MWEDUS.COM

Certified Information Systems Security Professional (CISSP)

COURSE OVERVIEW

In the information security industry, the most widely recognized qualification is the Certified Information Systems Security Professional (CISSP). A thorough assessment of the information needed to plan, implement, and oversee an organization’s total security posture is given during CISSP training.The Certified Information Security Professional (CISSP) credential verifies an information security professional’s extensive technical and administrative expertise in designing, developing, and overseeing an organization’s comprehensive security posture.

 

 

The CISSP Common Body of Knowledge (CBK) covers a wide range of topics, making it applicable to all information security-related professions. Successful candidates are proficient in the following eight domains:

 

  • Risk and Security
  • Security of Assets
  • Architecture and Engineering for Security
  • Network security and communication
  • Management of Identity and Access (IAM)
  • Software Development Security
  • Security Operations
  • Security Assessment and Testing

TARGET AUDIENCE

  • Who Should Attend: Those who work in positions like but not limited to: – are the best candidates for this course.

     

    • Consultant for Security
    • Manager of Security
    • Manager/Director of IT
    • Auditor for Security
    • Architect for Security
    • Analyst for Security
    • Engineer for Security Systems
    • Head of the Department of Information Security
    • Network Architect, Security Director

Course Objectives

Following completion of this course, the learner will be qualified to:

 

  • Recognize and put into practice basic ideas and techniques in the fields of security and information technology. 

 

  • Align security functions and implementations with the overarching operational goals of the organization.

 

  • Recognize how to safeguard the organization’s assets throughout their existence.

 

  • Recognize the ideas, rules, frameworks, and standards that are utilized in the development, implementation, monitoring, and security of operating systems, hardware, networks, and applications, as well as the controls that are in place to impose different levels of availability, integrity, and confidentiality.

 

  • Apply security design concepts and suitable security control mitigations for vulnerabilities found in common information system kinds and architectures to implement system security.

 

  • Recognize the value of cryptography and the security benefits it offers in the current digital and information era.

 

  • Recognize how physical security components affect the security of information systems, and use secure design principles to assess or suggest suitable physical security measures.

 

  • Comprehend the components of communication and network security in addition to receiving detailed explanation of the operation of the communication and network systems.

 

  • Enumerate the ideas and architecture that specify the related technology, implementation systems, and protocols at layers 1 through 7 of the Open Systems Interconnection (OSI) model.

 

  • Determine the standard terminology used for implementing logical and physical access controls in environments according to their security procedure.

 

  • Evaluate several methods of access control to ensure that corporate security needs are met.

 

  • Identify the main techniques used to create and validate audit and test plans that meet company needs.

 

  • Applying and deploying the proper security controls and countermeasures will improve and maximize an organization’s operational function and capacity.

 

  • Determine the risks associated with an organization’s operational activities and evaluate particular threats, weaknesses, and controls.

 

  • Recognize how to apply security to the System Lifecycle (SLC) and Software Development Lifecycle (SDLC); determine whether security control or controls are suitable for the environment being developed; and evaluate how well software security works.

Course Prerequisites

Applicants must possess a minimum of five years of combined paid work experience in at least two of the CISSP CBK’s eight domains.One year of the requisite experience can be fulfilled by obtaining a four-year college degree, its regional equivalent, or an extra certificate from the (ISC) recognized list. Only one year of experience will be satisfied by education credit.

 

By passing the CISSP exam, a candidate who lacks the necessary experience to become a CISSP can nonetheless become an Associate of (ISC). After that, the Associate of (ISC) will have six years to obtain the necessary five years of experience. Certifications/CISSP/experience-requirements to find out more about the CISSP experience requirements, including how to account for internships and part-time employment.

COURSE OUTLINE

Domain 1: Risk Assessment and Security

 

Domain 2: Security of Assets

 

Domain 3: Engineering and Architecture for Security

 

Domain 4: Security of Networks and Communication

 

Domain 5: IAM stands for Identity and Access Management.

 

Domain 6: Evaluation and Testing of Security

 

Domain 7: Operations related to security

 

Domain 8: Security of Software Development

Get in Touch

Meet our teachers and know how to fast-track your enrollment.