Batch of 5 All Batches
  • Batch 1

    Feb 12 - Mar 05 (8 Days)
    • Feb
    • Fri 12
    • Sat 13
    • Fri 19
    • Sat 20
    • Fri 26
    • Sat 27
    • Mar
    • Fri 04
    • Sat 05

    Time (CST)21:30 - 01:30

  • Batch 2

    Feb 15 - Feb 26 (10 Days)
    • Feb
    • Mon 15
    • Tue 16
    • Wed 17
    • Thu 18
    • Fri 19
    • Mon 22
    • Feb
    • Tue 23
    • Wed 24
    • Thu 25
    • Fri 26

    Time (CST)08:30 - 11:30

  • Batch 3 (Weekend Batch)

    Feb 20 - Mar 13 (8 Days)
    • Feb
    • Sat 20
    • Sun 21
    • Sat 27
    • Sun 28
    • Mar
    • Sat 05
    • Sun 06
    • Sat 12
    • Sun 13

    Time (CST)08:00 - 13:00

  • Batch 4

    Mar 21 - Apr 01 (10 Days)
    • Mar
    • Mon 21
    • Tue 22
    • Wed 23
    • Thu 24
    • Fri 25
    • Mon 28
    • Mar
    • Tue 29
    • Wed 30
    • Thu 31
    • Apr
    • Fri 01

    Time (CST)09:30 - 12:30

  • Batch 5 (Weekend Batch)

    Mar 26 - Apr 17 (8 Days)
    • Mar
    • Sat 26
    • Sun 27
    • Apr
    • Sat 02
    • Sun 03
    • Sat 09
    • Sun 10
    • Sat 16
    • Sun 17

    Time (CST)09:00 - 13:00

Can't find convenient schedule? Let us know

Key Features

MONEY BACK GUARANTEE

How this works :

For all refunds, please raise a refund request through the Help and Support section of our website. The mode of reimbursement will be same as the mode of payment used for the enrolment fees.

For Self Placed Learning :

Raise refund request within 7 days of purchase of course. Money back guarantee is void if the participant has accessed more than 50% content.

For Instructor Led Training :

Raise refund request within 7 days of commencement of the first batch you are eligible to attend. Money back guarantee is void if the participant has accessed more than 50% content of an e-learning course or has attended Online Classrooms for more than 1 day.

  • 32 hours of Instructor led Training
  • 32 hours of High Quality E-Learning content
  • 5 Simulation Exams ( 250 Questions each)
  • 8 Domain specific test papers (10 questions each)
  • 30 CPEs/PDUs Offered
  • 98.6% Pass rate

About Course

  • What is this course about?

    CISSP certification training from Simplilearn, aligned to (ISC) ² CBK 2015, ensures you are re-equipped on the best practices in the industry and enables you to ace the exam in the first attempt. The certification helps you develop the expertise in defining the architecture, design, build, and maintain a secure business environment for your organization using the globally approved Information Security standards.

  • What are the Course Objectives?

    By the end of this training you will:
    • Be able to define the architecture, design and manage the security of your organization.
    • Acquire the relevant knowledge and skills required to clear the CISSP certification exam
    • Earn the requisite 30 CPEs/PDUs required to take up the CISSP certification exam
    • Develop a working knowledge of the 8 domains areas as prescribed by CISSP – Common Book of Knowledge 2015.

  • Who should do this course?

    CISSP certification is a globally recognized professional requirement in the IT Security domain. This certification is most suited for:
    • Security Consultant/Manager
    • IT Director/Manager
    • Security Auditor/Architect
    • Security Systems Engineer
    • Chief Information Security Officer
    • Network Architect

Course Preview

    • Domain 00 - Introduction 15:53
      • 1 CISSP®Introduction 2:6
      • 2 Objectives 1:20
      • 3 CISSP® 2:19
      • 4 (ISC)²® 1:58
      • 5 CISSP® Domains 3:47
      • 6 Benefits of CISSP® for Professionals 2:1
      • 7 Benefits of CISSP® for Employers 2:6
      • 8 CISSP® Certification Requirements 1:42
      • 9 CISSP® Certification Requirements (contd.) 1:21
      • 10 CISSP® Certification Requirements (contd.) 1:57
      • 11 CISSP® Certification Requirements (contd.) 2:5
      • 12 CISSP® Examination 3:36
      • 13 CISSP® Examination (contd.) 1:30
      • 14 Conclusion 1:5
    • Domain 01 - Security and Risk Management 129:53
      • 1 Domain 01Security and Risk Management 1:10
      • 2 Objectives 1:32
      • 3 Importance of Information Security and Risk Management 2:3
      • 4 Role and Importance of CIA in ISM 2:7
      • 5 Confidentiality 2:51
      • 6 Integrity 2:32
      • 7 Availability 1:57
      • 8 Information Security 1:33
      • 9 Information Security Management 1:26
      • 10 Information Security Governance 2:6
      • 11 IT Security and Organizational Goals, Mission, and Objectives 1:29
      • 12 Goals, Mission, and Objectives 2:55
      • 13 Aligning Security with Goals, Mission, and Objectives 1:41
      • 14 Business Scenario 2:14
      • 15 Organizational Processes 2:28
      • 16 Auditing 1:21
      • 17 Control Framework 1:40
      • 18 Due Care 1:31
      • 19 Due Diligence 1:28
      • 20 Security Controls 1:49
      • 21 Service Level Agreements 1:58
      • 22 Managing Third - Party Governance 3:23
      • 23 OffshoringPrivacy Requirements and Compliance 2:7
      • 24 Business Scenario 1:52
      • 25 Layers of Responsibility 2:3
      • 26 Security Policies 2:31
      • 27 Types of Security Policies 2:35
      • 28 Security Policy Implementation 3:7
      • 29 Policy Chart 2:8
      • 30 Standards, Guidelines, Procedures, and Baselines 3:7
      • 31 Business Scenario 1:30
      • 32 ComplianceNeed for Compliance 2:23
      • 33 Regulatory Compliance 1:45
      • 34 Compliance 1:39
      • 35 Compliance (contd.) 1:57
      • 36 Compliance (contd.) 1:48
      • 37 Standards/Manuals/Guidelines for Compliance 2:9
      • 38 Computer Crimes 1:27
      • 39 Introduction to Computer Crimes 1:54
      • 40 Categories of Computer Crimes 3:28
      • 41 Business Scenario 1:51
      • 42 Major Legal Systems 1:45
      • 43 Common Law and Civil Law 2:42
      • 44 Customary Law and Religious Law 2:44
      • 45 Mixed Law 1:28
      • 46 Business Scenario 1:36
      • 47 Introduction to Intellectual Property (IP) Law 2:1
      • 48 Types of Intellectual Property (IP) Law 2:51
      • 49 Types of Intellectual Property (IP) Law (contd.) 2:44
      • 50 Types of Intellectual Property (IP) Law (contd.) 1:0
      • 51 Business Scenario 1:39
      • 52 Import or Export Controls and Trans - Border Data Flow 2:10
      • 53 Introduction to Privacy 2:59
      • 54 U.S. Privacy Laws 2:14
      • 55 U.S. Privacy Laws (contd.) 2:21
      • 56 U.S. Guidelines for Managing Privacy 2:41
      • 57 EU Council Directive (Law) on Data Protection 2:18
      • 58 The U.S.-European Union Safe Harbor 3:4
      • 59 Security Definitions 3:40
      • 60 Information Risk Management 2:9
      • 61 Business Scenario 1:54
      • 62 Introduction to Risk Analysis 2:6
      • 63 Goals of Risk Analysis 1:26
      • 64 Risk Analysis Team 1:54
      • 65 Steps for Risk Analysis 1:50
      • 66 Information and Assets Valuation 2:16
      • 67 Risk Analysis Types 1:41
      • 68 Quantitative Risk AnalysisSteps 2:47
      • 69 Quantitative Risk AnalysisProblem 1:39
      • 70 Qualitative Risk Analysis 2:10
      • 71 Delphi Technique 2:4
      • 72 Quantitative vs.Qualitative 1:29
      • 73 Hybrid Analysis 1:45
      • 74 Countermeasure SelectionProblem 1:56
      • 75 Countermeasure SelectionOther Factors 1:57
      • 76 Handling Risk 2:39
      • 77 Business Scenario 1:51
      • 78 Threat Modeling 1:59
      • 79 Need for Business Continuity Planning 1:55
      • 80 Basic ConceptsDisruptive Events 3:26
      • 81 Basic ConceptsBusiness Continuity Planning 1:47
      • 82 Importance of Business Continuity Planning 1:31
      • 83 Business Continuity Planning Phases 1:53
      • 84 BCP/DRP Phase 1Project Initiation and Scoping 3:54
      • 85 BCP/DRP Phase 2Business Impact Analysis (BIA) 2:11
      • 86 BIAGoals 2:20
      • 87 BIASteps 4:32
      • 88 BIA StepsBusiness Unit Level 2:7
      • 89 Maximum Tolerable Downtime (MTD) 2:46
      • 90 Failure and Recovery Metrics 3:52
      • 91 Failure and Recovery Metrics (contd.) 2:46
      • 92 Stages of Failure and Recovery 1:52
      • 93 BCP/DRP Phase 3Identify Preventive Controls 2:19
      • 94 Importance of Managing Personnel Security 1:51
      • 95 Managing Personnel SecurityHiring Practices 1:54
      • 96 Managing Personnel SecurityEmployee Termination 1:47
      • 97 Vendor, Contractors, and Consultant Controls 1:47
      • 98 Best Work Practices 2:44
      • 99 Business Scenario 1:48
      • 100 Importance of Security Awareness Training 1:54
      • 101 Security Awareness Training: Awareness, Training, and Education 2:28
      • 102 Implementation of Security Awareness Training Program 1:38
      • 103 Importance of Content Updates 1:23
      • 104 Importance of Managing Security Function 1:53
      • 105 Best PracticesBudget and Establish Security Metrics 2:28
      • 106 Best PracticesResources and Develop and Implement Strategies 2:23
      • 107 Best PracticesCompleteness and Effectiveness of the Program 1:25
      • 108 Business Scenario 1:44
      • 109 (ISC)² Code of Ethics 3:31
      • 110 Quiz 0:0
      • 111 Summary 1:54
      • 112 Conclusion 1:6
    • Domain 02 - Asset Security 58:55
      • 1 Domain 02Asset Security 1:13
      • 2 Objectives 1:28
      • 3 Importance of Asset Security 1:39
      • 4 Need for Information Classification 2:12
      • 5 Information Classification Objectives 1:56
      • 6 Government or Military Sector Classification 2:33
      • 7 Commercial or Private Sector Classification 2:50
      • 8 Information Classification Criteria 2:52
      • 9 Data Classification Considerations 1:47
      • 10 Role Responsible for Data Classification 1:51
      • 11 Business Scenario 1:37
      • 12 Data Management 1:53
      • 13 Best Practices for Data Management 1:54
      • 14 Data Policy 2:14
      • 15 Data Ownership 1:54
      • 16 Data OwnershipBest Practices 1:45
      • 17 Data Custodians 2:15
      • 18 Data Custodians (contd.) 1:33
      • 19 Data Quality 2:9
      • 20 Data QualityAspects 1:32
      • 21 Data Quality Assurance and Quality Control 1:49
      • 22 Data Documentation 1:44
      • 23 Data Documentation Practices 2:28
      • 24 Data Standards 1:58
      • 25 Data Control Lifecycle 1:33
      • 26 Data Specification and Modeling 1:37
      • 27 Database Maintenance 1:38
      • 28 Data Audit 1:41
      • 29 Data Storage and Archiving 1:59
      • 30 Data Security 1:58
      • 31 Data Access, Sharing, and Dissemination 1:56
      • 32 Data Publishing 1:32
      • 33 Data Handling Requirements 2:25
      • 34 Media Resource Protection 4:32
      • 35 Data Remanence 2:51
      • 36 Business Scenario 1:45
      • 37 Asset Management 2:17
      • 38 Software Licensing 1:45
      • 39 Equipment Lifecycle 1:0
      • 40 Protecting Privacy 2:35
      • 41 Ensuring Appropriate Retention 2:6
      • 42 Data Security Controls 2:36
      • 43 Data in TransitBest Practices 2:11
      • 44 Scoping and Tailoring 1:52
      • 45 Scoping and Tailoring (contd.) 2:2
      • 46 Standards SelectionUS DoD 3:10
      • 47 Standards SelectionInternational Standards 2:45
      • 48 Standards SelectionNational Cyber Security Framework Manual 1:48
      • 49 Standards SelectionCenter for Strategic and International Studies 1:0
      • 50 Standards SelectionCritical Security Controls 2:23
      • 51 Standards SelectionSecurity Content Automation Protocol 2:19
      • 52 Framework for Improving Critical Infrastructure Cybersecurity 2:4
      • 53 Business Scenario 1:38
      • 54 Quiz 0:0
      • 55 Summary 1:44
      • 56 Conclusion 1:7
    • Domain 03 - Security Engineering 169:47
      • 1 Domain 03Security Engineering 1:14
      • 2 Objectives 1:23
      • 3 Security Architecture and Design - Case Study 1:42
      • 4 Security Engineering 1:31
      • 5 Architecture Framework 2:29
      • 6 Zachman Framework 2:11
      • 7 TOGAF 1:45
      • 8 ITIL 2:32
      • 9 Creating a Security Architecture 3:0
      • 10 Enterprise Security Architecture 3:6
      • 11 Common Security Services in ESA 2:29
      • 12 SABSA Framework 1:58
      • 13 SABSA Matrix 5:1
      • 14 Business Scenario 1:41
      • 15 ISO/IEC 27001:2013 Security Standards 2:8
      • 16 ISO/IEC 27002Code of Practice for Information Security Management 2:37
      • 17 Security Models 2:6
      • 18 State Machine Model 1:24
      • 19 Multilevel Security Models 2:7
      • 20 Matrix-Based Model 1:48
      • 21 Non-Interference Model 1:57
      • 22 Information flow model 1:40
      • 23 Examples of Security Models: BellLaPadula Confidentiality Model 3:13
      • 24 Examples of Security Models: Biba Integrity Model 2:26
      • 25 Examples of Security Models: ClarkWilson integrity model 2:13
      • 26 BrewerNash, GrahamDenning, and HarrisonRuzzoUllman models 2:15
      • 27 Business Scenario 1:34
      • 28 Evaluation Criteria 2:4
      • 29 CSEC 3:20
      • 30 Information Technology Security Evaluation Criteria 2:20
      • 31 Common Criteria 2:15
      • 32 Common Criteria Evaluation Process 1:50
      • 33 Common Criteria Levels 2:23
      • 34 Payment Card Industry Data Security Standard 1:51
      • 35 Certification and Accreditation 1:36
      • 36 Certification and Accreditation Standards 2:33
      • 37 SEICMMI 2:49
      • 38 SEICMMI Levels 1:46
      • 39 Business Scenario 2:11
      • 40 System Security Architecture 2:19
      • 41 Mainframes and Other Thin Client Systems 2:40
      • 42 Middleware and Embedded Systems 1:23
      • 43 Pervasive Computing and Mobile Computing Devices 1:15
      • 44 System ComponentsProcessors 2:8
      • 45 System ComponentsMemory 1:51
      • 46 System ComponentsStorage 1:17
      • 47 System ComponentsTrusted Computing Base (TCB) 1:23
      • 48 System ComponentsReference Monitor 1:29
      • 49 System ComponentsTrusted Platform Module (TPM) 1:38
      • 50 System ComponentsPeripherals and Other Input/Output Devices 1:42
      • 51 System ComponentsOperating System 1:40
      • 52 System ComponentsRing Model 1:34
      • 53 System ComponentsSystem Kernel 1:54
      • 54 Distributed Systems 1:34
      • 55 Virtualization 1:28
      • 56 Hypervisor 1:45
      • 57 Cloud Computing 1:10
      • 58 Service models 2:15
      • 59 Grid Computing 1:12
      • 60 Peer to Peer Networking (P2P) 1:20
      • 61 Business Scenario 1:56
      • 62 Security Threats and Countermeasures 1:22
      • 63 Assessing and Mitigating Vulnerabilities and Threats 2:30
      • 64 Assessing and Mitigating Vulnerabilities and Threats (contd.) 1:54
      • 65 Assessing and Mitigating Vulnerabilities and Threats (contd.) 2:5
      • 66 Best Practices 1:45
      • 67 Best Practices (contd.) 1:30
      • 68 Best PracticesTechniques and Technologies 1:59
      • 69 Best PracticesTechniques and Technologies (contd.) 1:30
      • 70 Best PracticesTechniques and Technologies (contd.) 1:24
      • 71 Best PracticesTechniques and Technologies (contd.) 1:37
      • 72 Best PracticesTechniques and Technologies (contd.) 1:42
      • 73 Introduction to Cryptography 3:40
      • 74 Cryptographic Lifecycle 1:56
      • 75 Algorithm or Protocol Governance 1:52
      • 76 Cryptography Terms 3:45
      • 77 Strength of a Cryptosystem 2:29
      • 78 Cryptography MethodsSubstitution Cipher 2:31
      • 79 Cryptography MethodsTransposition Cipher 1:24
      • 80 Cryptography MethodsBook or Running Key Cipher 2:9
      • 81 Cryptography MethodsConcealment Cipher 1:43
      • 82 Cryptography MethodsSteganography and DRM 2:19
      • 83 Business Scenario 1:36
      • 84 Introduction to Symmetric Cryptography 3:1
      • 85 Symmetric Key Ciphers 2:16
      • 86 Block Cipher 1:47
      • 87 Stream Cipher 3:2
      • 88 Block Cipher Designs 1:41
      • 89 Data Encryption Standard (DES) 2:33
      • 90 DES Algorithm 2:35
      • 91 DES Operation ModesElectronic Code Book 2:1
      • 92 DES Operation ModesCipher Block Chaining 2:7
      • 93 DES Operation ModesCipher Feed Back 2:22
      • 94 DES Operation ModesOutput Feed Back 1:44
      • 95 DES Operation ModesCounter 2:1
      • 96 Triple DES 2:46
      • 97 Advanced Encryption Standard (AES) 2:17
      • 98 AES Algorithm 1:14
      • 99 AES AlgorithmKey Expansion and Initial Round 1:15
      • 100 Advanced Encryption Standard (AES) AlgorithmRounds 3:1
      • 101 AES AlgorithmFinal Round 1:8
      • 102 Other Symmetric Systems 2:54
      • 103 Other Symmetric Systems (contd.) 2:11
      • 104 Business Scenario 1:43
      • 105 Introduction to Asymmetric Cryptography 3:7
      • 106 Introduction to Asymmetric CryptographyDiagram 1:9
      • 107 Introduction to RSA Algorithm 1:54
      • 108 RSA Algorithm Process 2:20
      • 109 Other Types of Asymmetric CryptographyElliptic Curve Cryptosystems 2:2
      • 110 Other Types of Asymmetric CryptographyDiffie-Hellman Key Exchange 1:35
      • 111 Public Key Cryptography 2:25
      • 112 Symmetric vs. Asymmetric Cryptography 3:45
      • 113 Advantages and Disadvantages 1:54
      • 114 Introduction to Public Key Infrastructure 3:15
      • 115 PKI Certification 2:48
      • 116 PKI Certification (contd.) 1:33
      • 117 PKI StepsPart 1 1:44
      • 118 PKI StepsPart 2 1:58
      • 119 One-Way Hash 2:13
      • 120 Hashing Algorithms 3:9
      • 121 Hashing Algorithms (contd.) 2:41
      • 122 Salting 1:34
      • 123 Message Authentication Code (MAC) 2:50
      • 124 Digital Signatures 2:15
      • 125 Key Management 2:30
      • 126 Key Management Principles 2:50
      • 127 Escrowed Encryption 3:44
      • 128 Business Scenario 1:58
      • 129 Need for Physical and Environmental Security 2:50
      • 130 Business Scenario 2:2
      • 131 Site and Facility Design Criteria 3:27
      • 132 Information Protection Environment 1:53
      • 133 Crime Prevention Through Environmental Design (CPTED) 2:2
      • 134 Site Location 2:38
      • 135 Construction 2:8
      • 136 Support Facilities 2:46
      • 137 Business Scenario 1:51
      • 138 Secure Operational Areas 4:15
      • 139 Business Scenario 1:49
      • 140 Environmental Controls 1:21
      • 141 Environmental Controls (Contd.) 2:5
      • 142 Fire Detection and Suppression 1:44
      • 143 Power Supply 3:3
      • 144 Power Supply (contd.) 1:57
      • 145 HVAC 1:43
      • 146 Training and Awareness 1:23
      • 147 Business Scenario 1:0
      • 148 Quiz 0:0
      • 149 Summary 1:48
      • 150 Conclusion 1:7
    • Domain 04 - Communications and Network Security 128:22
      • 1 Domain 04Communications and Network Security 1:15
      • 2 Objectives 1:27
      • 3 Importance of Communications and Network SecurityCase Study 1:39
      • 4 Introduction to Secure Network Architecture and Design 1:26
      • 5 Open Systems Interconnection 4:43
      • 6 OSI Model Layers 2:15
      • 7 Physical Layer 2:9
      • 8 Data Link Layer 2:18
      • 9 Network Layer 1:49
      • 10 Transport Layer 2:1
      • 11 Session Layer 1:52
      • 12 Presentation Layer 2:16
      • 13 Application Layer 1:47
      • 14 Transmission Control Protocol/Internet Protocol (TCP/IP) Model 2:8
      • 15 Network Access Layer and Internet Layer 2:8
      • 16 Host-to-Host Layer and Application Layer 2:10
      • 17 Comparison of OSI and TCP/IP Models 2:17
      • 18 Introduction to IP Addressing 1:48
      • 19 IPv4 and IPv6 3:35
      • 20 Classful IP Addressing 1:38
      • 21 Class A 1:31
      • 22 Class B 1:30
      • 23 Class C 1:27
      • 24 Class D and Class E 1:30
      • 25 Classless Inter-Domain Routing 3:41
      • 26 Private Networks and Loopback Address 2:42
      • 27 Types of IP Addressing 2:15
      • 28 Routed and Routing Protocols 2:56
      • 29 Types of Network Protocols 1:15
      • 30 Transmission Control Protocol (TCP) 2:6
      • 31 User Datagram Protocol (UDP) 1:46
      • 32 Internet Protocol 1:20
      • 33 Address Resolution Protocol 2:37
      • 34 Internet Control Message Protocol (ICMP) 1:29
      • 35 Hypertext Transfer Protocol (HTTP) 2:56
      • 36 Implications of Multi-Layer Protocols 1:53
      • 37 Distributed Network Protocol 2:7
      • 38 LAN/Network Technologies 5:14
      • 39 Transmission Media 1:26
      • 40 Twisted Pair 2:0
      • 41 Coaxial Cable Box 2:45
      • 42 Fiber-Optic Cable Box 2:42
      • 43 Network Topologies 2:52
      • 44 Media Access Technologies 1:46
      • 45 Carrier-Sense Multiple Access with Collision Detection 2:20
      • 46 Carrier-Sense Multiple Access with Collision Avoidance 2:4
      • 47 Flavors of LAN transmission methods 1:30
      • 48 List of Networking Devices 3:33
      • 49 VLANs 3:8
      • 50 Gateways 2:3
      • 51 Network Access Control Devices 1:38
      • 52 Packet-Filtering and Application-Level 3:40
      • 53 Circuit-Level and Stateful-Inspection 2:39
      • 54 Firewall Architectures 3:37
      • 55 Network Security Terms 2:51
      • 56 Business Scenario 1:26
      • 57 Networks 2:9
      • 58 Types of Networks 2:9
      • 59 WAN Technologies 2:11
      • 60 WAN Switching and Devices 2:55
      • 61 Network Address Translation and Frame Relay 2:36
      • 62 Multi-Protocol Label Switching and VoIP 1:58
      • 63 Fiber Channel over Ethernet and Internet Small Computer System Interface 2:5
      • 64 Virtualized Networks 2:2
      • 65 Introduction to Remote Access 1:45
      • 66 VPN using PPTP and L2TP 2:44
      • 67 Internet Security Protocol (IPsec) 2:6
      • 68 Internet Security Protocol (IPsec) Modes of Operation 2:47
      • 69 IPsec Security ProtocolsAuthentication Header (AH) 3:44
      • 70 IPsec Security ProtocolsEncapsulating Security Payload (ESP) 2:26
      • 71 Components of the IPsec Process 2:28
      • 72 Components of the IPsec Process (contd.) 2:18
      • 73 IPsec Process 1:59
      • 74 Secure Access Protocols 3:49
      • 75 Secure Access Protocols (contd.) 3:10
      • 76 Secure Access Protocols (contd.) 2:3
      • 77 Remote Access Security Methods 1:32
      • 78 Multimedia Collaboration 1:52
      • 79 Wireless Technologies 1:29
      • 80 IEEE Wireless Standards and Spread-Spectrum Technologies 2:17
      • 81 Direct Sequence Spread Spectrum and Frequency-Hopping Spread Spectrum 2:20
      • 82 WLAN Operational Modes 2:30
      • 83 Bluetooth 2:37
      • 84 Bluetooth Attack 1:15
      • 85 Blue Jacking and Blue Snarfing 2:9
      • 86 Blue Bugging, Backdoor Attacks, and Denial of Service Attacks 2:3
      • 87 Wireless Security 7:29
      • 88 Business Scenario 1:49
      • 89 Network Attacks 3:33
      • 90 Network Attacks (contd.) 3:17
      • 91 Network AttacksCountermeasures 4:2
      • 92 Quiz 0:0
      • 93 Summary 1:40
      • 94 Conclusion 1:8
    • Domain 05 - Identity and Access Management 93:26
      • 1 Domain 05Identity and Access Management 1:15
      • 2 Objectives 1:31
      • 3 Importance of Identity and Access Management in Information Security 1:59
      • 4 Controlling Physical and Logical Access to Assets 2:23
      • 5 Controlling Physical and Logical Access to Assets (contd.) 2:51
      • 6 Access Subject Object and Access controls 2:13
      • 7 Identity and Access Management Policy 1:47
      • 8 Identification Authentication and Authorization 2:21
      • 9 Identity Management 1:32
      • 10 Identity and Access Provisioning Lifecycle 2:28
      • 11 Identity and Access Provisioning Lifecycle (contd.) 1:48
      • 12 Guidelines for User Identification 1:53
      • 13 Verifying Identification Information 2:41
      • 14 Strong Authentication 2:26
      • 15 BiometricsCharacteristics 3:11
      • 16 Types of Biometrics 2:42
      • 17 FRR FAR CER 3:4
      • 18 Passwords 2:15
      • 19 Password Types 2:43
      • 20 Tokens 1:30
      • 21 Token DeviceSynchronous 1:48
      • 22 Token DeviceAsynchronous 1:40
      • 23 Memory Cards and Smart Cards 2:39
      • 24 Attacks on Smart CardsFault Generation and Micro-Probing 3:8
      • 25 Access Criteria 3:4
      • 26 Authorization Concepts 3:22
      • 27 Identity Management Implementation 1:31
      • 28 Password Management 3:2
      • 29 Directory Management 2:5
      • 30 Directory Technologies 2:35
      • 31 Accounts Management 2:16
      • 32 Profile Management 1:49
      • 33 Web Access Management 1:30
      • 34 Single Sign-On (SSO) 2:49
      • 35 SSO Technologies 2:1
      • 36 Kerberos 3:41
      • 37 Kerberos Steps 2:35
      • 38 Problems with Kerberos 1:54
      • 39 Business Scenario 2:1
      • 40 Access Control TypesSecurity Layer 2:17
      • 41 Access Control TypesFunctionality 2:39
      • 42 Business Scenario 1:24
      • 43 Access Control ModelsDAC 1:0
      • 44 Access Control ModelsMAC 1:0
      • 45 Access Control ModelsRBAC 1:51
      • 46 Business Scenario 1:28
      • 47 Access Control Concepts 4:12
      • 48 Types of Access Control Administration 3:19
      • 49 Remote Authentication Dial-In User Service (RADIUS) 2:50
      • 50 TACACS and TACACS+ 1:56
      • 51 DIAMETER 1:58
      • 52 Accountability 2:43
      • 53 Accountability (contd.) 1:40
      • 54 Session Management 1:56
      • 55 Registration and Proof of Identity 1:42
      • 56 Credential Management Systems 1:47
      • 57 Credential Management SystemsRisks and benefits 1:42
      • 58 Federated Identity Management 1:45
      • 59 Federated Identity Management Models 1:51
      • 60 Federated Identity Management Models (contd.) 2:6
      • 61 Federated Identity Management Models (contd.) 1:48
      • 62 Identity as a Service 1:44
      • 63 Identity as a ServiceFunctionality 2:53
      • 64 Identity as a ServicePossible Issues 2:7
      • 65 Integrate Third-Party Identity Services 2:5
      • 66 Integrate Third-Party Identity Services (contd.) 1:49
      • 67 Unauthorized Disclosure of Information 4:37
      • 68 Threats to Access Control 5:27
      • 69 Protection against Access Control Attacks 1:39
      • 70 Access Control Best Practices 1:53
      • 71 Access Control Best Practices (contd.) 1:29
      • 72 Quiz 0:0
      • 73 Summary 1:39
      • 74 Conclusion 1:7
    • Domain 06 - Security Assessment and Testing 47:4
      • 1 Domain 06Security Assessment and Testing 1:14
      • 2 Objectives 1:25
      • 3 Security Assessment and TestingIntroduction 1:36
      • 4 Assessment and Test Strategies 1:48
      • 5 Vulnerability Assessment 2:4
      • 6 Penetration Testing 2:18
      • 7 Log Management 2:14
      • 8 Log ManagementAdvantages and Challenges 1:44
      • 9 Log ManagementBest Practices 1:48
      • 10 Log ManagementOperational Process 1:40
      • 11 Logged Events 1:27
      • 12 Synthetic Transactions 1:59
      • 13 Reasons to Use Synthetic Transactions 1:51
      • 14 Code Review and Testing 1:49
      • 15 Testing Techniques 2:16
      • 16 Security Testing in the SDLC 2:55
      • 17 Software Product Testing Levels 2:5
      • 18 Misuse Case Testing 1:37
      • 19 Misuse Case TestingScenarios 2:19
      • 20 Test Coverage Analysis 1:38
      • 21 Interface Testing 1:35
      • 22 API Testing (contd.) 1:59
      • 23 Interface Testing (contd.) 1:27
      • 24 GUI Testing 1:51
      • 25 Common Software Vulnerabilities 2:28
      • 26 Business Scenario 1:54
      • 27 Information Security Continuous Monitoring 2:32
      • 28 Information Security Continuous MonitoringStrategy and Process 2:55
      • 29 Risk Evaluation and ControlMetrics 1:0
      • 30 Security Controls Monitoring Frequencies 3:24
      • 31 ISCMBenefits 1:50
      • 32 Key Performance and Risk Indicators 2:12
      • 33 Internal and Third Party Audits 2:33
      • 34 Audit Frequency and Scope 1:47
      • 35 Statement on Auditing Standards No. 70 2:43
      • 36 Service Organization Controls 1:57
      • 37 SOC 1 Report 2:23
      • 38 SOC 2 Report 2:40
      • 39 SOC 2 Reports (contd.) 2:7
      • 40 SOC 3 Report 1:41
      • 41 SOC 1, SOC 2, and SOC 3 Comparison 1:58
      • 42 Audit ProcessAudit Preparation Phase 2:3
      • 43 Audit ProcessAudit Phase 1:43
      • 44 Business Scenario 1:36
      • 45 Quiz 0:0
      • 46 Summary 1:52
      • 47 Conclusion 1:7
    • Domain 07 - Security Operations 187:24
      • 1 Domain 07Security Operations 1:15
      • 2 Objectives 1:24
      • 3 Importance of Security OperationsCase Study 1:47
      • 4 Introduction to Investigations 1:41
      • 5 Investigation Challenges 2:4
      • 6 InvestigationsPrimary Activities 2:51
      • 7 Crime Scene 1:52
      • 8 Forensic Investigation Guidelines 2:7
      • 9 Incident Response Terminologies 2:53
      • 10 Incident Response Goals 1:28
      • 11 Incident Response Team 2:39
      • 12 Incident Response Procedures 3:19
      • 13 Incident Response Procedures (contd.) 1:59
      • 14 Incident Response Procedures (contd.) 1:27
      • 15 Incident Response Procedures (contd.) 1:31
      • 16 Business Scenario 1:52
      • 17 Evidence 2:21
      • 18 Evidence Lifecycle 2:17
      • 19 Chain of Evidence 2:4
      • 20 Types of Evidence 4:47
      • 21 Computer Forensics Procedure 1:50
      • 22 Requirements for Investigation Types 2:15
      • 23 Logging and Monitoring Activities 1:40
      • 24 Intrusion Detection System 3:52
      • 25 Intrusion Prevention System 3:30
      • 26 Security Information and Event Management (SIEM) 2:12
      • 27 Security Information and Event Management (SIEM)Characteristics 1:45
      • 28 Continuous Monitoring 1:53
      • 29 Egress Filtering 1:0
      • 30 Data Leak or Loss Prevention (DLP) 2:26
      • 31 Steganography and Digital Watermarking 1:58
      • 32 Business Scenario 1:44
      • 33 Secure Provisioning of Resources through Configuration Management 2:8
      • 34 Secure Provisioning of Resources through Configuration Management (contd.) 1:52
      • 35 Introduction to Security Operations 1:37
      • 36 Security Operations Concepts 1:44
      • 37 Security Operations 1:51
      • 38 Effects of Operations Controls on C.I.A. 1:29
      • 39 Business Scenario 2:3
      • 40 Operational Resilience 2:8
      • 41 Threats to Operations 3:12
      • 42 Threats to Operations (contd.) 3:36
      • 43 Vulnerabilities 4:30
      • 44 Controls 2:49
      • 45 Business Scenario 1:44
      • 46 Need for Controlling Privileged Accounts 2:18
      • 47 Identity and Access Management 2:30
      • 48 Types of Accounts 2:29
      • 49 Commonly Used Roles 2:1
      • 50 Commonly Used Roles (contd.) 2:53
      • 51 Monitoring Special Privileges 1:33
      • 52 Service Level Agreements (SLAs) 2:15
      • 53 Business Scenario 1:45
      • 54 Protect Valuable Assets 2:28
      • 55 Protecting Physical Assets 1:45
      • 56 Protecting Information Assets 2:7
      • 57 Protecting Resources 2:33
      • 58 Controls for Protecting AssetsHardware Controls 2:51
      • 59 Controls for Protecting AssetsSoftware Controls 3:2
      • 60 Controls for Protecting AssetsMedia Controls 2:0
      • 61 Controls for Protecting AssetsAdministrative Controls 3:51
      • 62 Cloud and Virtual Storage 1:53
      • 63 Cloud and Virtual Storage Security Issues 1:53
      • 64 Types of Virtualized Storage 2:0
      • 65 Hard Copy Records 1:46
      • 66 Business Scenario 1:34
      • 67 Incident Management 2:46
      • 68 Security Measurements, Metrics, and Reporting 1:32
      • 69 Managing Security Technologies 1:42
      • 70 Incident ManagementDetection Phase 1:27
      • 71 Intrusion Detection System 1:46
      • 72 Security Information Event Management (SIEM) 3:38
      • 73 Anti-Malware Systems 1:59
      • 74 Monitoring TechniquesViolation Analysis 2:12
      • 75 Incident ManagementOther Phases 1:57
      • 76 Trusted Recovery and System Recovery 2:54
      • 77 Problem Management 2:29
      • 78 Operating and Maintaining Preventive Measures 2:2
      • 79 Patch Management 2:15
      • 80 Vulnerability Management 2:19
      • 81 Change Management 2:39
      • 82 Change Control Process 2:23
      • 83 Configuration Management 3:24
      • 84 Configuration Management (contd.) 1:26
      • 85 Business Scenario 1:37
      • 86 Develop a Recovery Strategy 2:18
      • 87 Types of RecoveryBusiness Recovery and Facility and Supply Recovery 1:44
      • 88 Types of RecoveryUser Recovery 1:29
      • 89 Types of RecoveryOperational Recovery 1:56
      • 90 Recovery Partners Strategy 3:44
      • 91 Backup Sites 1:51
      • 92 Backup Sites (contd.) 4:6
      • 93 Backup Sites (contd.) 2:36
      • 94 Backup Methods 2:36
      • 95 Importance of Maintaining Resilient Systems 3:35
      • 96 Redundancy and Fault Tolerance 2:54
      • 97 Redundancy and Fault Tolerance Methods 2:13
      • 98 Redundancy and Fault Tolerance Methods (contd.) 5:21
      • 99 Best Practices for Backup and Recovery 1:55
      • 100 Business Scenario 1:43
      • 101 Disaster RecoveryPlanning Design and Development 1:37
      • 102 Planning Design and DevelopmentStep 1 and Step 2 2:38
      • 103 Planning Design and DevelopmentStep 3 and Step 4 3:19
      • 104 Disaster Recovery PhasesImplementation, Testing, and Training 1:44
      • 105 Importance of Testing 1:19
      • 106 Types of Testing 2:4
      • 107 Types of Testing (contd.) 2:30
      • 108 Types of Testing (contd.) 2:54
      • 109 Training 3:57
      • 110 Disaster Recovery PhasesMaintenance 3:49
      • 111 Disaster Recovery PhasesMaintenance (contd.) 1:26
      • 112 Business Scenario 2:4
      • 113 Perimeter Security 2:32
      • 114 Barriers 1:37
      • 115 Fences 2:14
      • 116 Gates 2:40
      • 117 Walls and Bollards 2:13
      • 118 Perimeter Intrusion Detection 5:26
      • 119 Business Scenario 1:42
      • 120 Importance of Lighting 2:12
      • 121 Types of Lighting Systems 2:20
      • 122 Types of Lights 2:21
      • 123 Access Control 2:41
      • 124 Types of Access Control Systems 7:33
      • 125 Business Scenario 1:42
      • 126 Building and Inside Security 9:5
      • 127 Personnel Security 2:28
      • 128 Business Scenario 1:50
      • 129 Quiz 0:0
      • 130 Summary 1:0
      • 131 Conclusion 1:6
    • Domain 08 - Software Development Security 111:55
      • 1 Domain 08 - Software Development Security 1:15
      • 2 Objectives 1:25
      • 3 Importance of Software Development Security 1:51
      • 4 System Environments 2:9
      • 5 Distributed Environment 1:11
      • 6 Client/Server Systems and Local Environment 1:35
      • 7 Distributed Data Processing and Agents 1:45
      • 8 Applets 1:42
      • 9 Programming Concepts 2:22
      • 8.010 Complier Vs Interpreter 2:39
      • 11 Programming and Software 2:40
      • 12 Threats in the Software Environment 2:15
      • 13 Threats in the Software Environment (contd.) 3:11
      • 14 Threats in the Software Environment (contd.) 2:7
      • 15 Threats in the Software Environment (contd.) 2:3
      • 16 Threats in the Software Environment (contd.) 1:49
      • 17 Threats in the Software Environment (contd.) 1:46
      • 18 Business Scenario 2:12
      • 19 System Life Cycle and Systems Development 3:35
      • 20 Systems Development Life Cycle 3:31
      • 21 SDLCOperation and Maintenance 1:42
      • 22 Integrated Product Team (IPT) 1:42
      • 23 DevOps 1:39
      • 24 Software Testing Methods 4:18
      • 25 Software Testing Levels 1:43
      • 26 Application Controls 1:35
      • 27 Software Development Methods 2:9
      • 28 Software Development Methods (contd.) 2:9
      • 29 Software Development Methods (contd.) 1:53
      • 30 Software Development Methods (contd.) 1:54
      • 31 Software Development Methods (contd.) 2:32
      • 32 Java Security 1:57
      • 33 Secure Software Development Best Practices 1:47
      • 34 Business Scenario 2:5
      • 35 Object - Oriented Programming Terms 2:1
      • 36 Object - Oriented Programming Terms (contd.) 1:34
      • 37 Object-Oriented ProgrammingDefinition 2:23
      • 38 Distributed Object-Oriented Systems 2:47
      • 39 Object Request Brokers 1:49
      • 40 COMComponent Object Model 1:28
      • 41 DCOMDistributed Component Object Model 1:38
      • 42 CORBACommon Object Request Broker Architecture 1:58
      • 43 Software Security and Assurance 2:18
      • 44 Software Security and Assurance (contd.) 1:43
      • 45 Software Security and Assurance (contd.) 1:53
      • 46 Software Security and Assurance (contd.) 1:42
      • 47 Software Security and Assurance (contd.) 1:41
      • 48 Software Security and Assurance (contd.) 1:50
      • 49 Software Security and Assurance (contd.) 1:40
      • 50 Software Security and Assurance (contd.) 1:55
      • 51 Software Security and Assurance (contd.) 1:40
      • 52 Software Security and Assurance (contd.) 1:36
      • 53 Software Security and Assurance (contd.) 1:56
      • 54 Software Security and Assurance (contd.) 1:54
      • 55 Software Security and Assurance (contd.) 1:35
      • 56 Software Security : XML and Security Assertion Markup Language 2:23
      • 57 Software Security: SOA 3:15
      • 58 Audit and Assurance Mechanisms 3:24
      • 59 Assessing the Effectiveness of Software Security 1:51
      • 60 Assessing the Effectiveness of Software Security (contd.) 1:51
      • 61 Assessing the Security Impact of Acquired Software 2:15
      • 62 Code Repositories and Application Programming Interfaces 2:4
      • 63 Business Scenario 1:47
      • 64 Database and Data Warehousing Environments 2:25
      • 65 Database Terms 2:9
      • 66 Types of Databases 1:27
      • 67 Types of Databases (contd.) 1:27
      • 68 Types of Databases (contd.) 1:41
      • 69 Types of Databases (contd.) 1:29
      • 70 Types of Databases (contd.) 1:43
      • 71 DatabaseThreats and Vulnerabilities 5:40
      • 72 Introduction to Data Warehousing 2:4
      • 73 Data Warehousing Concepts 2:57
      • 74 Database Normalization 2:17
      • 75 DBMS Controls 5:26
      • 76 Business Scenario 1:39
      • 77 MalwaresTypes 5:56
      • 78 Malware Protection 2:31
      • 79 Business Scenario 1:35
      • 80 Importance and Role of Knowledge Management 2:3
      • 81 Knowledge-Based System/Artificial Intelligence 1:33
      • 82 Knowledge-Based SystemExpert System 2:22
      • 83 Knowledge-Based SystemNeural Network 2:33
      • 84 Web Application EnvironmentThreats and Vulnerabilities 2:35
      • 85 Web Application Environment Security 2:3
      • 86 Web Application Environment Security (contd.) 2:14
      • 87 Web Application Environment Security (contd.) 1:34
      • 88 Web Application Environment Security (contd.) 1:45
      • 89 The Ten Best Practices for Secure Software Development(ISC)2 7:28
      • 90 Quiz 0:0
      • 91 Summary 2:7
      • 92 Conclusion 1:13
    • {{childObj.title}}
      • {{childObj.childSection.chapter_name}}
        • {{lesson.title}}
      • {{lesson.title}}

    View More

    View Less

Exam & Certification

  • How do you become a CISSP certified professional?

    CISSP exam is a Computer Based Test (CBT) administered at Pearson VUE Testing centers around the globe. Please follow the below steps to register your exam:
    1. Go to www.pearsonvue.com/isc2 to register for a test appointment.
    2. Select the most convenient test center.
    3. Select an appointment time and pay for your exam appointment.
    4. Receive confirmation from Pearson VUE with the appointment details, test center location and other relevant instructions, if any.
    Please note that your registration information will be transferred to (ISC) ² and all communication about the testing process from (ISC) ² and Pearson VUE will be sent to you via email. Please refer the exam outline for CISSP by (ISC) ²

  • What are the prerequisites for CISSP certification?

    This training is intended for professionals who want to acquire the credibility and mobility to advance within their current Information Security careers. To pursue CISSP training and certification, it is mandatory that you have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP - CBK 2015.

Reviews

The course was well balanced and covered each domain clearly and in good detail. The instructor was very knowledgeable and led a very effective course.

Read more Read less

Training was up to the mark, solved my purpose of joining the course, a kick-starter to exam preparation and getting the basics right.

The training was nice and to the point. The trainer was nice and helpful. He cleared all our course-related doubts.

Scenario based examples with elaborate details when required. Very strategic and useful way of teaching.

It was a very good and informative training program conducted by Simplilearn.

The training was very helpful to understand CISSP topics.

Faculty is Excellent, Coordination/Assistance from the coordinator is highly appreciated.

The course content is really good. It really helped to get concept understanding. The faculty has taken all the topics very nicely and explained the points.

Read more Read less

Training was good, elaborations are very good and the case study shared was great.

FAQs

  • Who delivers the training?

    All Our Trainers are CISSP certified and highly qualified with over 16 years of experience in training and are working in the domain.

  • What certification do I get post the training?

    After successful completion of the training, you will be awarded the course completion certificate along with the 32 hours PDU/CPE certificate from Simplilearn.

  • What is LVC? Is it a classroom training?

    LVC or Live Virtual Classroom training for CISSP is a live training conducted via online live streaming of a class. LVC is run by a CISSP certified trainer with over 16 years of work experience in the domain and training. The class attended by the global audience can enrich your learning experience.

  • Are these trainings LIVE or do I attend a pre-recorded video?

    All these trainings are live interactive sessions wherein you can raise concerns and discussions at any point during the class. Additionally, we also provide recordings of the sessions attended by you for your future references.

  • What infrastructure do I need to attend this session?

    The system requirements are quite basic:
    OS: Windows any version above XP SP3 & Mac any version above OS X 10.6
    Internet Speed: Preferably above 512 KBPS
    Headset: Any decent headset and microphone which can be used to talk and hear clearly.

  • What all will I get as part of the training?

    You get access to our e-learning content along with the practice simulation tests, these are complemented by our tips and tricks videos that help you tackle the toughest of the exam questions. You will also get an online participant handbook with cross references to the e-learning for reinforcement of your learning.

  • Is exam fee included in the course fee?

    No. The exam fee is not included. You can directly schedule your exam through www.pearsonvue.com as in the steps mentioned above.

  • How many questions are there in the CISSP certification exam?

    The CISSP Exam has a total of 250 multiple choice questions. The duration of the exam is 6 hours.

  • What is the CISSP certfication cost?

    The CISSP exam cost is $599 for Non-members and $549 for members.

  • Do you provide assistance for the exam application process?

    Yes, we do provide assistance for the exam application process. You can state your queries on community.simplilearn.com and get them answered along with any other query or concern that you might have about the course.

  • How does Simplilearn assure me that the training and course material delivered are effective?

    Our CISSP course is developed to deliver a first attempt pass rate of 100%. With a hands-on learning approach, the training not only gives you the confidence to clear the exam but also helps you retain the knowledge beyond the examination.

  • Can I cancel my enrollment? Do I get a refund?

    Yes, you can cancel your enrollment. We provide you a refund after deducting the administration fee. To know more, please go through our Refund Policy.

Drop us a Query
Name *
Email *
Your Query *
Looking for a training for
Myself My team/organization
I agree to be contacted over email
1800-232-5454(9am-7pm)
We are looking into your query.
Our consultants will get in touch with you soon.

Request for a custom quote

Please fill in the details and our inhouse support team will get back to you within 1 business day

Name*

Email*

Phone*

Course*
Company
Looking for*
Online license
training
Onsite
training
Online Virtual
training
Please select one of the above
Your Query
I agree to be contacted over mail
Please accept to proceed
/index/hidden/ - Never remove this line