CISSP Certification Training Course
- Offered bySimplilearn
- Private Institute
- Estd. 2010
CISSP Certification Training Course at Simplilearn Overview
Duration | 31 hours |
Mode of learning | Online |
Difficulty level | Intermediate |
Official Website | Go to Website |
Credential | Certificate |
CISSP Certification Training Course at Simplilearn Highlights
- 24x7 online support
- A great course for learning cissp
- Certification Course
CISSP Certification Training Course at Simplilearn Course details
- Security Consultant/Manager
- IT Director/Manager
- Security Auditor/Architect
- Security Systems Engineer
- Chief Information Security Officer
- Network Architect
- Security and risk management
- Asset security Security architecture and design
- Cryptography OSI and TCPIP models
- IP addresses
- Network security
- Identity and access management
- Security assessment and testing
- Software development security
- Certified Information Systems Security Professional (CISSP) training facilitates the learning and knowledge in designing, building, and maintaining a secure business environment using globally approved Information Security standards. The aim of the course is to develop expertise in architecture, and design of security and earn the 30 CPEs required for the CISSP certification exam. IT Security professionals such as Security Consultants and Managers, IT Directors and Managers, and Security Auditors and Architects are best suited for this course enhancing their skills and knowledge on business continuity planning & disaster recovery planning vital for the smooth running of any organization
CISSP Certification Training Course at Simplilearn Curriculum
Course Introduction
CISSP Course Introduction
Domain One: Security and Risk Management
Introduction
Introduction to Security and Risk Management
Understand, Adhere to, and Promote Professional Ethics
Domain Two: Asset Security
Introduction
Introduction to Asset Security
Identify and Classify Information and Assets
Domain Three: Security Architecture and Engineering
Introduction
Introduction to Security Engineering
Research, Implement, and Manage Engineering Processes Using
Introduction
Introduction to Communications and Network Security
Assess and Implement Secure Design Principles
Physical Layer and Data Link Layer
Identity and Access Management (IAM)
Introduction
Introduction to Identity and Access Management (IAM)
Control Physical and Logical Access to Assets
Security Assessment and Testing
Introduction
Introduction to Security Assessment and Testing
Design and Validate Assessment, Test, and Audit Strategies
Security Operations
Introduction
Introduction to Security Operations
Understand and Comply with Investigations
Software Development Security
Introduction
Introduction to Software Development Security
Integrate Security in the Software Development Life Cycle