Description
The CISSP certification from the cybersecurity professional organization (ISC)² ranks among the most sought-after credentials in the industry. Earning your CISSP demonstrates that you’re experienced in IT security and capable of designing, implementing, and monitoring a cybersecurity program. It’s a vendor neutral infosec certification Aligned with the latest (ISC)² version launched on May 1, 2021.
What do you actually learn ?
There are 8 primary domains which will be processed in this course.The primary objective of this course is to prepare you for the CISSP certification.CISSP covers a wide swath of topics every IT security pro should understand, categorized into eight Common Body of Knowledge domains:
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
To qualify CISSP exam, you need to have five or more years of cumulative work experience in at least two of eight above-mentioned domains.
This advanced certification is for experienced security professionals looking to advance their careers in roles like:
- Chief information security officer – $170,928
- Security administrator – $85,647
- IT security engineer – $94,971
- Senior security consultant – $121,942
- Information assurance analyst – $83,552
Let us put it very blunt and straightforward that CISSP is no easy undertaking, it scratches a lot of domains and scratches deep .So we recommend you to sincerely attend all your training sessions .Outside of your live instructor led sessions, we have practice exams as the part of the course. Our advice will be to attempt all the practice exams once you have the complete knowledge that you can recite, even if somebody wakes you up at morning 3 o’ clock! Then only the score will be accurate – you can gauge how much you are ready for the final exam.We will be there until the final day before the CISSP exam to give you confidence before your Big Day. We are reachable through phone, our slack channel or you can raise a ticket and we will respond at the fastest within an hour if not minutes. Our course Instructors are also come by often to our slack – so you can chat live with your Instructor even outside of your class. With that said, we wish you a good luck !
What are you waiting for?
Dive into your course
COURSE OUTLINE
Getting Started
- Course Introduction
- Course Prerequisites
Security Governance
- CIA Triad: Confidentiality
- CIA Triad: Integrity
- CIA Triad: Availability
- Identification, Authentication, Authorization, Auditing, and Accounting
- Threat Modeling
- Security Policies
- Risk Management: Part 1
- Risk Management: Part 2
- Risk Management: Part 3
- QUIZ Security Governance
Laws, Regulations, and Ethics
- Laws, Standards and Regulations
- Professional Ethics
- QUIZ Laws, Regulations, and Ethics
Data and Asset Security
- Classifying Data and Assets
- Data Ownership
- Storing and Disposing of Data
- QUIZ Data and Asset Security
Cryptography
- Introduction
- Asymmetric and Symmetric Encryption
- Ciphers
- Public Key Infrastructure (PKI)
- Hashing Algorithms
- Cryptographic Attacks
- QUIZ Cryptography
Security Models and Design
- Security Design Principles
- Security Models
- System Security Requirements
- Physical Security: Part 1
- Physical Security: Part 2
- QUIZ Security Models and Design
Threats and Attacks
- Threats vs. Attacks
- Motives
- Attack Vectors
- Threat Classification
- Attack Classification
Network Architecture
- OSI vs. TCP/IP
- TCP/IP
- Wireless Access Point
- Wireless Network Attacks
- Firewalls
- Network Hardware
- Network Topologies
- QUIZ Network Architecture
Network Traffic
- Network Security Mechanisms
- Email Security
- VPN and Virtualization
- Network Address Translation (NAT)
- Wide-Area Networks (WANs)
- Network Attack Mitigation
- QUIZ Network Traffic
Identity and Authentication
- Identification and Authentication: Part 1
- Identification and Authentication: Part 2
- Identification and Authentication: Part 3
- Access Control
- QUIZ Identity and Authentication
Security Assessments
- Security Assessments and Audits
- Penetration Testing
- Vulnerability Assessments
- Software Testing
- QUIZ Security Assessments
Disaster Prevention, Response, and Recovery
- Security Operations
- Responding to Incidents
- Log – Monitor – Audit
- QUIZ Disaster Prevention, Response, and Recovery
Software Development Security Principles
- The Software Development Lifecycle (SDLC)
- Data and Information Storage
- Malicious Code: Part 1
- Malicious Code: Part 2
- QUIZ Software Development Security Principles
Final Steps
- How to Prepare for the Exam
- What’s Next After Certification?
- PRACTICE EXAM Security Processes, Systems and Architecture Practice Exam