Koenig Solutions
Koenig Solutions Logo

Certified Information Systems Security Professional (CISSP) 
offered by Koenig Solutions

  • Private Institute

Certified Information Systems Security Professional (CISSP)
 at 
Koenig Solutions 
Overview

Duration

40 hours

Total fee

48,000

Mode of learning

Online

Difficulty level

Advanced

Credential

Certificate

Certified Information Systems Security Professional (CISSP)
 at 
Koenig Solutions 
Highlights

  • Industry-recognized Course Completion certificate provided
  • Instructor-led Certified Information Systems Security Professional (CISSP) Certification Training
  • Get access to a free course preview to begin your preparation
  • Expert CISSP instructors across the globe
  • Accredited CISSP course material prepared by SMEs
Read more
Details Icon

Certified Information Systems Security Professional (CISSP)
 at 
Koenig Solutions 
Course details

Who should do this course?
  • This CISSP certification course is ideal for professionals who are looking to demonstrate their knowledge across different security practices and principles
  • For Network Architects, Security Consultants, Security Architects, Security Auditors, Security Managers
  • For CIOs, Directory of Security, Security Analysts, Security Systems Engineers
  • For Anybody who wants to gain knowledge of globally-recognized CISSP information security standards
  • For Anybody who is looking to clear their CISSP Certification Exam
What are the course deliverables?
  • A holistic understanding of information security aspects in an organization
  • Defining the architecture, design, and management of IT security
  • Necessary skills required to become a CISSP certified professional
  • Gain a thorough understanding of all the 8 domains prescribed in the ISC2 CISSP Common Body of Knowledge (CBK)
  • Optimizing security operations in an enterprise
  • Access control systems and various methodologies that complement IT Security and governance for an enterprise
More about this course
  • Certified Information Systems Security Professional (CISSP) is one of the world's premier cybersecurity certifications offered for professionals worldwide
  • This 5-day Certified Information Systems Security Professional (CISSP) certification is governed by the not-for-profit International Information Systems Security Certification Consortium (ISC)2
  • The Certified Information Systems Security Professional Certification course from ISC2 is one of the most sought-after certification courses in the Cybersecurity domain

Certified Information Systems Security Professional (CISSP)
 at 
Koenig Solutions 
Curriculum

Module 1: Security and Risk Management

Understand, adhere to, and promote professional ethics

Understand and apply security concepts

Evaluate and apply security governance principles

Determine compliance and other requirements

Understand legal and regulatory issues that pertain to information security in a holistic context

Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)

Develop, document, and implement security policy, standards, procedures, and guidelines

Identify, analyze, and prioritize Business Continuity (BC) requirements

Contribute to and enforce personnel security policies and procedures

Understand and apply risk management concepts

Understand and apply threat modelling concepts and methodologies

Apply Supply Chain Risk Management (SCRM) concepts

Establish and maintain a security awareness, education, and training program

Module 2: Asset Security

Identify and classify information and assets

Establish information and asset handling requirements

Provision resources securely

Manage data lifecycle

Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))

Determine data security controls and compliance requirements

Module 3: Security Architecture and Engineering

Research, implement and manage engineering processes using secure design principles

Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula)

Select controls based upon systems security requirements

Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)

Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements

Select and determine cryptographic solutions

Understand methods of cryptanalytic attacks

Apply security principles to site and facility design

Design site and facility security controls

Module 4: Communication and Network Security

Assess and implement secure design principles in network architectures

Secure network components

Implement secure communication channels according to design

Module 5: Identity and Access Management (IAM)

Control physical and logical access to assets

Manage identification and authentication of people, devices, and services

Federated identity with a third-party service

Implement and manage authorization mechanisms

Manage the identity and access provisioning lifecycle

Module 6: Security Assessment and Testing

Design and validate assessment, test, and audit strategies

Conduct security control testing

Collect security process data (e.g., technical and administrative)

Analyze test output and generate report

Conduct or facilitate security audits

Module 7: Security Operations

Understand and comply with investigations

Conduct logging and monitoring activities

Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)

Apply foundational security operations concepts

Apply resource protection

Conduct incident management

Operate and maintain detective and preventative measures

Implement and support patch and vulnerability management

Understand and participate in change management processes

Implement recovery strategies

Implement Disaster Recovery (DR) processes

Test Disaster Recovery Plans (DRP)

Participate in Business Continuity (BC) planning and exercises

Implement and manage physical security

Address personnel safety and security concerns

Module 8: Software Development Security

Understand and integrate security in the Software Development Life Cycle (SDLC)

Identify and apply security controls in software development ecosystems

Assess the effectiveness of software security

Assess security impact of acquired software

Define and apply secure coding guidelines and standards

Other courses offered by Koenig Solutions

1.02 L
1 day
Intermediate
74.5 K
40 hours
Intermediate
80 K
4 hours
Intermediate
View Other 43 CoursesRight Arrow Icon
qna

Certified Information Systems Security Professional (CISSP)
 at 
Koenig Solutions 

Student Forum

chatAnything you would want to ask experts?
Write here...

Certified Information Systems Security Professional (CISSP)
 at 
Koenig Solutions 
Contact Information

Address

Koenig Solutions Pvt Ltd, Plot # 22, IT Park,Sahashdhara Road, Dehradun, (India)
Dehradun ( Uttarakhand)

Go to College Website ->