Company Information
Ask for more detail from the seller
Contact SupplierOurCertified Information Systems Security Professional(CISSP) is a cybersecurity certification governed by the International Information Systems Security Certification Consortium, commonly known as (ISC)². ThisCISSP trainingfocuses on delivering lessons on key aspects of information security with extensive learning sessions that are empowered with real examples. CISSP certification trainingenhances and authenticates your knowledge about system security in all 8 domains of theCISSP course. It gives you global recognition in the field of cybersecurity and opens large employment opportunities with corporate giants. ThisCISSP training courseis developed to build a cybersecurity professional who is well-versed with the latest security standards and can help establish an information security system that is secure and scalable while also aligning to the business IT goals. ThisCISSP certification trainingincludes essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals. CISSP Course Outline Course Outline Domain 1: Security and Risk Management • Applying the concepts of confidentiality, integrity and availability • Evaluating and applying security governance principles• Determining compliance requirements• Understanding the legal and regulatory issues related to information security • Understanding, adhering to, and promote professional ethics• Developing, documenting, and implementing security policies and guidelines • Understanding Business Continuity (BC) requirements• Contributing personnel security policies and procedures• Applying risk management concepts• Applying threat modeling concepts and methodologies• Applying risk-based management concepts to the supply chain• To establish and maintain security awareness, education, and training program across the organization Domain 2: Asset Security • Identifying and classifying information and assets• Determining and maintaining information and asset ownership• Protecting privacy• Ensuring appropriate asset retention• Determine data security controls• Establishing information and asset handling requirements Domain 3: Security Engineering • Implementing engineering processes by using secure design principles • Understanding the fundamental concepts of security models • Selecting controls based upon systems security requirements • Understanding security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption) • Assessing and mitigating vulnerabilities of security architectures, solution elements, and designs• Assessing and mitigating vulnerabilities in web-based systems • Assessing and mitigating vulnerabilities in mobile systems • Assessing and mitigating vulnerabilities in embedded devices • Applying cryptography• Implementing site and facility security controls Domain 4: Communications and Network Security • Implementing secure design principles in network architectures• Securing network components• Implementing secure communication channels according to design Domain 5: Identity and Access Management • Control physical and logical access to assets• Manage identification and authentication of people, devices, and services• Federated identity with a third-party service• Implement and manage authorization mechanisms• Manage the identity and access provisioning lifecycle• Implement authentication systems Domain 6: Security Assessment and Testing • Design and validate assessment, test, and audit strategies• Conduct security control testing• Collect security process data (e.g., technical and administrative)• Analyze test output and generate a report• Conduct or facilitate security audits Domain 7: Security Operations • Understand and comply with investigations• Conduct logging and monitoring activ