CISSP – CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL

CISSP – CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL

(0 Ratings)
course-format course-format course-format course-format

Duration

5 Days

Certified Instructor

Course Id

nextecCS152

Course Description

Course Overview

The ICS2 Certified Information Systems Security Professional (CISSP) course is a comprehensive training program designed to equip participants with the knowledge and skills required to become proficient information security professionals. The CISSP certification is globally recognized and validates the expertise necessary to design, implement, and manage a secure information security program within an organization. This globally recognized certification demonstrates their expertise and commitment to maintaining a high standard of professionalism in the field of information security by:

  • Identify and mitigate security-related risks
  • Operate in accordance with applicable laws, regulations, and ethics
  • Apply secure design principles to all aspects of information security
  • Develop and implement security policies, standards, procedures, and guidelines
  • Identify, assess, and mitigate vulnerabilities in enterprise systems and networks
  • Conduct security assessments and testing
  • Monitor and respond to security incidents
  • Develop and implement secure software and system development lifecycles

Prerequisites

To be eligible for the CISSP certification program, candidates must have at least five cumulative years of paid, full-time work experience in at least two of the eight domains of the CISSP Common Body of Knowledge. If the candidate holds a four-year college degree or equivalent, the experience requirement can be reduced to four years. Candidates must also agree to the CISSP Code of Ethics.

Methodology

The CISSP course employs a combination of theoretical instruction, hands-on practical exercises, and interactive discussions to ensure a comprehensive learning experience. Experienced instructors guide participants through the eight domains of the CISSP Common Body of Knowledge (CBK), covering topics such as security and risk management, asset security, cryptography, and security operations. Participants are encouraged to engage in group activities, case studies, and real-world simulations to reinforce their understanding and application of information security principles.

Course Outline

SECURITY AND RISK MANAGEMENT

Understand, adhere to, and promote professional ethics

Understand and apply security concepts

Evaluate and apply security governance principles

Determine compliance and other requirements

Understand legal and regulatory issues that pertain to information security in a holistic context

Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)

Develop, document, and implement security policy, standards, procedures, and guidelines

Identify, analyze, and prioritize Business Continuity (BC) requirements

Contribute to and enforce personnel security policies and procedures

Understand and apply risk management concepts

Understand and apply threat modeling concepts and methodologies

Apply Supply Chain Risk Management (SCRM) concepts

Establish and maintain a security awareness, education, and training program

ASSET SECURITY

Identify and classify information and assets

Establish information and asset handling requirements

Provision resources securely

Manage data lifecycle

Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))

Determine data security controls and compliance requirements

COMMUNICATION AND NETWORK SECURITY

Assess and implement secure design principles in network architectures

Secure network components

Implement secure communication channels according to design

SECURITY ARCHITECTURE AND ENGINEERING

Research, implement and manage engineering processes using secure design principles

Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell- LaPadula)

Select controls based upon systems security requirements

Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)

Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements

Select and determine cryptographic solutions

Understand methods of cryptanalytic attacks

Apply security principles to site and facility design

Design site and facility security controls

IDENTITY AND ACCESS MANAGEMENT (IAM)

Control physical and logical access to assets

Manage identification and authentication of people, devices, and services

Federated identity with a third-party service

Implement and manage authorization mechanisms

Manage the identity and access provisioning lifecycle

Implement authentication systems

SECURITY ASSESSMENT AND TESTING

Design and validate assessment, test, and audit strategies

Conduct security control testing

Collect security process data (e.g., technical and administrative)

Analyze test output and generate report

Conduct or facilitate security audits

SECURITY OPERATIONS

Understand and comply with investigations

Conduct logging and monitoring activities

Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)

Apply foundational security operations concepts

Apply resource protection

Conduct incident management

Operate and maintain detective and preventative measures

Implement and support patch and vulnerability management

Understand and participate in change management processes

Implement recovery strategies

Implement Disaster Recovery (DR) processes

Test Disaster Recovery Plans (DRP)

Participate in Business Continuity (BC) planning and exercises

Implement and manage physical security

Address personnel safety and security concerns

SOFTWARE DEVELOPMENT SECURITY

Understand and integrate security in the Software Development Life Cycle (SDLC)

Identify and apply security controls in software development ecosystems

Assess the effectiveness of software security

Assess security impact of acquired software

Define and apply secure code

Outcome

The CISSP certification ensures that the certified professionals have the necessary knowledge and skills to design, implement, and manage the overall security posture of an organization. The certification verifies that the certified professionals can identify, assess, and mitigate security-related risks, comply with applicable laws, regulations, and ethics, and apply secure design principles to all aspects of information security. 

Labs

The CISSP course includes practical labs that provide participants with hands-on experience in applying the knowledge gained throughout the training. These labs are designed to simulate real-world scenarios and allow participants to practice implementing security controls, conducting risk assessments, analyzing security incidents, and developing security policies. Participants will have the opportunity to work with industry-standard tools and technologies, gaining valuable practical skills that can be directly applied in their professional roles.

Exam Requirements

  • Passing the CISSP exam is a requirement to receive CISSP certification. The exam consists of 250 multiple-choice questions and is based on the eight domains of the CISSP Common Body of Knowledge.
  • The minimum passing score is 700/1000 points, and the exam duration is 6 hours.
  • Candidates must also agree to the CISSP Code of Ethics and have at least five years of cumulative, paid, full-time work experience in at least two of the eight domains of the CISSP Common Body of Knowledge.

By completing the CISSP course and passing the certification exam, participants will join an elite group of information security professionals and earn the prestigious CISSP certification. This globally recognized certification demonstrates their expertise and commitment to maintaining a high standard of professionalism in the field of information security.

User Avatar

user

0 Reviews
1 Student
323 Courses
0.0
0 rating
5 stars
0%
4 stars
0%
3 stars
0%
2 stars
0%
1 stars
0%

Be the first to review “CISSP – CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL”

Main Content