Certified Information Systems Security Professional (CISSP) certification is widely acknowledged as one of the foremost credentials in the information security industry. CertAdda offers the best-in-class training experience to help you obtain the CISSP certification, along with helping you upskill and enabling you to secure well-suited leadership roles in the cybersecurity industry. Earning the CISSP Certification validates your extensive technical and managerial expertise as an information security specialist, enabling you to proficiently create, implement, and administer your organization’s security framework.
Course Features
- Lecture 0
- Quiz 0
- Duration 10 weeks
- Skill level All levels
- Language English
- Students 0
- Assessments Yes
- 12 Sections
- 0 Lessons
- 10 Weeks
- Course Introduction and FundamentalsTopics: Basics of Information System Security Prerequisites for CISSP Course Outline Exam Experience Domains in CISSP Skills You will Learn: Exam Methodology Information Systems Security CISSP Domains0
- Security and Risk Management Part - ITopics: Professional ethics Applied Security and Implementation Security Governance Principles Compliance and Requirements Legal and Regulatory issues Investigation Types Skills You will Learn: Organizational code of ethics Security control frameworks Import / Export Controls0
- Security and Risk Management Part - IITopics: Implement security policies Business Continuity (BC) requirements Personnel Security Policies and Procedures Risk Management Implementations Threat modeling and methodology Supply Chain Risk Management (SCRM) Security Awareness and Training Program Skills You will Learn: Business Impact Analysis (BIA) Countermeasure selection Third-party assessment0
- Asset SecurityTopics: Information and Assets Classification Information and Asset handling requirements Provision resources securely Manage data lifecycle Asset Retention (e.g., End-of-Life (EOL)) Data Security Controls and Compliance Skills You will Learn: Asset Classification Asset management Data protection methods0
- Security Architecture and EngineeringTopics: Secure Design Engineering Principles Security Models (e.g., Biba, Star Model) Systems Security Controls Requirements Information Systems (IS) Security Capabilities Security Architecture Vulnerabilities Cryptographic Solutions Cryptanalytic Attacks Facility and Site Design Principles Facility and Site Security Controls Skills You will Learn: Threat modeling Industrial Control Systems Cryptographic methods0
- Communication and Network SecurityTopics: Secure Network Design Principles Network Architecture Security Secure Network Components Secure Communication Channel Design Skills You will Learn: Micro-segmentation Endpoint security Virtualized networks0
- Identity and Access Management (IAM)Topics: Physical and Logical Asset Control IAM of people, devices, and services Federated Identity with a third-party service Authorization Mechanisms Access Provisioning Lifecycle Authentication Systems Skills You will Learn: Identity Management (IdM) implementation Provisioning and deprovisioning OpenID Connect (OIDC)/Open Authorization (Oauth)0
- Security Assessment and TestingTopics: Assessment and Testing Strategies Security Control Testing Collect security process data Analysis and Report Generation Facilitate Security Audits Skills You will Learn: Vulnerability assessment Disaster Recovery (DR) and Business Continuity (BC) Exception handling0
- Security Operations Part - ITopics: Infrastructure Security Investigations Logging and Monitoring Configuration Management (CM) Security Operations concepts Apply resource protection Conduct incident management Detective and Preventive measures Skills You will Learn: Digital forensics procedures Threat intelligence SIEM0
- Security Operations Part - IITopics: Patch and Vulnerability Management Change Management Processes Implement Recovery Strategies Implement Disaster Recovery (DR) Test Disaster Recovery Plans (DRP) Business Continuity (BC) planning Physical Security Personnel Safety and Security Skills You will Learn: Backup Strategies Restoration Emergency Management0
- Software Development SecurityTopics: Software Development Life Cycle (SDLC) security Software Development Ecosystem Security Software Effectiveness Security Software Acquisition Assessment Secure Coding Guidelines Skills You will Learn: Development methodologies Software Configuration Management Security of Application Programming Interfaces (APIs)0
- Real Time Case StudiesTopics: Scenarios on 8 CISSP domains Best and Worst case analysis Co-Relate to CISSP Examination Skills You will Learn: Domain Specific Skills Real Scenario Problem Solving Risk Operations0


