CISSP

CISSP

About The Course Course Topic Overview and Description: The CISSP training course is intended for security professionals who have at least 5 years of recent full-time work experience in 2 or more of the 8 domains of the CISSP CBK (Common Body of Knowledge). CISSP Domains: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security   The course is for 5 days. Various instructional methods will be used to teach the objectives mentioned above. The training method would be completely interactive and participative. Students will receive course materials which will be discussed during class. Related Certification: CISSP – Certified Information Systems Security Professional  Who Should Attend: Participants who have some IT Security Knowledge and/or experience in IT Security field. Also, for those who are preparing for a CISSP certification in Information Security. Related Job Functions: Security Consultant Security Analyst Security Manager IT Director Chief Information Security Officer Course Delivery: The course will be delivered using formal lectures combined with questions based on the topics. The class will be conducted both online and in-person. 

    

Day 1

  • Course Overview
  • CIA Concepts
  • Policies
  • Risk
  • Control Types
  • Security Awareness Training
  • Ethical Hacking

Day 2

  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Fire
  • Physical Security
  • Electric Power
  • OSI Lower Layers
  • OSI Upper Layers
  • Firewalls

Day 3

  • VPNs
  • Attacks
  • Authentication Concepts
  • Multifactor Authentication
  • Centralized Management
  • SSO and Security Threats
  • Computing System Evaluations

Day 4

  • Security Model Details
  • Availability and Integrity Design
  • IDS and IPS
  • Controls for Operational Security
  • Separation of Duties
  • Backups and Media
  • DR and BC

Day 5

  • Malware
  • Evidence
  • Laws and Liability
  • Incident Response
  • System and Software Security
  • Virtualization and Cloud
  • 2700x
  • Federated Identities
  • Monitoring 
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech