Certified Information System Security Professional (CISSP) Training
In-Person Classroom
$2499
- 4 Days of In-Person Instruction
- CISSP Official Study Guide
- Official Practice Exams for CISSP
- Extra Materials/Resources
- 35 PDUs certification and exam support
Live Online Classroom
$2199
- 4 Days of Real-Time Online Instruction
- CISSP Official Study Guide
- Official Practice Exams for CISSP
- Videos of Live Classes Recorded
- 35 PDUs certification and exam support
Online Self - Study
$1099
- Lifelong Courseware Access
- CISSP Official Study Guide
- Official Practice Exams for CISSP
- Extra Materials/Resources
- 35 PDUs certification and exam support
Become
Certified as a CISSP to Protect Your Future:
In the information security industry, the most widely recognized qualification
is the Certified Information Systems Security Professional (CISSP). The
Certified Information Security Professional (CISSP) credential verifies an
information security professional's extensive technical and administrative
expertise in designing, developing, and overseeing an organization's
comprehensive security posture.
The CISSP Common Body of Knowledge (CBK®) covers a wide range of subjects,
making it applicable to all fields within the realm of information security.
Candidates that are successful possess competence in the following eight areas:
Ø Asset Security
Ø Security and Risk Management
Ø Communication and Network Security
Ø Security Architecture and Engineering
Ø Security Assessment and Testing
Ø Identity and Access Management (IAM)
Security Operations
Lesson
1: Risk Assessment and Security
Topic A: Security Principles
Topic B: Security Governance Elements
Topic C: Adherence
Topic D: Ethics in the Workplace
Topic E: Documentation Concerning Security
Topic F: Hazard Assessment and Mitigation
Topic G: Modeling Danger
Topic I: Foundations of Business Continuity Plans Topic H: Risk Response
Topic J: Practices and Strategies for Acquisition
Topic K: Security Procedures for Personnel
Topic L: Training and Awareness of Security
Lesson 2: Security of Assets
Topic A: Classification of Assets
Topic B: Safe Management of Data
Topic C: Protection and Provisioning of Resources
Topic D: Data Lifecycle Management
Subject E: Maintenance of Assets
Topic F: Security Measures for Data
Lesson
3: Engineering and Architecture for Security
Topic A: Safety throughout the Engineering Process
Topic B: Security of System Components
Topic C: Models of Security
Topic D: Enterprise Security Controls and Countermeasures
Topic E: Security Capabilities of Information Systems
Topic F: Architecture and Design Vulnerabilities Reduction
Topic G: Emerging Technologies' Vulnerability Mitigation
Topic H: Fundamentals of Cryptography
Topic I: Methods of Cryptography
Topic J: Cryptoanalytical Assaults
Topic K: Designing Sites and Facilities for Physical Security
Topic L: Implementing Physical Security at Sites and Facilities
Lesson
4: Network security and communication
Topic A: Security of Network
Protocols
Topic B: Security of Network Components
Topic C: Security of Communication Channels
Topic D: Mitigation of Network Attacks
Lesson 5: Management of Identity and
Access
Topic A: Controlling Physical and Logical Access
Topic B: Recognition and Validation
Topic C: The Service of Identity
Topic D: Mechanisms of Authorization
Topic E: Mitigation of Access Control Attacks
Lesson
6: Evaluation and Testing of Security
Topic A: Testing System Security Controls
Topic B: Testing Software Security Controls
Topic C: Data Collection for Security Processes
Topic D: Evaluations
Lesson 7: Managing Security
Topic A: Concepts of Security Operations
Topic C: Physical Security Topic B: Change Management
Topic D: Security of Personnel
Topic E: Investigative and Proactive Steps
Topic F: Handling Vulnerabilities and Patches
Topic G: Recording and Observation
Topic H: Reaction to Incidents
Topic I: Research
Topic J: Planning for Disaster Recovery
Topic K: Strategies for Disaster Recovery
Topic L: Implementing Disaster Recovery
Lesson
8: Security in Software Development
Topic A: System Lifecycle Security Principles
Topic B: The Software Development Lifecycle's Security Principles
Topic C: Development Environment Security Measures
Topic D: Software Development Database Security
Topic E: Evaluation of Software Security Effectiveness
Computerized Adaptive Testing (CAT)
is used for all English assessments in the CISSP exam. All other languages'
CISSP tests are given in linear, fixed-form format.
Length of Exam |
4 hours |
Number of Questions |
125-175 |
Question Format |
MCQ and advanced innovative |
Passing Grade |
700 out of 1000 points |
Language |
English |
Exam Center |
Authorized Pearson VUE Testing
Centers for PPC and PVTC Select (ISC) |
CISSP CAT Examination Weights:
Domains |
Average Weight |
1. Security and Risk Management |
15% |
2. Asset Security |
10% |
3. Security Architecture and
Engineering |
13% |
4. Communication and Network
Security |
13% |
5. Identity and Access Management
(IAM) |
13% |
6. Security Assessment and Testing |
12% |
7. Security Operations |
13% |
8. Software Development Security |
11% |
Total |
100% |
Anonymous
Anonymous
Anonymous
Anonymous
What You`ll Learn on This Course?
- Exam Passing Ratio: 98.23%
- More than 70,000 professionals attended
- Weekly Classes to Match Your Schedule
- 100+ CISSP-Certified Teachers
- Training that is Self-Paced, Virtual, or In-Person
- Guaranteed to Run Classes
Who This Course is for?
Experienced
IT security professionals, auditors, consultants, investigators, or instructors
are the target audience for this course. These professionals include network
and security analysts and engineers, network administrators, information
security specialists, and risk management specialists. By obtaining CISSP
training and certification, they hope to gain the credibility and mobility
necessary to progress in their current computer security careers or transition
to a related field.
Students will verify their
understanding by completing the prerequisite coursework in order to be eligible
to take the CISSP certification exam, which involves studying all eight of the
CISSP CBK domains. A college degree plus four years of experience, or a minimum
of five years of direct professional job experience in two or more fields
relevant to the eight CBK security domains, are additional prerequisites for
CISSP certification.
Managers at the mid- and senior-level who aspire to or have attained positions
like these:
Ø Chief Security Officer (CSO)
Ø Senior Security Engineer
Ø Chief Information Security Officer (CISO)
Ø Network Architects
Ø Security Consultants
Ø Security Managers
Ø Security Auditors
Ø Security Architects, and others can benefit the most from
taking this CISSP course.