Sale!

CISSP® Training Course

$549.00$2,147.00

CISSP Certification Course aligned with (ISC)² CBK helps you to crack the CISSP exam.

Online CISSP Training covers

✔️30 CPEs

✔️5 Simulation Exams

 

Clear
CISSP® Training Course
SKU: N/A Category:

Program Overview:

CISSP certification training develops your expertise in defining IT architecture and
designing, building, and maintaining a secure business environment using globally approved
information security standards. This course covers industry best practices and prepares you
for the CISSP certification exam held by (ISC).

Program Features:

  • 67 hours of live online learning*
  • 35 hours of online self-paced learning
  • 32 hours of instructor-led training
  • Five simulation test papers to prepare you for CISSP certification

Delivery Modes:

Live Online or Self Paced – Online self-paced learning and live virtual classroom options

Prerequisites: 

To obtain your CISSP certification, you must have a minimum of five years of full-time
professional work experience in two or more of the eight domains of the CISSP – (ISC) CBK
2018. A qualified individual with less than five years of experience will receive the Associate
of (ISC) title.

Target Audience:

  • Security consultants/managers
  • IT directors/managers
  • Security auditors/architects
  • Security system engineers
  • CIOs
  • Network architects

Key Learning Outcomes:

By the end of this CISSP training, you will:

  • Be able to define the architecture, design, and management of the security of your organization
  • Acquire the relevant knowledge and skills required to pass the CISSP certification exam
  • Perform risk analysis and prevent data loss
  • Learn about security architecture, engineering, models, and cryptography
  • Gain familiarity with communications and network security, identity and access management, and security testing and operations

Certification Details and Criteria:

This CISSP training is intended for professionals who want to acquire the credibility and mobility
to advance within their current information security careers. To claim the CISSP certificate from
ISC2, you must have at least five years of recent full-time professional work experience in two
or more of the eight domains of the CISSP – CBK 2018. In case you do not have the required
experience, you will be awarded an Associate of (ISC)2 title, which will in turn be replaced with
the CISSP certificate after you gain and submit proof of your experience.

Dooey Course Completion Criteria-

Live Online Classroom*:

  • Attend one complete batch
  • Complete one simulation test with a minimum score of 60 percent

Online Self-Paced Learning:

  • Complete 85 percent of the course
  • Complete one simulation test with a minimum score of 60 percent

Course Curriculum:

Lesson 01 – Course Introduction

  • Course Introduction

Lesson 02 – Security and Risk Management

  • Security and Risk Management
  • Information Security Management
  • Security Controls
  • Information Security Management and Governance
  • Goals, Mission, and Objectives
  • Due Care
  • Security Policy
  • Compliance
  • Computer Crimes
  • Legal Systems
  • Intellectual Property (IP) Law
  • Privacy
  • General Data Protection Regulation
  • Security
  • Risk Analysis
  • Types of Risk Analysis
  • Security Control Assessment
  • Threat Modeling
  • Supply-Chain Risk Management
  • Third-Party Management
  • Business Continuity Planning
  • Business Continuity Planning Phases
  • Managing Personnel Security
  • Security Awareness Training
  • Program Effectiveness Evaluation
  • Key Takeaways
  • Knowledge Check

Lesson 03 – Asset Security

  • Asset Security
  • Information Classification
  • Data Classification
  • Data Life Cycle
  • Data Management
  • Different Roles
  • Data Remanence
  • Privacy
  • States of Data
  • Data Loss Prevention
  • Key Takeaways
  • Knowledge Check

Lesson 04 – Security Engineering

  • Introduction
  • Security Engineering
  • Security Architecture
  • Security Models
  • Evaluation Criteria
  • System Security
  • CPU
  • Memory
  • Security Mode
  • Cloud Computing
  • IoT
  • Industrial Control System (ICS)
  • Cryptography
  • Encryption Methods
  • DES
  • Asymmetric Cryptography
  • Public Key Infrastructure
  • Cryptanalysis
  • Key Management
  • Critical Path Analysis
  • Site Location
  • Fire
  • HVAC
  • Key Takeaways
  • Knowledge Check

Lesson 05 – Communications and Network Security

  • Introduction
  • Network Architecture and Design
  • IP Addressing
  • Network Protocols
  • Transmission Media
  • Firewall
  • Intrusion Detection System and Intrusion Prevention System
  • Network Access Control (NAC)
  • Content Delivery Network (CDN)
  • Networks
  • Software-Defined Networking (SDN)
  • Remote Access
  • Internet Security Protocol (IPsec)
  • Voice over Internet Protocol (VoIP)
  • Phreaking
  • Secure Access Protocols
  • Wireless Technologies
  • Network Attacks
  • Key Takeaways
  • Knowledge Check

Lesson 06 – Identity and Access Management

  • Identity and Access Management
  • Identity Management
  • Biometrics
  • Passwords
  • Tokens
  • Memory Cards and Smart Cards
  • Access and Authorization Concepts
  • Identity Management Implementation
  • Kerberos
  • Access Control Types
  • Access Control Models
  • Access Control Tools and Techniques
  • Accountability
  • Access Control Monitoring
  • Identity Proofing
  • Markup Languages
  • Identity as a Service (IDaaS)
  • Key Takeaways
  • Knowledge Check

Lesson 07 – Security Assessment and Testing

  • Security Assessment and Testing
  • Security Assessment
  • Vulnerability Assessment
  • Penetration Testing
  • Audits
  • Log Management
  • Synthetic Transaction and Real Transaction
  • Testing
  • Software Testing
  • Interface
  • Key Performance Indicators (KPI)
  • Key Takeaways
  • Knowledge Check

Lesson 08 – Security Operations

  • Security Operations
  • Investigation
  • Forensic Investigation
  • Evidence
  • Electronic Discovery
  • Incident Management
  • Security Operations Management
  • Identity and Access Management
  • Assets
  • Malware
  • Management
  • Recovery and Backup
  • Disaster Recovery
  • Perimeter Security
  • Key Takeaways
  • Knowledge Check

Lesson 09 – Software Development Security

  • Software Development Security
  • Importance of Software Development Security
  • Programming Concepts
  • Systems Development Life Cycle
  • Application Program Interface
  • Software Security and Assurance
  • Database and Data Warehouse Environments
  • Knowledge Management
  • Web Application Environment
  • Security Threats and Attacks
  • Key Takeaways
  • Knowledge Check

 

*Only included with the Live Online Option

Course Type

Live Online, Self Paced