• LOGIN
  • No products in the cart.

Become a certified CISSP professional

The Certified Information Systems Security Professional (CISSP) is considered to be a prestigious certification in Information Security field. The training will take you to the next designation of information assurance professional who defines all aspects of IT security that includes architecture, design, management, and controls. This certification is most demanded by the IT professionals today.

Why take CISSP training course?

CISSP certificate is one of the most respected certificates in the world when it comes to IT security. In today’s time where IT security has become the most pressing challenge for corporates, the demand for CISSP certified security professionals is increasing very rapidly. For anyone interested in making an excellent and lucrative career in the field of IT security then CISSP certificate is a must.

CISSP Training Syllabus

  • Security and Risk Management, Aligning security and risk to organizational objectives, Applying risk management concepts, Preserving the business, Investigating legal measures and techniques
  • Security Engineering, Examining security models and frameworks, Exploring system and component security concepts, Protecting information by applying cryptography, Safeguarding physical resources
  • Asset Security, Identifying, categorizing and prioritizing assets
  • Communication and Network Security, Defining a secure network architecture, Examining secure networks and components
  • Identity and Access Management, Controlling access to protect assets
  • Security Assessment and Testing, Designing and conducting security assessment strategies, Conducting logging and monitoring activities
  • Security Operations, Maintaining operational resilience, Developing a recovery strategy
  • Software Development Security, Securing the software development life cycle

Who can go for CISSP training course?

  • Security Managers
  • Security Consultants
  • Security Architects
  • Security Systems Engineers
  • Network Architects
  • Chief Information Officers

Aligning security and risk to organizational objectives

  • Employing confidentiality, integrity, and availability security principles
  • Managing security policies, standards and procedures
  • Applying compliance

Applying risk management concepts

  • Assessing threats and vulnerabilities
  • Performing risk analysis and control
  • Defining qualitative and quantitative analysis

Preserving the business

  • Adhering to Business Continuity Management Code of Practice and Specifications
  • Performing a business impact analysis

Investigating legal measures and techniques

  • Reviewing intellectual property, liability and law, and compliance
  • Differentiating traditional and computer crime
  • Addressing ethical behavior and compliance

Examining security models and frameworks

  • The Information Security Triad and multi-level models
  • Investigating industry standards: ISO 27001/27002
  • Evaluating security model fundamental concepts

Exploring system and component security concepts

  • System design principles, capabilities, and limitations
  • Certification and accreditation criteria and models
  • Reviewing mobile systems vulnerabilities

Protecting information by applying cryptography

  • Detailing symmetric and asymmetric encryption systems
  • Ensuring message integrity through hashing
  • Uncovering threats to cryptographic systems

Safeguarding physical resources

  • Designing environments to resist hostile acts and threats
  • Denying unauthorized access

Identifying, categorizing and prioritizing assets

  • Applying security controls and asset classification
  • Protecting data through proper handling, markings, labeling, and storage
  • Addressing PII, privacy, and appropriate retention

Defining a secure network architecture

  • TCP/IP and other protocol models
  • Protecting from network attacks
  • Reviewing secure network components and communication channels

Examining secure networks and components

  • Identifying wired and wireless technologies
  • Implementing firewalls, secure communications, proxies, and tunnels

Controlling access to protect assets

  • Defining administrative, technical and physical controls
  • Implementing centralized and decentralized approaches
  • Investigating biometric and multi-factor authentication
  • Identifying common threats
  • Reviewing cloud services and architecture

Designing and conducting security assessment strategies

  • Leveraging the role of testing and auditing to analyze the effectiveness of security controls
  • Differentiating detection and protection systems

Conducting logging and monitoring activities

  • Distinguishing between the roles of internal and external audits
  • Defining secure account management

Maintaining operational resilience

  • Managing security services effectively
  • Leveraging and supporting investigations and incident response
  • Differentiating detection and protection systems
  • Implementing logging and monitoring

Developing a recovery strategy

  • Designing a disaster recovery plan
  • Implementing test and maintenance processes
  • Provisioning of resources

Securing the software development life cycle

  • Applying software development methods and security controls
  • Highlighting threats: Cross-Site Scripting (XSS), XCRF, JavaScript attacks, and Buffer Overflow
  • Addressing database security concepts and issues
  • Reviewing software security effectiveness and security impact

The duration of course is 48 hours and it will be completed within 8 weeks.

  • Security Managers
  • Security Consultants
  • Security Architects
  • Security Systems Engineers
  • Network Architects
  • Chief Information Officers

Yes, you will get lifetime access to LMS portal.

On successful completion of all modules and clearing the evaluation process, participants will receive a ‘Certificate of Completion’.

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE
  • $599.00
  • 10 Hours
65874 STUDENTS ENROLLED

    Enroll Now

    Course Features

    We provide 48 hours of live online training.

    It would be live & interactive online session with Industry expert Instructor.

    Expert technical team available for query resolution.

    We provide lifetime Learning Management System (LMS) access which you can access from across the globe.

    We strive to offer the Best Price to our customers with the guarantee of quality service levels.

    Post completion of the course, you will appear for assessment from Collabera TACT. Once you get through, will be awarded with a course completion certificate.

    Drop us a query

    Collabera TACT, 25 Airport Road,Morristown, New Jersey 07960 Phone: (973)-598-3969 Email: join@collaberatact.com

    COPYRIGHT© 2018 Collabera, All Rights Reserved.
    Course of the Month – Artificial Intelligence ‘Up-Skill with 60% benefit’ -  Know More
    + +
    X