- Sun, Jan 14, 2018 07:30 PM
Latitude: 35.6688, Longitude: 139.743
Ask us how you can save $100 off the ticketed price Video Conference Details Will be sent to you once you register and make the payment Next class starting Devember 16, 2017 Training Session Details There will be 8 online sessions, each session being of 2.5 hours. Every session will have presentation about theory, concepts and technology, followed by Hands-on Lab practice exercises. Training Dates Begins December 16, taught over 5 weekends ending Januray 14, 2018 Sat and Sun 6:30 AM - 10:30 AM (US Pacific Time) Class dates: December 16,17,23,24,30,31,January 6,7,13,14, 2018 Each session will be recorded and the recordings will be shared after each session with students. About this course CISSP training Course (Certified Information Systems Security Professional) is the essential credential for a security professional to validate their competencies and skill set to deploy a diverse information security infrastructure for protecting the organization from potential cybersecurity hazards. The course has been sponsored by (ISC)2, one of world’s leading non-profit organization for providing healthy aids to the field of information security. The certification qualifies a candidate to effectively create, implement and evaluate the cybersecurity tools and technologies used to facilitate the healthy transfer of information across a diverse work environment. The CISSP has been the first credential in the field of information security to meet the stern requirements of ISO/IEC Standard 17024. Who should attend? The CISSP training Course is ideal for those working with the profiles of: Security Systems Engineer Security Consultants/Analysts Security/Network Architect Security Auditor/Manager Prerequisites The candidates must meet the following requirements before taking the CISSP training course:Have a minimum of five years of direct full-time security professional work experience in the below-mentioned domains: Access Control Cryptography Application Development Security Operations Security Information Security Governance and Risk Management Legal, Regulations, Investigations and Compliance Business Continuity and Disaster Recovery Planning Course Outline The CISSP CBK consists of the following eight domains: 1. Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity) Legal and regulatory issues Confidentiality, integrity, and availability concepts Security governance principles Compliance Professional ethics Business continuity requirements Personnel security policies Threat modeling Risk considerations Security education, training, and awareness Security policies, standards, procedures and guidelines 2. Asset Security (Protecting Security of Assets) Protect privacy Information and asset classification Ownership (e.g. data owners, system owners) Data security controls Appropriate retention Handling requirements 3. Security Engineering (Engineering and Management of Security) Security evaluation models Security models fundamental concepts Security architectures, designs, and solution elements vulnerabilities Security capabilities of information systems Engineering processes using secure design principles Web-based systems vulnerabilities Mobile systems vulnerabilities Cryptography Embedded devices and cyber-physical systems vulnerabilities Site and facility design secure principles Physical security 4. Communication and Network Security Secure network architecture design Secure communication channels Secure network components Network attacks 5. Identity and Access Management (Controlling Access and Managing Identity) Access control attacks Physical and logical assets control Identity as a service (e.g. cloud identity) Identification and authentication of people and devices Identity and access provisioning lifecycle (e.g. provisioning review) Third-party identity services (e.g. on-premise) 6. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) Test outputs (e.g. automated, manual) Security process data (e.g. management and operational controls) Security architectures vulnerabilities Security control testing Assessment and test strategies 7. Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery) Logging and monitoring activities Investigations support and requirements Incident management Provisioning of resources Foundational security operations concepts Recovery strategies Resource protection techniques Physical security Preventative measures Patch and vulnerability management Change management processes Business continuity planning and exercises Personnel safety concerns Disaster recovery processes and plans 8. Software Development Security (Understanding, Applying, and Enforcing Software Security) Development environment security controls Security in the software development lifecycle Acquired software security impact Software security effectiveness FAQ What is the CISSP Certification Process? We follow a distinct certification process for CISSP that will help you to face the challenges of the IT world. Hence, you are required to follow the below listed pointers to earn your CISSP certification – You need to attend one complete batch of CISSP You are then required to enroll yourself for the CISSP exam You need to complete the CISSP exam with minimum passing score of 700 out of 1000 points What is the value of the CISSP certification? CISSP certification is meant for the next generation of Information Security Leaders therefore it carries immense value. It is an ideal credential for those with proven deep managerial and technical competence, experience, skills and credibility to engineer, design, manage and implement their overall information security program. What is the intended audience for CISSP? CISSP training and certification is fit for the following profiles - Security Consultant Security Manager IT Director/Manager Security Auditor Security Architect Security Analyst Security Systems Engineer Chief Information Security Officer Director of Security Network Architect What are the career opportunities after doing CISSP? After attaining CISSP training and certification you can work as - Information Security Manager Information Security Analyst Security Consultant (Computing / Networking / Information Technology) Senior Security Consultant Security Architect - IT Chief Information Security Officer Information Security Specialist What is the best method to study for the CISSP? Enroll for the CISSP training and explore all the following 8 domains of the CISSP Common Body of Knowledge (CBK) to prepare and pass the CISSP exam: Security and Risk Management Asset Security Security Engineering Communications and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security What all will I get as part of the training? You will receive the following after enrolling for CISSP training and certification - Training Delivery Courseware Mock Sessions Course Completion Certificate Is exam fee included in the course fee? No, CISSP certification exam fee is not included in the training cost. What is the format of CISSP exam? In the CISSP exam, question format of multiple choice and advanced innovative is followed. Class Size: Maximum 22 Price: $999 Refund Policy 1. There will be no refunds.2. If a class is not taken for any reason, rescheduled or cancelled, purchase price can be applied toward any published future class of equal or lesser value.