CISSP, a vendor-neutral cybersecurity credential, shows you have the knowledge to design, implement and manage a best-in-class cybersecurity program in any environment. Vendor-neutral credentials are sought by organizations to avoid the limitations and expense of vendor lock-in.
The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the information security market. CISSP validates an information security professional’s deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization.
To apply for the CISSP® course certification, you need to: Have a minimum 5 years of cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)² CISSP® Common Body of Knowledge (CBK) One-year experience waiver can be earned with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list.
Live Instructor Led Coaching Sessions : Via Zoom or Face to Face at Specific Locations. Lifetime E Learning Access: Enjoy unlimited access to all course Videos, including future updates, Along with Live Instructor Guided Workshops. Comprehensive Curriculum: From beginner to advanced topics, master every aspect . Community Engagement: Join a network of learners and professionals to share insights and collaborate.
1.1 Understand, adhere to, and promote professional ethics 1.2 Understand and apply security concepts 1.3 Evaluate and apply security governance principles 1.4 Understand legal, regulatory, and compliance issues that pertain to information security in a holistic context 1.6 Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards) 1.7 Identify, analyze, assess, prioritize, and implement Business Continuity (BC) requirements
1.8 Contribute to and enforce personnel security policies and procedures 1.9 Understand and apply risk management concepts
1.10 Understand and apply threat modeling concepts and methodologies
1.11 Apply Supply Chain Risk Management (SCRM) concepts
1.12 Establish and maintain a security awareness, education, and training program
Module 2: Asset Security
2.1 Identify and classify information and assets 2.2 Establish information and asset handling requirements 2.3 Provision information and assets securely 2.4 Manage data lifecycle 2.5 Ensure appropriate asset retention (e.g., End of Life (EOL), End of Support) 2.6 Determine data security controls and compliance requirements
Module 3: Security Architecture and Engineering
3.1 Research, implement and manage engineering processes using secure design principles 3.2 Understand the fundamental concepts of security models 3.3 Select controls based upon systems security requirements 3.4 Understand security capabilities of Information Systems (IS) 3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements 3.6 Select and determine cryptographic solutions. 3.7 Understand methods of cryptanalytic attacks 3.8 Apply security principles to site and facility design
3.9 Design site and facility security controls
3.10 Manage the information system lifecycle
Module 4: Communication and Network Security
4.1 Apply secure design principles in network architectures 4.2 Secure network components 4.3 Implement secure communication channels according to design
Module 5: Identity and Access Management
5.1 Control physical and logical access to assets 5.2 Design identification and authentication strategy 5.3 Federated identity with a third-party service 5.4 Implement and manage authorization mechanisms 5.5 Manage the identity and access provisioning lifecycle 5.6 Implement authentication systems
Module 6: Security Assessment and Testing
6.1 Design and validate assessment, test, and audit strategies 6.2 Conduct security control testing 6.3 Collect security process data 6.4 Analyze test output and generate report 6.5 Conduct or facilitate security audits
Module 7: Security Operations
7.1 Understand and comply with investigations 7.2 Conduct logging and monitoring activities 7.3 Perform Configuration Management (CM) 7.4 Apply foundational security operations concepts 7.5 Apply resource protection 7.7 Operate and maintain detection and preventative measures 7.8 Implement and support patch and vulnerability management 7.9 Understand and participate in change management processes 7.10 Implement recovery strategies 7.11 Implement Disaster Recovery (DR) processes 7.12 Test Disaster Recovery Plans (DRP) 7.13 Participate in Business Continuity (BC) planning and exercises 7.14 Implement and manage physical security 7.15 Address personnel safety and security concerns
Module 8: Software Development Security
8.1 Understand and integrate security in the Software Development Life Cycle (SDLC) 8.2 Identify and apply security controls in software development ecosystems 8.3 Assess the effectiveness of software security 8.4 Assess security impact of acquired software 8.5 Define and apply secure coding guidelines and standards