Show


Sign up with Linkedin

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close

Plus icon:

Overview


CISSP training Course (Certified Information Systems Security Professional) is the essential credential for a security professional to validate their competencies and skill set to deploy a diverse information security infrastructure for protecting the organization from potential cybersecurity hazards.

 The course has been sponsored by (ISC)2, one of world’s leading non-profit organization for providing healthy aids to the field of information security. The certification qualifies a candidate to effectively create, implement and evaluate the cybersecurity tools and technologies used to facilitate the healthy transfer of information across a diverse work environment.

Course Curriculum


  • Information Security and Risk Management
    • Information Security Management
    • Security Awareness Training and Education
    • Risk Management
    • Ethics
  • Access Control
    • Definitions and Key Concepts
    • Information Classification
    • Access Control Categories and Types
    • Access Control Threats
    • Access to Systems/Data
    • Access Control Technologies
    • Assurance Mechanisms
  • Cryptography
    • Key Concepts and Definitions
    • History
    • Encryption Systems
    • Symmetric and Asymmetric Algorithms
    • Message Integrity Controls
    • Digital Signatures
    • Management of Cryptographic Systems
    • Threats and Attacks
  • Physical Security
    • Definitions and Key Concepts
    • Site Location
    • Layered Defense Model
    • Infrastructure Support Systems
    • Equipment Protection
  • Security Architecture and Design
    • Components and Principles
    • System Security Techniques
    • Hardware
    • Software
    • Security Models and Architecture Theory
    • Security Evaluation Methods and Criteria
  • Business Continuity Planning and Disaster Recovery Planning
    • Project Scope Development and Planning
    • Business Impact Analysis
    • Emergency Assessment
    • Continuity and Recovery Strategy
    • Plan Design and Development
    • Implementation
    • Restoration
    • Plan Management
  • Telecommunications and Network Security
    • Key Concepts and Definitions
    • Networks
    • Protocols
    • Remote Access
    • Network Components
    • Telephony
  • Application Security
    • System Lifecycle Security
    • Application Environment and Security Controls
    • Programming Languages and Tools
    • Databases and Data Warehouses
    • Applications Systems Threats and Vulnerabilities
    • Applications Security Controls
  • Operations Security
    • Resource Protection
    • Change Control Management
    • Physical Security Controls
    • Privileged Entity Control
  • Legal, Regulations, Compliance and Investigation
    • Major Legal Systems
    • Legal Concepts
    • Regulatory Issues
    • Investigation
    • Computer Forensics

Prerequisite


It is highly recommended that students have certifications in Network+ or Security+, or possess equivalent professional experience upon entering CISSP training. It will be beneficial if students have one or more of the following security-related or technology-related certifications or equivalent industry experience: CyberSec First Responder (CFR), MCSE, CCNP, RHCE, LCE, SSCP®, GIAC, CISA™, or CISM®.

Certification


The CISSP exam is a computer-based test (CBT) administered at Pearson VUE Testing centers around the world.

Link: https://cert.isc2.org/cissp-exam-outline-form/

Reviews

Contact Us
+91-(0124)-470-0200

Traning For:
Enroll Now
Become a Trainer
Love to educate people about your favorite subject? Create your own online course with Xebia.


Start Teaching

For Corporates
Develop your workforce with the right skills. We train and engage your people with highly skillful training programs.

Get Xebia for Business