Login

OTP sent to

CISSP

Home > Courses > CISSP

CISSP

CISSP

Duration
45 Hours

Course Description


         The Certified Information Systems Security Professional (CISSP) certification is a globally recognized credential for cybersecurity professionals. It demonstrates a professional's knowledge and ability to design, implement, and manage comprehensive security programs within an organization. The certification covers eight key domains of cybersecurity, focusing on both technical and managerial aspects of information security.

Course Outline For CISSP

1. Security and Risk Management

        This domain focuses on establishing a robust security and risk management framework within an organization. Key topics include: 

  • Security Governance Principles: Aligning security strategies with business objectives and ensuring adherence to ethical principles.
  • Compliance and Requirements: Understanding and complying with relevant legal and regulatory frameworks, such as GDPR and HIPAA.
  • Information Security Governance: Defining organizational security roles, responsibilities, and establishing frameworks like ISO 27001, NIST, and COBIT.
  • Risk Management: Identifying, assessing, and mitigating risks through various methods, including threat modeling and supply chain risk management.
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP): Developing strategies to ensure the continuation of critical operations during and after security incidents.
  • Security Awareness and Training: Implementing programs to educate employees on security best practices and foster a security-conscious culture. 

2. Asset Security

        This domain addresses the security of an organization's information assets throughout their lifecycle. It includes: 

  • Information and Asset Classification: Categorizing information based on its sensitivity and value.
  • Data Handling and Protection: Establishing guidelines for handling sensitive data, implementing controls like DRM and DLP, and managing the data lifecycle (collection, retention, destruction).
  • Privacy: Protecting personal and sensitive data through policies and measures aligned with regulations like GDPR. 

3. Security Architecture and Engineering

         This domain covers the design, implementation, and maintenance of secure systems and architectures. Topics include applying secure design principles, understanding security models and frameworks, cryptography, vulnerability assessment and mitigation, and physical security. 

4. Communication and Network Security

          This domain focuses on securing network architectures and communication channels. Key areas include secure network design, secure communication channels, and network component security. 

5. Identity and Access Management (IAM)

          This domain addresses managing identities and access to resources within an organization. Topics include identity lifecycle management, access control models, and authentication and authorization. 

6. Security Assessment and Testing

          This domain covers methods for assessing and testing the effectiveness of security controls. Key areas include security assessment techniques, security control testing, and security audits. 

7. Security Operations

         This domain focuses on the day-to-day operations of an organization's security program. It includes incident management, security monitoring and logging, operational security, and disaster recovery and business continuity. 

8. Software Development Security

       This domain addresses integrating security throughout the Software Development Life Cycle (SDLC). Key topics include the secure SDLC, secure coding practices, and application security testing. 

Enquire Now