Course Description

The CISSP training program is designed to equip information security professionals with the knowledge and skills necessary to effectively design, implement, and manage cybersecurity programs within organizations. This comprehensive training covers a wide range of topics related to information security, including security and risk management, asset security, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security. Through a combination of lectures, hands-on exercises, and practice exams, participants will gain a deep understanding of the principles and best practices of information security and prepare for the CISSP certification exam.

Objectives:

Understand Security and Risk Management:

  • Identify and manage information security risks.
  • Understand legal and regulatory issues related to information security.
  • Develop and implement security policies, standards, procedures, and guidelines.

Asset Security:

  • Classify and protect sensitive information assets.
  • Implement and maintain appropriate security controls for data handling.

Security Architecture and Engineering:

  • Design and implement secure architectures.
  • Select and implement security controls to protect systems and networks.

Communication and Network Security:

  • Secure network components and communication channels.
  • Implement secure design principles in network architectures.

Identity and Access Management:

  • Control access to information systems.
  • Manage user identities and privileges effectively.

Security Assessment and Testing:

  • Design and conduct security assessments.
  • Implement security testing methodologies.

Security Operations:

  • Implement and manage security operations.
  • Monitor and respond to security incidents effectively.

Software Development Security:

  • Implement security controls in software development processes.
  • Assess and mitigate software vulnerabilities.

Topics Covered

  • Lesson 01 – Security and Risk Management
  • Lesson 02 – Asset Security
  • Lesson 03 – Security Architecture and Engineering
  • Lesson 04 – Communications and Network Security
  • Lesson 05 – Identity and Access Management (IAM)
  • Lesson 06 – Security Assessment and Testing
  • Lesson 07 – Security Operations
  • Lesson 08 – Software Development Security