model Types of Security Models Composition Theories, Covert Channels, and Open and Closed Systems Knowledge Check Select Controls Based on System Security Requirements Security Capabilities of Information Systems Knowledge Check Assess and Mitigate the Vulnerabilities of Security Architectures SCADA Security Concerns of ICS Cloud Computing
Internet of Things Fog and Edge Computing Knowledge Check Select and Determine Cryptographic Solutions Cryptosystem Elements Encryption Methods Data Encryption Standards Output Feedback, Counter, and Triple DES Advanced Encryption Standards Asymmetric Cryptography Public Key Infrastructure PKI Certificate and Processes PKI Process: Steps Hashing, MAC, and Digital Signatures Key Management Principles Knowledge Check Methods of Cryptanalytic Attacks Knowledge Check Apply Security Principles to Site and Facility Design Design Site and Facility Security Controls Personnel Access Controls Environmental Security Controls Classes of Fires Other Security Controls HVAC, Power Supply, and Training Knowledge Check Quick Recap Knowledge Check
Lesson 04 - Communications and Network Security Introduction Introduction to Communications and Network Security Assess and Implement Secure Design Principles Physical Layer and Data Link Layer Network Layer Transport Layer Session Layer and Presentation Layer Application Layer and Protocols Knowledge Check IP Addressing IPv6 and Its Address Structures Knowledge Check Internet Security Protocol(IPsec) IPsec Security Protocols Secure Access Protocols Implementation of Multilayer Protocol, Fiber Channels, and Micro-Segmentation SDN and Wireless Technologies Cellular Network and CDN Knowledge Check Understand Network Access Control (NAC) and Endpoint Security Knowledge Check Implement Secure Communication Channels Application-Level Gateway, Circuit-Level Gateway, and Network Security Terms Remote Access Technologies VPN Protocols VPN Protocols: Comparison Multimedia Collaboration, Network Function Virtualization, and Network Attacks Quick Recap Knowledge Check
Lesson 05 - Identity and Access Management (IAM) Introduction Introduction to Identity and Access Management (IAM) Control Physical and Logical Access to Assets Manage Identification and Authentication of People, Devices, and Services Biometrics and Accuracy Measurement Passwords and Its Types Tokens, Token Devices, and Authorization Federated Identity Management (FIM) and Credential Management System Single Sign-On (SSO) and Just-In-Time (JIT) Knowledge Check Federated Identity with a Third-Party Service Implement and Manage Authorization Mechanisms Attribute-Based Access Control (ABAC) and Risk-Based Access Control Knowledge Check Manage the Identity and Access Provisioning Life Cycle Privilege Escalation Implement Authentication Systems Kerberos and Its Steps, RADIUS, TACACS, and TACACS Plus Quick Recap Knowledge Check Lesson 06 - Security Assessment and Testing Introduction Introduction to Security Assessment and Testing Design and Validate Assessment, Test, and Audit Strategies SOC Reports and Security Assessments Internal Audit and Assessment External Audit and Assessment Third-Party Audit and Assessment Vulnerability Assessment Network Discovery Scan Network Vulnerability Scan and Web Vulnerability Scan Penetration Testing Penetration Testing Process and Testing Types Log Management and Review Security Testing in SDLC Code Review and Testing Testing Methods
Interface Testing Knowledge Check Collect Security Process Data KPI Process Knowledge Check Analyze Test Output and Generate Report Quick Recap Knowledge Check Lesson 07 - Security Operations Introduction Introduction to Security Operations Understand and Comply with Investigations Digital Forensics Understand the Digital Evidences Knowledge Check Conduct Logging and Monitoring Activities Knowledge Check Continuous Monitoring Digital Forensics Tools, Tactics, Procedures, Artifacts, and UEBA Knowledge Check Perform Configuration Management Apply Foundational Security Operation Concepts Identity and Access Management with Various Types of Accounts Apply Resource Protection Controls for Protecting Assets Conduct Incident Management Understand Incident Response Life Cycle Knowledge Check Operate and Maintain Detective and Preventive Measures Understand Anti-Malware Systems, AI, Machine Learning, and Deep Learning Implement and Support Patch and Vulnerability Management Understand and Participate in Change Management Processes Implement Recovery Strategies Types of Recoveries Operational Recovery Recovery Pattern Strategies Redundancy and Fault Tolerance Knowledge Check Implement Disaster Recovery (DR) Processes Knowledge Check Test Disaster Recovery Plans (DRP)
Knowledge Check Participate in Business Continuity (BC) Planning and Exercises Implement and Manage Physical Security Importance of Lighting in Security Management Access Control Knowledge Check Address Personnel Safety and Security Concerns Quick Recap Knowledge Check Lesson 08 - Software Development Security Introduction Introduction to Software Development Security Integrate Security in the Software Development Life Cycle Software Development Models Extreme Programming Model DevOps and DevSecOps CMM and SAMM Change Management and Integrated Product Team (IPT) Knowledge Check Security Controls in Software Development Ecosystems Other Security Controls in Software Development Ecosystems Software Configuration Management (SCM) Database and Data Warehousing Environments Knowledge Check Assess the Effectiveness of Software Security Software Security and Assurance: Granularity of Controls and Separation of Environments Software Security and Assurance: TOC or TOU, Prevention of Social Engineering, Backup, Software Forensics, Cryptography Software Security and Assurance: Password Protection, Mobile Mode Controls, and Sandbox Software Security and Assurance Strong Language Support, XML, and SAML Assessing the Effectiveness of Software Security Free and Open Source Software Knowledge Check
Define and Apply Secure Coding Guidelines and Standards Web Application Environment Knowledge Check Quick Recap Knowledge Check
Customer Reviews: Rakesh Sharma IT Consultancy and Advisory I loved the course on CISSP - Certified Information Systems Secu- rity Professional from EDVISTAAR. It was concise, comprehensive, and easy to follow. Their videos, live sessions, and exams are excel- lent. Nityanand Singh Associate Manager-IT Operations at Tredence Really good training. It helped me to clear a lot of doubts which were present in my mind for a long time. Manoj Sharma Information Security Manager The precise syllabus, quality of WebEx app, the quality of trainers, and the ease of use of the WeInspire website. Highly satisfied. JenishJames IT Security Analyst at Halliburton The training was nice and to the point. The trainer was nice and helpful. He cleared all our course-related doubts.
Trainer Profile: https://drive.google.com/file/d/1R1L24u3oHbBHjUqzxMWPh Xqexhyth02R/view