CISSP (Certified Information Systems Security Professional)
CISSP introduces you to gain knowledge in the IT framework as well as helps in designing, constructing, and ensuring a secure business ecosystem using the information security standards accepted across the globe.
Understanding IT Security and the Cyber Security from a managerial view point.
Helps you lead the security architecture of any organization.
Globally approved certification for IT security professionals.
What you’ll master?
Fundamental concepts of security and dealing with vulnerabilities.
Security implementation, Management and Testing
Monitoring identity and Access Management.
Network security and Software development security.
Some Sample Videos:
Class:1- Kicking off with CISSP.
Class:2- About alignment of the security function.
Class:3- Tutorial on Security control Frameworks.
Class:4 - Tutorial on compliance requirements.
Class:5 - Understanding legal and regulatory issues (information security)
Class: 6 - Fundamentals of Import/export controls.
Class:7 - Lesson on Trans-border data flow.
Class: 8 - A little bit about the code of ethics.
Class:9 - Know about Develop and document scope and plan.
Class: 10 - Fundamentals of Business Impact Analysis.
Class: 11 - How to enforce personnel security policy?
Class: 12 - Important concepts in personnel security policy.
Class: 13 - Concept of Risk assessment and analysis.
Class: 14 - Overview of Security Control Assessment.
Class: 15 - Understanding Risk frameworks.
Class: 16 - How to apply risk-based management concepts to the supply chain?
Class: 17 - How to establish and maintain a security awareness and training program?
Class: 18 - About program effectiveness evaluation.
Class: 19 - Introduction of Data and asset classification.
Class: 20 -How to determine and maintain information and asset ownership?
Class:21 - Fundamentals of Protect privacy.
Class:22 - How to ensure the appropriate asset retention?
Class:23 - Data security controls basics.
Class:24 - Different methods of data protection.
Class:25 - How to implement and manage engineering processes using secure design principles?
Class:26 - Overview of security models.
Class: 27 - Session about selecting the controls (based upon systems security requirements)
Class: 28 - About security capabilities of information systems.
Class: 29 - Introduction of Client-based systems and Server-based systems.
Class: 30 - Industrial Control Systems overview.
Class:31- How to assess and mitigate vulnerabilities in web-based systems?
Class:32- How to assess and mitigate vulnerabilities in mobile systems?
Class:33- How to assess and mitigate vulnerabilities in embedded devices?
Class:34 - Overview of Cryptographic life cycle.
Class:35 - Public Key Infrastructure fundamentals.
Class:36 - Digital Rights Management (DRM) explanation.
Class:37 - How to implement site and facility security controls?
Class: 38 - How to implement secure design principles in network architectures?
Class: 39 - Basics of Secure network components.
Class: 40 - Know about Network Access Control (NAC) devices.
Class: 41 - How to implement secure communication channels according to design?
Class: 42 - Lesson on Control physical and logical access.
Class: 43 - How to identify and manage implementation?
Class: 44 - Overview of Federated Identity Management (FIM).
Class: 45 - How to integrate identity as a third-party service?
Class: 46 - Overview of Role-Based Access Control (RBAC)
and Rule-based access control.
Class: 47 - Overview of Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Attribute-Based Access Control (ABAC)
Class: 48 - How to Manage the identity and access provisioning lifecycle?
Class: 49 - Introduction of Provisioning and de-provisioning.
Class:50 - How to design and validate assessment, test, and audit strategies?
Class:51 - Vulnerability assessment explanation.
Class:52 - Session on Test coverage analysis and Interface testing.
Class:53 - Tutorial on Account management.
Class:54 - Overview of Disaster Recovery (DR) and Business Continuity (BC)
Class:55 - How to analyze test output and generate input from it?
Class:56 - How to facilitate security audits?
Class:57 - Understanding supporting the investigations.
Class: 58 - Know about the requirements for investigation.
Class: 59 - Analysis of Security Information and Event Management (SIEM).
Class: 60 - About Securely provisioning resources.
Class:61- Service Level Agreements (SLA) fundamentals.
Class:62- Hardware and software asset management Intro.
Class:63- How to Conduct incident management?
Class:64- How to Operate and maintain detective and preventive measures?
Class:65 - How to implement and support patch and vulnerability management?
Class: 66 - Lesson on recovery strategies.
Class:67 - How to implement Disaster Recovery (DR) processes?
Class:68 - Overview of Disaster Recovery Plans (DRP).
Class:69 - Session on Business Continuity (BC) planning.
Class: 70 - How to implement and manage physical security?
Class: 71 - Basics of Perimeter security controls.
Class: 72 - Basics of Internal security controls.
Class: 73 - Understanding the security concerns.
Class: 74 - Session on Security training and awareness.
Class: 75 - Overview of Emergency management.
Class: 76 - Introduction of SDLC.
Class: 77 - Tutorial on integrating SDLC.
Class: 78 - How to identify security controls in development environments?
Class:79 - How to apply security controls in development environments?
Class:80 - Tutorial on Configuring management as an aspect of secure coding.
Class:81 - Code repositories Security tutorial.
Class:82 - How to assess the effectiveness of software security?
Class:83 - About auditing and logging of changes.
Class:84 - Session on risk analysis and mitigation.
Class:85 - How to Assess the security impact of acquired software?
Class:86 -An advanced tutorial on secure coding guidelines and standards.
Class: 87 - Lesson on Security weaknesses at the source-code level.
Class: 88 - Lesson on Security vulnerabilities at the source-code level.
Class: 89 - Understanding security of application programming.
Class: 90 - Secure coding practices tutorial.
Schedule Your Classes
The duration of the Course is 3 Months (90 days)
Weekdays - Monday to Saturday.
Weekend classes - Saturday and Sunday.
Class Consist of both Theory and Practical session.
Materials will be provided.
Please note that the Training Structure may vary for every student.
Have a Question?
Please send us any questions you may have. We would love to answer it.