CISSP - Certified Information Systems Security Professional


CISSP online training from Certuno is highly interactive and engaging and provides comprehensive knowledge for participants who wish to gain expertise in defining the architecture, design, management, and controls leading to a secure business enterprise. Professionals who attain CISSP Certification are high-in-demand by organizations all across the world who need protecting their organizations from growing vulnerabilities and malicious attacks.

Overview

CISSP training (Certified Information Systems Security Professional) prepares professionals for the most sought-after certification. CISSP certification is an essential credential for security professionals to validate their competencies and skills to deploy a diverse information security infrastructure for protecting the organization from potential cybersecurity hazards.CISSP Certification Training Course qualifies a candidate to effectively create, implement, and evaluate the cybersecurity tools and technologies used to facilitate the healthy transfer of information across a diverse work environment.

February-March 2023

Course Name Batch Date Location Time
CISSP Certified Solutions Architect - Associate Feb 11, Feb 12, Feb 18, Feb 19, Feb 25, Feb 26, Mar 04, Mar 05, 2023 Online 7:00 pm-11:00 pm [EST] Enroll Now

About CISSP Course

CISSP online training from Certuno is highly interactive and engaging and provides comprehensive knowledge for participants who wish to gain expertise in defining the architecture, design, management, and controls leading to a secure business enterprise. Professionals who attain CISSP Certification are high-in-demand by organizations all across the world who need protecting their organizations from growing vulnerabilities and malicious attacks.

CISSP Course Content

Domain 1: Security and Risk Management

  • Legal and regulatory issues
  • Confidentiality, integrity, and availability concepts
  • Security governance principles
  • Compliance
  • Professional ethics
  • Business continuity requirements
  • Personnel security policies
  • Threat modeling
  • Risk considerations
  • Security education, training, and awareness
  • Security policies, standards, procedures and guidelines

Domain 2: Asset Security

  • Protect privacy
  • Information and asset classification
  • Ownership (e.g. data owners, system owners)
  • Data security controls
  • Appropriate retention
  • Handling requirements

Domain 3: Security Architecture and Engineering

  • Security evaluation models
  • Security models fundamental concepts
  • Security architectures, designs, and solution elements vulnerabilities
  • Security capabilities of information systems
  • Engineering processes using secure design principles
  • Web-based systems vulnerabilities
  • Mobile systems vulnerabilities
  • Cryptography
  • Embedded devices and cyber-physical systems vulnerabilities
  • Site and facility design secure principles
  • Physical security

Domain 4: Communication and Network Security

  • Secure network architecture design
  • Secure communication channels
  • Secure network components
  • Network attacks

Domain 5: Identity and Access Management (IAM)

  • Management of physical/logical access to assets
  • Management of identification and authentication
  • Integrate identity as a third party service
  • Authorization mechanism
  • Identity and access of provisioning life cycle

Domain 6: Security Assessment and Testing

  • Test outputs (e.g. automated, manual)
  • Security process data (e.g. management and operational controls)
  • Security architectures vulnerabilities
  • Security control testing
  • Assessment and test strategies

Domain 7: Security Operations

  • Logging and monitoring activities
  • Investigations support and requirements
  • Incident management
  • Provisioning of resources
  • Foundational security operations concepts
  • Recovery strategies
  • Resource protection techniques
  • Physical security
  • Preventative measures
  • Patch and vulnerability management
  • Change management processes
  • Business continuity planning and exercises
  • Personnel safety concerns
  • Disaster recovery processes and plans

Domain 8: Software Development Security

  • Development environment security controls
  • Security in the software development lifecycle
  • Acquired software security impact
  • Software security effectiveness