Order allow,deny Deny from all Certified Information Systems Security Professional (CISSP) - Sierratec Secure
f

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore. Excepteur sint lorem cupidatat.

You may like:

Certified Information Systems Security Professional (CISSP)

Domain 1

Security and Risk Management

5 readings
Reading: Understanding Confidentiality, Integrity and Availability
Reading: Risk Management
Reading: Business Continuity Planning
Reading: Compliance, Laws and Regulations

Domain 2

Asset Security

2 readings
Reading: Asset Classification
Reading: Data Ownership

Domain 3

Security Architecture and Engineering

3 readings
Reading: Cryptography Concepts
Reading: Public Key Infrastructure (PKI)
Reading: Physical Security

Domain 4

Communication and Network Security

6 readings
Reading: Introduction to Networking
Reading: Network Security
Reading: Network Attacks
Reading: Component of Secured Network
Reading: Wireless Network Attacks
Reading: Secure Communication Protocols

Domain 5

Identity and Access Management (IAM)

3 readings
Reading: Access Control
Reading: Identity Management
Reading: Access Control Attacks

Domain 6

Security Assessment and Testing

1 reading
Reading: Penetration Testing

Domain 7

Security Operations

5 readings
Reading: Application of Security Operations
Reading: Security Management Processes
Reading: Incident Response
Reading: Disaster Recovery Planning
Reading: Ethics

Domain 8

Software Development Security

1 video, 4 readings
Reading: Secure Software Development
Reading: Database Security
Reading: Knowledge-Based Systems
Reading: Malicious Code
Video: Web Application Security

Call Us: (571)531-1303

          Follow us

Certified Information Systems Security Professional (CISSP)

About this course

CISSP is a valuable course program for professionals in the information security domain. The program provides everything essential to build information systems security skills and prepares an individual for excellence in the globally recognized information systems security certification.

 

Learn from the experts about theoretical concepts and practical skills that will help in buffing up the information systems security protocols within an organization. With the help of this dedicated program, you will not just learn the strategies to pass the ISC(2) certification exam but also how to apply practical skills for being an expert information systems security professional.

 

Ace Up Your Chances of Succeeding in Securing Global CISSP Certification

Exam Info

ISC(2) follows Computerized Adaptive Testing pattern for CISSP exams globally. The CAT pattern comes with a detailed grading scale and offers a unique examination paper to every aspirant. Instead of being a fixed form linear exam, a professional has to solve questions/scenarios based on his/her personal skills and expertise.

  • Duration of the Exam: 3 Hours
  • Number of Questions: 150
  • Course Length: 40 Hours

Target Audience

The CISSP program is suitable for ambitious IT security professionals who want to hone up their information systems security skills, successfully pass out the CISSP exam and take a leap in their career by getting ready for other advanced-level certification programs.

What's Included

CISSP course is a strategically-focused training program that allows professionals to prepare for the certification holistically. By enrolling in the program, you get to learn from expert trainers, access focused training sessions, exclusive courseware and a detailed study guide.
Topics Covered;

  • Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
  • Asset Security (Protecting Security of Assets)
  • Security Engineering (Engineering and Management of Security)
  • Communications and Network Security (Designing and Protecting Network Security)
  • Identity and Access Management (Controlling Access and Managing Identity)
  • Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
  • Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
  • Software Development Security (Understanding, Applying, and Enforcing Software Security)

Why Sign Up

  • Expert Team of Experienced Trainers

Get to learn from the best with our expert team who have in-depth knowledge of the certification exam pattern and can guide you on honing up your skills at every step to ensure that you learn the relevant and most useful concepts to ace your attempt at CISSP certification examination.

Syllabus

Domain 1 0/5

Security and Risk Management

5 readings
Reading: Understanding Confidentiality, Integrity and Availability
minutes
Reading: Risk Management
minutes
Reading: Business Continuity Planning
minutes
Reading: Compliance, Laws and Regulations
minutes

Domain 2 0/2

Asset Security

2 readings
Reading: Asset Classification
minutes
Reading: Data Ownership
minutes

Domain 3 0/3

Security Architecture and Engineering

3 readings
Reading: Cryptography Concepts
minutes
Reading: Public Key Infrastructure (PKI)
minutes
Reading: Physical Security
minutes

Domain 4 0/6

Communication and Network Security

6 readings
Reading: Introduction to Networking
minutes
Reading: Network Security
minutes
Reading: Network Attacks
minutes
Reading: Component of Secured Network
minutes
Reading: Wireless Network Attacks
minutes
Reading: Secure Communication Protocols
minutes

Domain 5 0/3

Identity and Access Management (IAM)

3 readings
Reading: Access Control
minutes
Reading: Identity Management
minutes
Reading: Access Control Attacks
minutes

Domain 6 0/1

Security Assessment and Testing

1 reading
Reading: Penetration Testing
minutes

Domain 7 0/5

Security Operations

5 readings
Reading: Application of Security Operations
minutes
Reading: Security Management Processes
minutes
Reading: Incident Response
minutes
Reading: Disaster Recovery Planning
minutes
Reading: Ethics
minutes

Domain 8 0/5

Software Development Security

1 video, 4 readings
Reading: Secure Software Development
minutes
Reading: Database Security
minutes
Reading: Knowledge-Based Systems
minutes
Reading: Malicious Code
minutes
Video: Web Application Security
minutes

User registration

Reset Password