We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?

Certified Information Systems Security Professional (CISSP) (CS8502)

Online Training by  ECCENTRIX
Inquire Now
Online / Training

Details

Welcome to Certified Information Systems Security Professional Training (CISSP)!

This course complements your knowledge and experience in large-scale information security. It expands your knowledge by browsing the eight domains defined by the Common Body of Knowledge (CBK) for information security professionals. The training offers an approach based on the use of a corporate security process, while also being the preparation tool for CISSP certification.

CISSP Certification is a highly-rated information security certification in the world of today's technology and security. This remains because the organization (ISC) ² is constantly improving content through the engagement of industry experts, ensuring that the material and issues remain relevant despite the current turbulence and changes in the security field. In defining the eight CBK domains, an industry standard has been developed and CISSP training is exploiting all of them. The skills and knowledge you will get from this course will help you to understand these eight areas. It will establish credibility and success for every professional in the field of information security.

Outline

Lesson 1: Security and Risk Management

  • Security Governance Principles

  • Compliance

  • Professional Ethics

  • Security Documentation

  • Risk Management

  • Threat Modeling

  • Business Continuity Plan Fundamentals

  • Acquisition Strategy and Practice

  • Personnel Security Policies

  • Security Awareness and Training

Lesson 2: Asset Security

  • Asset Classification

  • Privacy Protection

  • Asset Retention

  • Data Security Controls

  • Secure Data Handling

Lesson 3: Security Engineering

  • Security in the Engineering Lifecycle

  • System Component Security

  • Security Models

  • Controls and Countermeasures in Enterprise Security

  • Information System Security Capabilities

  • Design and Architecture Vulnerability Mitigation

  • Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems

  • Cryptography Concepts

  • Cryptography Techniques

  • Site and Facility Design for Physical Security

  • Physical Security Implementation in Sites and Facilities

Lesson 4: Communications and Network Security

  • Network Protocol Security

  • Network Components Security

  • Communication Channel Security

  • Network Attack Mitigation

Lesson 5: Identity and Access Management

  • Physical and Logical Access Control

  • Identification, Authentication, and Authorization

  • Identity as a Service

  • Authorization Mechanisms

  • Access Control Attack Mitigation

Lesson 6: Security Assessment and Testing

  • System Security Control Testing

  • Software Security Control Testing

  • Security Process Data Collection

  • Audits

Lesson 7: Security Operations

  • Security Operations Concepts

  • Physical Security

  • Personnel Security

  • Logging and Monitoring

  • Preventative Measures

  • Resource Provisioning and Protection

  • Patch and Vulnerability Management

  • Change Management

  • Incident Response

  • Investigations

  • Disaster Recovery Planning

  • Disaster Recovery Strategies

  • Disaster Recovery Implementation

Lesson 8: Software Development Security

  • Security Principles in the System Lifecycle

  • Security Principles in the Software Development Lifecycle

  • Database Security in Software Development

  • Security Controls in the Development Environment

  • Software Security Effectiveness Assessment

Reviews
Be the first to write a review about this course.
Write a Review
Since 2011, Eccentrix has been providing technology skills enhancement solutions for businesses. Our mission is to promote the importance of continuing education to computer users and professionals through many programs that we have implemented and improved over the years.

Our goal is to offer quality and up-to-date training courses, while following the latest trends in technology and applications. These are courses that target the real and concrete needs of our customers, ensuring that the knowledge acquired is put into practice. Additionally, many prepare our participants for certification exams with the brands we are accredited with - Microsoft, EC-Council, CompTIA, and PeopleCert.

Microsoft

Eccentrix has the most comprehensive offer in terms of Microsoft accredited trainings. In addition, a complete set of benefits comes with each enrollment to our trainings. Since the very beginning of our operations, Eccentrix has been a Microsoft Partner in learning following the numerous changes in the learning paths and programs, notably for certification-based courses.

EC-Council

Eccentrix has the highest level of EC-Council partnership, delivering the complete portfolio of EC-Council cybersecurity courses since 2017. With an EC-Council course comes a set of benefits that greatly help our participants get certified. EC-Council is a key vendor for Eccentrix, since we have a strong focus on cybersecurity courses and that relationships just gets better over the years. ...

Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.