CISSP Certification Training Course
- Offered bySimplilearn
- Private Institute
- Estd. 2010
CISSP Certification Training Course at Simplilearn Overview
Duration | 1 month |
Total fee | ₹1.74 Lakh |
Mode of learning | Online |
Official Website | Go to Website |
Credential | Certificate |
CISSP Certification Training Course at Simplilearn Highlights
- Earn a certificate after completion of the course
- 100% Money Back Guarantee
- Lifetime access to high-quality self-paced e-learning content curated by industry experts
- 24x7 learner assistance and support
CISSP Certification Training Course at Simplilearn Course details
- For Security consultants/managers, IT directors/managers, security auditors/architects, security system engineers, CIOs, and network architects interested in learning about information technology security professionals.
- Security and risk management
- Asset security Security architecture and design
- Cryptography OSI and TCPIP models
- IP addresses
- Network security
- Identity and access management
- Security assessment and testing
- Software development security
- The CISSP certification training develops your expertise in defining the IT architecture and in designing, building, and maintaining a secure business environment using globally approved information security standards
- The Certified Information Systems Security Professional (CISSP) is a globally recognized certification for information technology security professionals.
- CISSP training covers all areas of IT security so you can become a strong information security professional.
- This Course is also Available in Online Bootcamp with 90 days of flexible access to online classes
- Fee Structure for Online Bootcamp (INR 24,999)
CISSP Certification Training Course at Simplilearn Curriculum
Lesson 01 - Course Introduction
Course Introduction
Lesson 02 - Security and Risk Management
1.01 Security and Risk Management
1.02 Information Security Management
1.03 Security Controls
1.04 Information Security Management and Governance
1.05 Goals, Mission, and Objectives
1.06 Due Care
1.07 Security Policy
1.08 Compliance
1.09 Computer Crimes
1.10 Legal Systems
1.11 Intellectual Property (IP) Law
1.12 Privacy
1.13 General Data Protection Regulation
1.14 Security
1.15 Risk Analysis
1.16 Types of Risk Analysis
1.17 Security Control Assessment
1.18 Threat Modeling
1.19 Supply-Chain Risk Management
1.20 Third-Party Management
1.21 Business Continuity Planning
1.22 Business Continuity Planning Phases
1.23 Managing Personnel Security
1.24 Security Awareness Training
1.25 Program Effectiveness Evaluation
1.26 Key Takeaways
Lesson 03 - Asset Security
2.01 Asset Security
2.02 Information Classification
2.03 Data Classification
2.04 Data Life Cycle
2.05 Data Management
2.06 Different Roles
2.07 Data Remanence
2.08 Privacy
2.09 States of Data
2.10 Data Loss Prevention
2.11 Key Takeaways
Lesson 04 - Security Engineering
3.01 Introduction
3.02 Security Engineering
3.03 Security Architecture
3.04 Security Models
3.05 Evaluation Criteria
3.06 System Security
3.07 CPU
3.08 Memory
3.09 Security Mode
3.10 Cloud Computing
3.11 IOT
3.12 Industrial Control System (ICS)
3.13 Cryptography
3.14 Encryption Methods
3.15 DES
3.16 Asymmetric Cryptography
3.17 Public Key Infrastructure
3.18 Cryptanalysis
3.19 Key Management
3.20 Critical Path Analysis
3.21 Site Location
3.22 Fire
3.23 HVAC
3.24 Key Takeaways
Lesson 05 - Communications and Network Security
4.01 Introduction
4.02 Network Architecture and Design
4.03 IP Addressing
4.04 Network Protocols
4.05 Transmission Media
4.06 Firewall
4.07 Intrusion Detection System and Intrusion Prevention System
4.08 Network Access Control (NAC)
4.09 Content Delivery Network (CDN)
4.10 Networks
4.11 Software-Defined Networking (SDN)
4.12 Remote Access
4.13 Internet Security Protocol (IPsec)
4.14 Voice over Internet Protocol (VoIP)
4.15 Phreaking
4.16 Secure Access Protocols
4.17 Wireless Technologies
4.18 Network Attacks
4.19 Key Takeaways
Lesson 06 - Identity and Access Management
5.01 Identity and Access Management
5.02 Identity and Access Management
5.03 Identity Management
5.04 Biometrics
5.05 Passwords
5.06 Tokens
5.07 Memory Cards and Smart Cards
5.08 Access and Authorization Concepts
5.09 Identity Management Implementation
5.10 Kerberos
5.11 Access Control Types
5.12 Access Control Models
5.13 Access Control Tools and Techniques
5.14 Accountability
5.15 Access Control Monitoring
5.16 Identity Proofing
5.17 Markup Languages
5.18 Identity as a Service (IDaaS)
5.19 Key Takeaways
Lesson 07 - Security Assessment and Testing
6.01 Security Assessment and Testing
6.02 Security Assessment
6.03 Vulnerability Assessment
6.04 Penetration Testing
6.05 Audits
6.06 Log Management
6.07 Synthetic Transaction and Real Transaction
6.08 Testing
6.09 Software Testing
6.10 Interface
6.11 Key Performance Indicators (KPI)
6.12 Key Takeaways
Lesson 08 - Security Operations
7.01 Security Operations
7.02 Investigation
7.03 Forensic Investigation
7.04 Evidence
7.05 Electronic Discovery
7.06 Incident Management
7.07 Security Operations Management
7.08 Identity and Access Management
7.09 Assets
7.10 Malware
7.11 Management
7.12 Recovery and Backup
7.13 Disaster Recovery
7.14 Perimeter Security
7.15 Key Takeaways