CISSP

If you visualize yourself as an information security leader, then CISSP is the training you would need to pursue. With  CISSP training , you get the proper understanding of design, architecture, and management of a security environment. Professionals with a CISSP certification are high in demand, all across the globe, to ensure safety of organizations Information against the increasing instances of cyber attack. CISSP online course helps candidates prepare for the rigorous CISSP certification exam anytime, anywhere without sacrificing quality for convenience.

If you visualize yourself as an information security leader, then CISSP is the training you would need to pursue. With  CISSP training , you get the proper understanding of design, architecture, and management of a security environment. Professionals with a CISSP certification are high in demand, all across the globe, to ensure safety of organizations Information against the increasing instances of cyber attack. CISSP online course helps candidates prepare for the rigorous CISSP certification exam anytime, anywhere without sacrificing quality for convenience. Training provides in-depth review of information security concepts and industry best practices, with comprehensive coverage of the eight domains of the CISSP Common Body of Knowledge (CBK).

The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories. CISSP certified professionals are considered authorities on key security issues including mobile security, risk management, application development security, cloud computing, among others.

CISSP certification is not only an objective measure of excellence, but a globally recognized standard of achievement for security training. Makintouch provides comprehensive CISSP training for participants who wish to gain expertise in defining the design, architecture, management and controls leading to a secure business environment. Individuals possessing this vendor neutral credential are high in demand by corporations all over the world who want to protect their organizations from a growing spurt of sophisticated cyber attacks.

Course Objectives
  • Understand and apply fundamental concepts and methods related to the fields of information technology and security.
  • Align overall organizational operational goals with security functions and implementations.
  • Understand how to protect assets of the organization as they go through their lifecycle.
  • Understand the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
  • Implement system security through the application of security design principals and the application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures.
  • Understand the importance of cryptography and the security services it can provide in today’s digital and information age.
  • Understand the impact of physical security elements on information system security and apply secure design principals to evaluate or recommend appropriate physical security protections.
COURSE OUTLINE 

Lesson 1: Security and Risk Management
Topic A: Security Governance Principles
Topic B: Compliance
Topic C: Professional Ethics
Topic D: Security Documentation
Topic E: Risk Management
Topic F: Threat Modeling
Topic G: Business Continuity Plan Fundamentals
Topic H: Acquisition Strategy and Practice
Topic I: Personnel Security Policies
Topic J: Security Awareness and Training

Lesson 2: Asset Security
Topic A: Asset Classification
Topic B: Privacy Protection
TGopic C: Asset Retention
Topic D: Data Security Controls
Topic E: Secure Data Handling

Lesson 3: Security Architecture and Engineering
Topic A: Security in the Engineering Lifecycle
Topic B: System Component Security
Topic C: Security Models
Topic D: Controls and Countermeasures in Enterprise Security
Topic E: Information System Security Capabilities
Topic F: Design and Architecture Vulnerability Mitigation
Topic G: Vulnerability Mitigation in Mobile, IoT, Embedded, and Web-Based Systems
Topic H: Cryptography Concepts
Topic I: Cryptography Techniques
Topic J: Site and Facility Design for Physical Security
Topic K: Physical Security Implementation in Sites and Facilities

Lesson 4: Communication and Network Security
Topic A: Network Protocol Security
Topic B: Network Components Security
Topic C: Communication Channel Security
Topic D: Network Attack Mitigation

Lesson 5: Identity and Access Management
Topic A: Physical and Logical Access Control
Topic B: Identification, Authentication, and Authorization
Topic C: Identity as a Service
Topic D: Authorization Mechanisms
Topic E: Access Control Attack Mitigation

Lesson 6: Security Assessment and Testing
Topic A: System Security Control Testing
Topic B: Software Security Control Testing
Topic C: Security Process Data Collection
Topic D: Audits

Lesson 7: Security Operations
Topic A: Security Operations Concepts
Topic B: Physical Security
Topic C: Personnel Security
Topic D: Logging and Monitoring
Topic E: Preventative Measures
Topic F: Resource Provisioning and Protection
Topic G: Patch and Vulnerability Management
Topic H: Change Management
Topic I: Incident Response
Topic J: Investigations
Topic K: Disaster Recovery Planning
Topic L: Disaster Recovery Strategies
Topic M: Disaster Recovery Implementation

Lesson 8: Software Development Security
Topic A: Security Principles in the System Lifecycle
Topic B: Security Principles in the Software Development Lifecycle
Topic C: Database Security in Software Development
Topic D: Security Controls in the Development Environment
Topic E: Software Security Effectiveness Assessment

Color

Purple, Red

Reviews

There are no reviews yet.

Be the first to review “CISSP”