CISSP Certification Training | Certified Information Systems Security Professional Training

Print Friendly, PDF & Email

CISSP Certification Training or Certified Information Systems Security Professional Training Course Hands-on

Gain core knowledge and experience to successfully implement and manage security programs in this official (ISC)2 CISSP Certification Training or Certified Information Systems Security Professional Training course

This CISSP Certification Training course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge). You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

With CISSP Certification Training, you will learn how to determine who or what may have altered data or system information, potentially affecting the integrity of those asset and match an entity, such as a person or a computer system, with the actions that entity takes against valuable assets, allowing organizations to have a better understanding of the state of their security posture. Policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets are also covered in this CISSP Certification Training or Certified Information Systems Security Professional Training course.

Duration: 5 days

CISSP Certification Training or Certified Information Systems Security Professional Training Related Courses

Customize It

• We can adapt this CISSP Certification Training course to your group’s background and work requirements at little to no added cost.
• If you are familiar with some aspects of this CISSP Certification Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the CISSP Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CISSP Certification Training course in manner understandable to lay audiences.

Audience / Target Group

The target audience for this CISSP Certification Training course is defined here:

This CISSP Certification Training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers. The training seminar is ideal for those working in positions such as, but not limited to:

• Security Consultant
• Security Manager
• IT Director/Manager
• Security Auditor
• Security Architect
• Security Analyst
• Security Systems Engineer
• Chief Information Security Officer
• Director of Security
• Network Architect

CISSP Certification Training - Prerequisites:

The knowledge and skills that a learner must have before attending this CISSP Certification Training course are:

You should have a minimum of five years of experience working in IT Infrastructure and Cybersecurity.

• Cybersecurity Foundations
• Security+ Certification Prep Course
• Cybersecurity Specialization: Architecture and Policy
• Cybersecurity Specialization: Governance, Risk, and Compliance

CISSP Certification Training - Objectives:

After completing this CISSP Certification Training course, attendees will be able to:

In-depth coverage of the eight domains required to pass the CISSP exam:

1.Security and Risk Management
2.Asset Security
3.Security Engineering
4.Communications and Network Security
5.Identity and Access Management
6.Security Assessment and Testing
7.Security Operations
8.Software Development Security

CISSP Certification Training - Course Content:

Domain 1: Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)

The first domain reviewed in this official CISSP training program covers a broad spectrum of general information security and risk management topics. This domain will begin by reviewing the fundamental security principles of confidentiality, availability and integrity upon which all information security functions are based. Additionally, this domain will also build upon these concepts in the areas of security governance and compliance.

CISSP Training / Exam Topics

• Understand and Apply Concepts of Confidentiality, Integrity, and Availability
• Apply Security Governance Principles
• Compliance
• Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
• Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
• Understand Business Continuity Requirements
• Contribute to Personnel Security Policies
• Understand and Apply Risk Management Concepts
• Understand and Apply Threat Modeling
• Integrate Security Risk Considerations into Acquisitions Strategy and Practice
• Establish and Manage Security Education, Training, and Awareness

Domain 2: Asset Security (Protecting Security of Assets)

Asset Security is the second domain reviewed in this (ISC)² authorized training seminar for CISSP. In it, students cover the collection, handling and protection of information throughout its lifecycle.

CISSP Certification Training / Exam Topics

• Classify Information and Supporting Assets
• Determine and Maintain Ownership
• Protect Privacy
• Ensure Appropriate Retention
• Determine Data Security Controls
• Establish Handling Requirements

Domain 3: Security Engineering (Engineering and Management of Security)

Security Engineering is the third CISSP domain. The information students review focuses on the implementation and management of security engineering processes by using secure design principles.

CISSP Certification Training / Exam Topics

• Implement and Manage an Engineering Life Cycle Using Security Design Principles
• Understand Fundamental Concepts of Security Models
• Select Controls and Countermeasures Based Upon Information Systems Security Standards
• Understand the Security Capabilities of Information Systems
• Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
• Assess and Mitigate Vulnerabilities in Web-based Systems
• Assess and Mitigate Vulnerabilities in Mobile Systems
• Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
• Apply Cryptography
• Apply Secure Principles to Site and Facility Design
• Design and Implement Facility Security

Domain 4: Communications and Network Security (Designing and Protecting Network Security)

Domain 4 prepares students for the CISSP certification exam by focusing on the network architecture, transmission methods, transport protocols, control devices, and the security measures used to maintain the confidentiality, integrity and availability of information transmitted over both private and public communication networks.

CISSP Training / Exam Topics

• Apply Secure Design Principles to Network Architecture
• Securing Network Components
• Design and Establish Secure Communication Channels
• Prevent or Mitigate Network Attacks

Domain 5: Identity and Access Management (Controlling Access and Managing Identity)

The fifth domain students review in our CISSP training is called “Identity and Access Management”. This domain will cover the identification and authorization of users, systems and services.

CISSP Certification Training / Exam Topics

• Control Physical and Logical Access to Assets
• Manage Identification and Authentication of People and Devices
• Integrate Identity as a Service (IDaaS)
• Integrate Third-Party Identity Services
• Implement and Manage Authorization Mechanisms
• Prevent or Mitigate Access Control Attacks
• Manage the Identity and Access Provisioning Life Cycle

Domain 6: Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)

The Security Assessment and Testing domain focuses on the evaluation of information assets and associated infrastructure using various tools and techniques for the purposes of identifying and mitigating risk due to architectural issues, design flaws, configuration errors, hardware and software vulnerabilities, coding errors, and any other weaknesses that may affect an information systems ability to deliver its intended functionality in a secure manner. Additionally, students will also review the continuous validation of the application of organizational information security plans, policies, processes and procedures.

CISSP Certification Training / Exam Topics

• Design and Validate Assessment and Test Strategies
• Conduct Security Control Testing
• Collect Security Process Data
• Conduct or Facilitate Internal and Third-Party Audits

Domain 7: Security Operations (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

Domain 7, “Security Operations”, covers a broad range of topics involving the application of information security concepts and best practices to the operation of enterprises computing systems. This domain is practical in nature and highlights the tasks and situations that information security professionals are expected to perform or are presented with daily. This domain also reviews the areas where security professionals spend most of their time, making domain 7 the largest in terms of individual topics on the CISSP certification exam.

CISSP Certification Training / Exam Topics

• Understand and Support Investigations
• Understand Requirements for Investigation Types
• Conduct Logging and Monitoring Activities
• Secure the Provisioning of Resources through Configuration Management
• Understand and Apply Foundational Security Operations Concepts
• Employ Resource Protection Techniques
• Conduct Incident Response
• Operate and Maintain Preventative Measures
• Implement and Support Patch and Vulnerability Management
• Participate in and Understand Change Management Processes
• Implement Recovery Strategies
• Implement Disaster Recovery Processes
• Test Disaster Recovery Plan
• Participate in Business Continuity Planning
• Implement and Manage Physical Security
• Participate in Personnel Safety

Domain 8: Software Development Security (Understanding, Applying, and Enforcing Software Security)

The last domain in this official CISSP training seminar is “Software Development Security”. It covers the application of security concepts and best practices to production and development software environments.

CISSP Certification Training / Exam Topics

• Understand and Apply Security in the Software Development Life Cycle
• Enforce Security Controls in the Development Environment
• Assess the Effectiveness of Software Security
• Assess Software Acquisition Security

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment