Country

Watch Introduction Video

Classroom Training in Ashburn Change city

Select a convenient batch & Register

Online Classroom

Online classroom

An Instructor led Online Classroom is a live Online classroom where you can interact with your trainer and peers. It is as simple as attending a web meeting.

Watch a Sample Session

Early Bird
May 26 - May 29
Batch Schedule Dates

May

  • Tue
    26
  • Wed
    27
  • Thu
    28
  • Fri
    29
 
Time
09:00 - 17:00
 
Location
Online Classroom
 
Price
$ 1619
 
Jun 13 - Jul 05
{Weekend Batch}
Batch Schedule Dates

Jun

  • Sat
    13
  • Sun
    14
  • Sat
    20
  • Sun
    21
  • Sat
    27
  • Sun
    28

Jul

  • Sat
    04
  • Sun
    05
 
Time
09:00 - 13:00
 
Location
Online Classroom
 
Price
$ 1599
 
Jun 15 - Jun 26
Batch Schedule Dates

Jun

  • Mon
    15
  • Tue
    16
  • Wed
    17
  • Thu
    18
  • Fri
    19
  • Mon
    22
  • Tue
    23
  • Wed
    24
  • Thu
    25
  • Fri
    26
 
Time
09:30 - 12:45
 
Location
Online Classroom
 
Price
$ 1599
 

Can't find convenient schedule? Let us know

 

Online self learning

3 DAYS MONEY BACK GUARANTEE

How this works:

For refund, write to support@simplilearn.com within 3 days of purchase

The mode of reimbursement will be same as the mode of payment used during enrollment fees. For example: If a participant has paid through credit cards, we will reimburse through credit card

Note: Money back guarantee is void if the participant has accessed more than 50% of the course content.


Start Anytime! Anywhere in the world
Access days:
30 Days 180 Days
$199

$229

 

Key Features

  • 20 hours of High quality e-learning content
  • 132 End of chapter questions
  • 48 Business Scenario based examples
  • 8 downloadable case studies
  • 11 downloadable E-books
  • 1250 online simulation questions (5 sets of 250 Qs each)
  • Glossary
  • 45 PDUs offered
  • 35 CPEs offered
  • 13 Tips & Tricks Video
  • 20 hours of High quality e-learning content
  • 132 End of chapter questions
  • 48 Business Scenario based examples
  • 8 downloadable case studies
  • 11 downloadable E-books
  • Glossary
  • 45 PDUs offered
  • 35 CPEs offered
  • 1250 online simulation questions (5 sets of 250 Qs each)
  • 13 Tips & Tricks Video
  • 4 Days Classroom training / 8 Days Online Classroom
  • 20 hours of High quality e-learning content
  • 132 End of chapter questions
  • 48 Business Scenario based examples
  • 8 downloadable case studies
  • 11 downloadable e-books
  • 1250 online simulation questions (5 sets of 250 Qs each)
  • Glossary
  • 45 PDUs offered
  • 35 CPEs offered
  • 13 Tips & Tricks Video
Specials Offer(s) Available

Flat 30% Off on All Online courses + details Flat 30% Off on All Online courses
Use Coupon: OSL30 valid till 29th May
Use Coupon:OSL30

About Course

Course Preview

    • Course Introduction 10:52
      • Course Introduction 10:52
    • Domain 00 - CISSP Introduction 19:10
      • 0.1 CISSP Introduction 2:8
      • 0.2 Objectives 1:23
      • 0.3 CISSP 2:20
      • 0.4 ISC2 1:0
      • 0.5 CISSP Domains 5:33
      • 0.6 Benefits of CISSP for Professionals 2:3
      • 0.7 Benefits of CISSP for Employers 2:7
      • 0.8 CISSP Certification Requirements 5:34
      • 0.9 CISSP Examination 3:57
      • 0.10 Thank you 1:5
    • Domain 01 - Information Security Governance and Risk Management 63:7
      • 1.1 Information Security Governance and Risk Management 1:53
      • 1.2 Objective 1:32
      • 1.3 Importance of Information Security Governance and Risk Management 2:12
      • 1.4 Goals Mission and Objectives of Organization 1:35
      • 1.5 Role and Importance of Goals Mission and Objectives 1:31
      • 1.6 Goals Mission and Objectives 0:0
      • 1.7 Aligning Security with Goals Mission and Objectives 1:43
      • 1.8 Business Scenario 2:15
      • 1.9 Information Security Management 1:29
      • 1.10 Types of Computing Platforms 0:0
      • 1.11 Information Security Governance 2:8
      • 1.12 Security Controls 1:51
      • 1.13 Types of Security Controls 0:0
      • 1.14 Organizational Processes 0:0
      • 1.15 Service Level Agreements 1:59
      • 1.16 Managing Third Party Governance 3:25
      • 1.17 Offshoring Privacy Requirements and Compliance 2:8
      • 1.18 Business Scenario 1:54
      • 1.19 The Big Three CIA 1:30
      • 1.20 Role and Importance of CIA in ISM 2:8
      • 1.21 Confidentiality 2:55
      • 1.22 Integrity 2:34
      • 1.23 Availability 1:58
      • 1.24 Information Classification 1:40
      • 1.25 Need for Information Classification 2:14
      • 1.26 Information Classification Objectives 1:58
      • 1.27 Government or Military Sector Classification 2:34
      • 1.28 Commercial or Private Sector Classification 2:52
      • 1.29 Information Classification Criteria 2:56
      • 1.30 Layers of Responsibility 0:0
      • 1.31 Business Scenario 1:38
      • 1.32 Security Policy Implementation 1:38
      • 1.33 Security Policies 2:33
      • 1.34 Types of Security Policies 0:0
      • 1.35 Security Policy Implementation 0:0
      • 1.36 Policy Chart 2:10
      • 1.37 Standards Guidelines Procedures and Baselines 0:0
      • 1.38 Business Scenario 1:32
      • 1.39 Information Risk Management 1:21
      • 1.40 Security Definitions 0:0
      • 1.41 Information Risk Management 2:10
      • 1.42 Business Scenario 1:55
      • 1.43 Risk Analysis 1:47
      • 1.44 Introduction to Risk Analysis 2:7
      • 1.45 Goals of Risk Analysis 1:27
      • 1.46 Risk Analysis Team 1:55
      • 1.47 Steps for Risk Analysis 1:51
      • 1.48 Information and Assets Valuation 2:17
      • 1.49 Risk Analysis Types 1:43
      • 1.50 Quantitative Risk Analysis Steps 2:49
      • 1.51 Quantitative Risk Analysis Problem 1:45
      • 1.52 Qualitative Risk Analysis 2:12
      • 1.53 Delphi Technique 2:5
      • 1.54 Quantitative vs Qualitative 1:30
      • 1.55 Countermeasure Selection Problem 2:55
      • 1.56 Handling Risk 2:40
      • 1.57 Business Scenario 1:52
      • 1.58 Managing Personnel Security 1:21
      • 1.59 Importance of Managing Personnel Security 1:53
      • 1.60 Managing Personnel Security 0:0
      • 1.61 Vendor Contractors and Consultant Controls 1:48
      • 1.62 Business Scenarios 1:49
      • 1.63 Best Work Practices 2:45
      • 1.64 Security Awareness Training 1:24
      • 1.65 Importance of Security Awareness Training 1:56
      • 1.66 Awareness Training and Education 2:29
      • 1.67 Security Awareness Training Implementation 1:0
      • 1.68 Managing Security Function 1:14
      • 1.69 Importance of Managing Security Function 1:54
      • 1.70 Managing Security Function Best Practices 0:0
      • 1.71 Business Scenario 1:45
      • 1.72 Summary 1:57
      • 1.73 Thank you 1:6
    • Domain 02 - Access Control 57:57
      • 2.1 Access Control 1:43
      • 2.2 Objectives 1:48
      • 2.3 Importance of Access Control in Informartion Security 2:25
      • 2.4 Overview of Access Control 1:21
      • 2.5 Access Subject Object and Access controls 0:0
      • 2.6 Identification Authentication and Authorization 2:22
      • 2.7 Privacy Accountability and Identity Management 0:0
      • 2.8 Identity and Access Provisioning Lifecycle 2:29
      • 2.9 Identification Authentication and Authorization 1:9
      • 2.10 Verifying Identification Information 2:42
      • 2.11 Strong Authentication 0:0
      • 2.12 Biometrics Characteristics 3:12
      • 2.13 Types of Biometrics 2:43
      • 2.14 FRR FAR CER 0:0
      • 2.15 Passwords 2:16
      • 2.16 Password Management 2:52
      • 2.17 Password Types 2:45
      • 2.18 Token Device 0:0
      • 2.19 Memory Cards and Smart Cards 2:40
      • 2.20 Attacks on Smart Cards 0:0
      • 2.21 Access Criteria 3:9
      • 2.22 Authorization Concepts 0:0
      • 2.23 Single Sign On (SSO) 2:50
      • 2.24 SSO Technologies 1:54
      • 2.25 Kerberos 3:42
      • 2.26 Kerberos Steps 2:38
      • 2.27 Problems with Kerberos 2:14
      • 2.28 Business Scenario 2:3
      • 2.29 Types of Access Control 1:9
      • 2.30 Access Control Types 4:1
      • 2.31 Business Scenario 1:25
      • 2.32 Access Control Models 1:23
      • 2.33 Access Control Models 0:0
      • 2.34 Business Scenario 1:29
      • 2.35 Access Control Concepts 1:18
      • 2.36 Access Control Concepts 0:0
      • 2.37 Access Control Administration 1:24
      • 2.38 Types of Access Control Administration 3:20
      • 2.39 Remote Authentication Dial In User Service (RADIUS) 2:51
      • 2.40 TACACS and TACACS+ 1:57
      • 2.41 DIAMETER 1:59
      • 2.42 Accountability 2:44
      • 2.43 Access Control Monitoring 1:15
      • 2.44 Unauthorized Disclosure of Information 4:34
      • 2.45 Intrusion Detection System 3:54
      • 2.46 Access Control Monitoring Methods 0:0
      • 2.47 Access Control Testing 0:0
      • 2.48 Threats and Best Practices 1:21
      • 2.49 Threats to Access Control 5:28
      • 2.50 Access Control Best Practices 2:23
      • 2.51 Quiz 0:0
      • 2.52 Summary 1:59
      • 2.53 Thank you 1:6
    • Domain 03 - Security Architecture and Design 52:31
      • 3.1 Security Architecture and Design 1:41
      • 3.2 Objectives 1:30
      • 3.3 Importance of Security Architecture and Design 2:7
      • 3.4 Architecture Framework 1:20
      • 3.5 Architecture Framework Definition 2:32
      • 3.6 Common Architecture Frameworks 0:0
      • 3.7 Creating a Security Architecture 0:0
      • 3.8 ISOIEC 270012005 Security Standards 2:14
      • 3.9 ISOIEC 27002 Code of Practice for Information Security Management 3:21
      • 3.10 Security Models 1:18
      • 3.11 Security Models Definition 1:54
      • 3.12 Common Security Models 0:0
      • 3.13 Examples of Security Models Bell LaPadula Confidentiality Model 3:16
      • 3.14 Examples of Security Models Biba Integrity Model 2:28
      • 3.15 Examples of Security Models Clark Wilson Integrity Model 2:16
      • 3.16 Examples of Security Models 2:19
      • 3.17 Business Scenario 1:38
      • 3.18 Evaluation Criteria 1:27
      • 3.19 Evaluation Criteria and its Uses 1:52
      • 3.20 Types of Evaluation Criteria 2:1
      • 3.21 Trusted Computer System Evaluation Criteria 3:24
      • 3.22 Information Technology Security Evaluation Criteria 2:8
      • 3.23 Common Criteria 2:19
      • 3.24 Common Criteria Evaluation Process 1:54
      • 3.25 Common Criteria Levels 2:26
      • 3.26 Payment Card Industry Data Security Standard 1:55
      • 3.27 Identity and Access Provisioning Lifecycle 3:11
      • 3.28 SEI CMMI 0:0
      • 3.29 Business Scenario 2:15
      • 3.30 Enterprise Security Architecture 1:28
      • 3.31 Enterprise Security Architecture 2:42
      • 3.32 Common Security Services in ESA 2:32
      • 3.33 SABSA Framework 2:1
      • 3.34 SABSA Matrix 5:4
      • 3.35 Business Scenario 1:45
      • 3.36 System Security Architecture 1:19
      • 3.37 System Security Architecture Definition 2:5
      • 3.38 Types of Computing Platforms 0:0
      • 3.39 System Components 0:0
      • 3.40 Distributed Systems 1:19
      • 3.41 Distributed Systems Definition 1:29
      • 3.42 Types of Distributed Systems 0:0
      • 3.43 Business Scenario 1:59
      • 3.44 Security Threats and Countermeasures 1:25
      • 3.45 System Vulnerabilities and Threats 7:3
      • 3.46 Best Practices 2:18
      • 3.47 Best Practices Techniques and Technologies 0:0
      • 3.48 Quiz 0:0
      • 3.49 Summary 2:9
      • 3.50 Thank you 1:7
    • Domain 04 - Physical (Environmental) Security 34:21
      • 4.1 Physical (Environmental) Security 2:5
      • 4.2 Objectives 1:25
      • 4.3 Importance of Physical and Environmental Security 2:9
      • 4.4 Need for Physical and Environmental Security 1:11
      • 4.5 Need for Physical and Environmental Security 2:51
      • 4.6 Business Scenario 1:59
      • 4.7 Site and Facility Design Criteria 1:16
      • 4.8 Site and Facility Design 3:36
      • 4.9 Information Protection Environment 1:55
      • 4.10 Areas of Consideration for Information Protection Environment 0:0
      • 4.11 Business Scenario 1:52
      • 4.12 Perimeter Security 1:17
      • 4.13 Importance of Perimeter Security 2:18
      • 4.14 Barriers and Fences 2:52
      • 4.15 Gates 2:41
      • 4.16 Walls and Bollards 2:14
      • 4.17 Perimeter Intrusion Detection 1:51
      • 4.18 Open Terrain Sensors 0:0
      • 4.19 Business Scenario 1:43
      • 4.20 Importance of Lighting 2:11
      • 4.21 Types of Lighting Systems 2:19
      • 4.22 Types of Lights 2:23
      • 4.23 Access Control 1:16
      • 4.24 Access Control System 2:27
      • 4.25 Types of Access Control Systems 0:0
      • 4.26 Business Scenario 1:44
      • 4.27 Building and Inside Security 1:12
      • 4.28 Means to ensure building security 0:0
      • 4.29 Business Scenario 1:52
      • 4.30 Secure Operational Areas 1:10
      • 4.31 Areas 0:0
      • 4.32 Business Scenario 1:51
      • 4.33 Environmental Controls 1:22
      • 4.34 Classes of Fires 2:27
      • 4.35 Fire Detection and Suppression 0:0
      • 4.36 Power Supply 3:5
      • 4.37 HVAC 1:45
      • 4.38 Training and Awareness 1:24
      • 4.39 Business Scenario 2:1
      • 4.40 Quiz 0:0
      • 4.41 Summary 1:30
      • 4.42 Thank you 1:7
    • Domain 05 - Telecommunications and Network security 55:0
      • 5.1 Telecommunications and Network Security 1:43
      • 5.2 Objectives 1:25
      • 5.3 Importance of Telecommunications and Network Security in Information Security 1:40
      • 5.4 Secure Network Architecture and Design 1:39
      • 5.5 Introduction to IP Addressing 1:52
      • 5.6 IPv4 and IPv6 0:0
      • 5.7 Classful IP Addressing 0:0
      • 5.8 Classless Inter Domain Routing 3:43
      • 5.9 Private Networks and Loopback Address 0:0
      • 5.10 Types of IP Addressing 2:16
      • 5.11 Routed and Routing Protocols 2:58
      • 5.12 Types of Network Protocols 0:0
      • 5.13 Introduction to Secure Network Architecture and Design 1:29
      • 5.14 Open Systems Interconnection 4:41
      • 5.15 Working of the OSI Model 2:14
      • 5.16 OSI Model Layers 0:0
      • 5.17 Transmission Control Protocol Internet Protocol (TCP IP) Model 2:10
      • 5.18 TCP IP Model Layers 0:0
      • 5.19 Comparison of OSI and TCP IP Models 2:23
      • 5.20 LAN Network Technologies 0:0
      • 5.21 Securing Network Components 1:22
      • 5.22 Transmission Media 1:28
      • 5.23 Types of Transmission Media 0:0
      • 5.24 Network Topologies 2:50
      • 5.25 Media Access Technologies 1:48
      • 5.26 Carrier Sense Multiple Access (CSMA) 1:48
      • 5.27 CSMA Functional Variations 0:0
      • 5.28 Flavors of LAN transmission methods 1:31
      • 5.29 Networking Devices 1:26
      • 5.30 List of Networking Devices 0:0
      • 5.31 VLANs and Gateways 0:0
      • 5.32 Network Access Control Devices 1:45
      • 5.33 Types of Firewalls 5:20
      • 5.34 Firewall Architectures 3:35
      • 5.35 Network Security Terms 2:55
      • 5.36 Business Scenario 1:26
      • 5.37 Secure Communication Channels 1:38
      • 5.38 Networks 0:0
      • 5.39 Types of Networks 2:11
      • 5.40 WAN Technologies 1:58
      • 5.41 Types of WAN Technologies 0:0
      • 5.42 Introduction to Remote Access 1:46
      • 5.43 Remote Access Protocols 0:0
      • 5.44 Remote Access Security Methods 1:33
      • 5.45 Multimedia Collaboration 1:52
      • 5.46 Wireless Technologies 0:0
      • 5.47 Bluetooth 2:36
      • 5.48 Bluetooth Attack 0:0
      • 5.49 Wireless Security 7:21
      • 5.50 Business Scenario 1:49
      • 5.51 Network Attacks and Countermeasures 1:11
      • 5.52 Network Attacks 3:35
      • 5.53 Network Attacks (contd.) 3:18
      • 5.54 Network Attacks Countermeasures 4:4
      • 5.55 Quiz 0:0
      • 5.56 Summary 1:36
      • 5.57 Thank you 1:5
    • Domain 06 - Software Development Security 73:36
      • 6.1 Software Development Security 2:1
      • 6.2 Objectives 1:26
      • 6.3 Importance of Software Development Security 1:53
      • 6.4 System Environments 1:20
      • 6.5 Introduction to System Environments and Information Security 1:57
      • 6.6 System Environments 0:0
      • 6.7 Programming Concepts 2:28
      • 6.8 Compiler Vs. Interpreter 2:41
      • 6.9 Programming and Software 2:40
      • 6.10 Threats in the Software Environment 0:0
      • 6.11 Business Scenario 2:13
      • 6.12 System Life Cycle and Systems Development 1:36
      • 6.13 Capability Maturity Model (CMM) Levels 3:2
      • 6.14 Systems Development Life Cycle (SDLC) 3:24
      • 6.15 Introduction to Software Testing 1:40
      • 6.16 Software Testing Methods 3:46
      • 6.17 Software testing levels 1:44
      • 6.18 Application Controls 1:36
      • 6.19 Software Development Methods 0:0
      • 6.20 Java Security 1:58
      • 6.21 Secure Software Development Best Practices 1:48
      • 6.22 Business Scenario 2:6
      • 6.23 Object Oriented Programming 1:23
      • 6.24 Object Oriented Programming Terms 0:0
      • 6.25 Object Oriented Programming Definition 2:25
      • 6.26 Distributed Object Oriented Systems 2:48
      • 6.27 Object Request Brokers 0:0
      • 6.28 Software Security and Assurance 1:27
      • 6.29 Software Security Methods 0:0
      • 6.30 Software Security XML and SAML 2:24
      • 6.31 Software Security SOA 3:17
      • 6.32 Audit and Assurance Mechanisms 3:25
      • 6.33 Business Scenario 1:48
      • 6.34 Database and Data Warehousing Environments 1:10
      • 6.35 Database Concepts 2:26
      • 6.36 Database Terms 2:10
      • 6.37 Types of Databases 0:0
      • 6.38 Database Threats and Vulnerabilities 5:41
      • 6.39 Introduction to Data Warehousing 2:5
      • 6.40 Data Warehousing Concepts 3:13
      • 6.41 Database Normalization 2:18
      • 6.42 DBMS Controls 5:37
      • 6.43 Business Scenario 1:41
      • 6.44 Malwares 1:6
      • 6.45 Types of Malwares 5:58
      • 6.46 Malware Protection 2:32
      • 6.47 Business Scenario 1:37
      • 6.48 Knowledge Management 1:26
      • 6.49 Importance and Role of Knowledge Management 2:5
      • 6.50 Knowledge based system Artificial intelligence 1:34
      • 6.51 Knowledge based system Expert system 2:24
      • 6.52 Knowledge based system Neural network 2:35
      • 6.53 Web Application Environment 1:12
      • 6.54 Web Application Environment Threats and Vulnerabilities 2:36
      • 6.55 Web Application Environment Security 0:0
      • 6.56 The 10 Best Practices 1:10
      • 6.57 The Ten Best Practices for Secure Software Development (ISC)2 7:29
      • 6.58 Quiz 0:0
      • 6.59 Summary 2:9
      • 6.60 Thank you 1:6
    • Domain 07 - Cryptography 74:36
      • 7.1 Cryptography 2:10
      • 7.2 Objectives 1:23
      • 7.3 Importance of Cryptography 1:44
      • 7.4 Cryptography Concepts 1:23
      • 7.5 Introduction to Cryptography 3:42
      • 7.6 Cryptography Terms 6:14
      • 7.7 Strength of a Cryptosystem 2:30
      • 7.8 Cryptography Methods 0:0
      • 7.9 Business Scenario 1:37
      • 7.10 Symmetric Cryptography 1:33
      • 7.11 Introduction to Symmetric Cryptography 2:0
      • 7.12 Symmetric Key Ciphers 2:18
      • 7.13 Block Cipher 1:49
      • 7.14 Stream Cipher 3:3
      • 7.15 Block Cipher Designs 1:42
      • 7.16 Data Encryption Standard (DES) 2:35
      • 7.17 DES Algorithm 2:36
      • 7.18 DES Operation Modes 0:0
      • 7.19 Triple DES 2:38
      • 7.20 Advanced Encryption Standard (AES) 2:19
      • 7.21 AES Algorithm 3:19
      • 7.22 Other Symmetric Systems 0:0
      • 7.23 Business Scenario 1:45
      • 7.24 Asymmetric Cryptography 1:10
      • 7.25 Introduction to Asymmetric Cryptography 3:9
      • 7.26 Introduction to RSA Algorithm 1:55
      • 7.27 RSA Algorithm Process 2:21
      • 7.28 Other Types of Asymmetric Cryptography 2:45
      • 7.29 Public Key Cryptography 2:25
      • 7.30 Symmetric vs. Asymmetric Cryptography 1:6
      • 7.31 Symmetric vs. Asymmetric Cryptography 3:39
      • 7.32 Advantages and Disadvantages 1:56
      • 7.33 Hash Function 1:9
      • 7.34 Hashing Algorithms 0:0
      • 7.35 Public Key Infrastructure 1:20
      • 7.36 Introduction to Public Key Infrastructure 2:53
      • 7.37 PKI Certification 0:0
      • 7.38 PKI Steps Part 1 1:44
      • 7.39 PKI Steps Part 2 1:59
      • 7.40 One Way Hash 2:14
      • 7.41 Message Authentication Code (MAC) 2:51
      • 7.42 Digital Signatures 2:17
      • 7.43 Key Management 1:10
      • 7.44 Key Management 2:21
      • 7.45 Key Management Principles 2:52
      • 7.46 Escrowed Encryption 2:51
      • 7.47 Business Scenario 1:59
      • 7.48 Internet Security 1:11
      • 7.49 Need for Internet Security 2:4
      • 7.50 Secure Access Protocols 0:0
      • 7.51 Internet Security Protocol (IPsec) 2:8
      • 7.52 Internet Security Protocol (IPsec) Modes of Operation 2:49
      • 7.53 IPsec Security Protocols 0:0
      • 7.54 Components of the IPsec Process 3:47
      • 7.55 IPsec Process 1:0
      • 7.56 Attacks on Cryptography 1:22
      • 7.57 Attacks 8:19
      • 7.58 Best Practices 1:43
      • 7.59 Business Scenario 1:45
      • 7.60 Quiz 0:0
      • 7.61 Summary 1:54
      • 7.62 Thank you 1:8
    • Domain 08 - Business Continuity and Disaster Recovery Planning 49:7
      • 8.1 Business Continuity and Disaster Recovery Planning 1:51
      • 8.2 Objectives 1:32
      • 8.3 Importance of Business Continuity and Disaster Recovery Planning 1:41
      • 8.4 Basic Concepts 1:31
      • 8.5 Need for Planning 1:56
      • 8.6 Disruptive Events 3:27
      • 8.7 Business Continuity Planning (BCP) 1:49
      • 8.8 Disaster Recovery Planning 1:47
      • 8.9 Disaster Recovery Process 0:0
      • 8.10 Business Scenario 1:56
      • 8.11 BCP DRP Phases 1:40
      • 8.12 Importance of BCP DRP 1:32
      • 8.13 BCP DRP Phase 1:55
      • 8.14 BCP DRP Phase 1 Project Initiation and Scoping 3:56
      • 8.15 BCP DRP Phase 2 Business Impact Analysis (BIA) 2:12
      • 8.16 Business Impact Analysis Goals 0:0
      • 8.17 Business Impact Analysis Steps 5:18
      • 8.18 BIA Steps Business Unit Level 2:8
      • 8.19 Maximum Tolerable Downtime (MTD) 2:48
      • 8.20 Failure and Recovery Metrics 0:0
      • 8.21 Stages of Failure and Recovery 1:54
      • 8.22 BCP DRP Phase 3 Identify Preventive Controls 2:20
      • 8.23 BCP DRP Phase 4 Recovery Strategy 2:19
      • 8.24 Types of Recovery 0:0
      • 8.25 Recovery Partners Strategy 3:46
      • 8.26 Backup Sites 0:0
      • 8.27 Best Practices for Recovery 2:32
      • 8.28 BCP DRP Phase 5 Plan Design and Development 1:39
      • 8.29 Planning Design and Development Steps 0:0
      • 8.30 BCP DRP Phase 6 Implementation Testing and Training 1:39
      • 8.31 Importance of Testing 1:20
      • 8.32 Types of Testing 0:0
      • 8.33 Training 3:58
      • 8.34 BCP DRP Phase 7 Maintenance 4:1
      • 8.35 Business Scenario 2:6
      • 8.36 BCP DRP Frameworks 1:56
      • 8.37 BCP DRP Frameworks 0:0
      • 8.38 Best Practices 1:43
      • 8.39 BCP DRP Mistakes 1:49
      • 8.40 BCP DRP Best Practices 2:7
      • 8.41 BCP DRP Best Practices (Contd.) 4:53
      • 8.42 Business Scenario 1:52
      • 8.43 Quiz 0:0
      • 8.44 Summary 2:6
      • 8.45 Thank you 1:8
    • Domain 09 - Legal Regulations Investigations and Compliance 48:37
      • 9.1 Legal Regulations Investigations and Compliance 1:41
      • 9.2 Objectives 1:29
      • 9.3 Importance of Legal Regulations Investigations and Compliance 1:32
      • 9.4 Computer Crimes 1:17
      • 9.5 Cybercrime Definition 1:29
      • 9.6 Introduction to Computer Crimes 1:57
      • 9.7 Categories of Computer Crimes 0:0
      • 9.8 Business Scenario 1:54
      • 9.9 Major Legal Systems 1:12
      • 9.10 Introduction to Legal Systems 1:47
      • 9.11 Major Types of Legal Systems 0:0
      • 9.12 Business Scenario 1:39
      • 9.13 Intellectual Property Law 1:15
      • 9.14 Introduction to Intellectual Property (IP) Law 2:4
      • 9.15 Types of Intellectual Property (IP) Law 0:0
      • 9.16 Business Scenario 1:42
      • 9.17 Privacy 1:11
      • 9.18 Introduction to Privacy 3:2
      • 9.19 U. S. Privacy Laws 3:37
      • 9.20 U. S. guidelines for managing privacy 2:45
      • 9.21 EU Council Directive (Law) on Data Protection 2:20
      • 9.22 The U. S. European Union Safe Harbor 3:6
      • 9.23 Incident Response 1:22
      • 9.24 Incident Response Terminologies 2:56
      • 9.25 Incident Response Goals 1:31
      • 9.26 Incident Response Team 2:41
      • 9.27 Incident response procedures 0:0
      • 9.28 Business Scenario 1:57
      • 9.29 Investigations 1:9
      • 9.30 Introduction to Investigations 1:46
      • 9.31 Investigation Challenges 2:7
      • 9.32 Investigations Primary Activities 2:53
      • 9.33 Evidence 2:25
      • 9.34 Evidence Lifecycle 2:19
      • 9.35 Chain of Evidence 2:6
      • 9.36 Types of Evidence 4:51
      • 9.37 Role of Computer Forensics 1:52
      • 9.38 Business Scenario 1:46
      • 9.39 Compliance 1:22
      • 9.40 Need for Compliance 2:26
      • 9.41 Regulatory compliance 1:47
      • 9.42 Compliance Auditing Reporting and Process Function 0:0
      • 9.43 Standards Manual Guidelines for Compliance 3:29
      • 9.44 Third Party Governance and Security 2:50
      • 9.45 (ISC)2 Code of Ethics 1:13
      • 9.46 Preamble and Canons of (ISC)2 Code of Ethics 3:34
      • 9.47 Quiz 0:0
      • 9.48 Summary 2:9
      • 9.49 Thank you 1:7
    • Domain 10 - CISSP Operations Security 50:51
      • 10.1 CISSP Operations Security 1:57
      • 10.2 Objectives 1:28
      • 10.3 Importance of Operations Security 1:46
      • 10.4 Operations Security Concepts 1:29
      • 10.5 Introduction to Operations Security 1:39
      • 10.6 Operations Security Concepts 0:0
      • 10.7 Operations Security Domain 2:2
      • 10.8 Effects of operational controls on C. I. A. 1:32
      • 10.9 Business Scenario 2:6
      • 10.10 Maintaining Operational Resilience 1:36
      • 10.11 Operational Resilience 1:45
      • 10.12 Threats to Operations 0:0
      • 10.13 Vulnerabilities 0:0
      • 10.14 Controls 0:0
      • 10.15 Business Scenario 1:48
      • 10.16 Maintaining Resilient Systems 1:22
      • 10.17 Importance of Maintaining Resilient Systems 3:16
      • 10.18 Redundancy and Fault Tolerance 2:56
      • 10.19 Redundancy and Fault Tolerance Methods 0:0
      • 10.20 Business Scenario 1:45
      • 10.21 Protecting Valuable Assets 1:44
      • 10.22 Need to Protect Valuable Assets 1:54
      • 10.23 Protecting Physical Assets 1:3
      • 10.24 Protecting Information Assets 2:10
      • 10.25 Protecting Resources 2:35
      • 10.26 Controls for Protecting Assets 0:0
      • 10.27 Business Scenario 1:42
      • 10.28 Controlling Privileged Accounts 1:28
      • 10.29 Need for Controlling Privileged Accounts 1:59
      • 10.30 Identity and Access Management 2:36
      • 10.31 Types of Accounts 2:31
      • 10.32 Commonly Used Roles 0:0
      • 10.33 Business Scenario 1:49
      • 10.34 Managing Security Services Effectively 1:27
      • 10.35 Need for Effective Management of Security Services 2:59
      • 10.36 Monitoring Techniques 0:0
      • 10.37 Anti Malware Systems 2:2
      • 10.38 Media Resource Protection 4:32
      • 10.39 Business Scenario 1:43
      • 10.40 Key Operational Processes and Procedures 1:32
      • 10.41 Operational Processes and Procedures 1:29
      • 10.42 Backup Methods 0:0
      • 10.43 Trusted Recovery and System Recovery 2:56
      • 10.44 Incident Management 2:48
      • 10.45 Problem Management 2:32
      • 10.46 Change Management 2:43
      • 10.47 Change Control Process 2:25
      • 10.48 Configuration Management 3:59
      • 10.49 Patch Management 2:5
      • 10.50 Auditing 3:53
      • 10.51 Business Scenario 1:40
      • 10.52 Quiz 0:0
      • 10.53 Summary 2:3
      • 10.54 Thank you 1:5
    • Course Summary 6:41
      • Course Summary 6:41
    • Tips and Tricks 49:22
      • Topics 5:18
      • Information Security Governance And Risk Management 5:1
      • Access Controls 4:54
      • Security Architecture Design 5:3
      • Physical And Environmental Security 5:13
      • Network And Telecommunication Security 5:45
      • Software Development Security 4:51
      • Cryptography 5:17
      • Business Continuity Disaster Recovery Planning 5:56
      • Legal Regulations Investigations And Compliance 4:45
      • Operations Security 4:43
      • Tricky Questions 2:31
      • Time Management 2:5
  • What is this course about?

    The Certified Information Systems Security Professional program governed by the International Information Systems Security Certification Consortium (ISC2) is globally recognized as a standardized body of knowledge for confirming professionals’ knowledge in the field of information security.

    Simplilearn’s training in Certified Information Systems Security Professional (CISSP) is an ideal course package for every aspiring professional who wants to build their career in information security sector.

    The CISSP professional will be able to define the architecture, design, and management which are important factors to assure security of an organization. They will also be able to create and operate duties related to information security programs.

    The main aim of this course is to provide knowledge on information security and governance, risk management, software development security and related concepts which will enable a professional to cope up with the growing demand of protecting an organization’s information and assets.

  • Why is the certification most sought-after?

    CISSP is one of the most demanding certifications in the field of information security as this confirms an individual’s knowledge of the various domains of information security.
    According to Symantec Corp. (security software company), in 2011, the global cost of cyber-attacks estimated around $388 billion, which has increased the demand of IT professionals with CISSP certification.

    Simplilearn’s CISSP course will help a professional acquire the skills to design architecture and manage controls to ensure the security of business environments. With this certification, you will be able to successfully handle security issues in cloud computing, mobiles, application development, risk management, and more. The best thing about CISSP is that it will enable you to align security with business requirements.
    According to one of the major employment websites, more than 70% of information security jobs required CISSP certification.

  • What are the career benefits in-store for you?

    A CISSP certified professional with a working knowledge in the field of information security will have an upward career graph. Such a professional can work as information security manager, security consultant, security architect, and so on. They will find good opportunities in various industries including the IT sector.
    • Salary survey conducted by a Certification Magazine ranked CISSP as the top best-paid credentials in IT.
    • According to a survey conducted in 2008, IT professionals with CISSP certification tend to earn $21,000 more when compared to IT professionals without CISSP certification.
    • According to PayScale.com the salary for a CISSP professional ranges from $60,000 to $160,000.

  • Who should do this course?

    The CISSP certification course is suitable for IT managers, security consultants, security analysts, IT professionals, network engineers, and so on.

  • Why Simplilearn?

    1. Simplilearn is the World’s Largest Certification Training Provider, with over 400,000+ professionals trained globally
    2. Trusted by the Fortune 500 companies as their learning provider for career growth and training
    3. 2000+ certified and experienced trainers conduct trainings for various courses across the globe
    4. All our Courses are designed and developed under a tried and tested Unique Learning Framework that is proven to deliver 98.6% pass rate in first attempt
    5. Accredited, Approved and Recognized as a training organization, partner, education provider and examination center by globally renowned names like Project Management Institute of USA, APMG, CFA Institute, GARP, ASTQB, IIBA and others

Exam & Certification

  • What are the prerequisites for the certification?

    To attain the CISSP certification, a candidate must have five years of security work experience in two or more domains of (ISC)2 or four years of security work experience in two or more domains along with a college degree.

FAQs

  • How do I enroll for the online training?

    You can enroll for the training online. Payments can be made using any of the following options and receipt of the same will be issued to the candidate automatically via email.

    1. Visa debit/credit card
    2. American express and Diners club card
    3. Master Card, or
    4. Through PayPal

  • What will I get along with this training?

    You will have access to the online e-learning and practice tests along with the training.

  • Can I cancel my enrollment? Do I get a refund?

    Yes, you can cancel your enrollment. We provide you complete refund after deducting the administration fee. To know more please go through our Refund Policy.

  • Do you provide money back guarantee for the training programs?

    Yes, we do provide money back guarantee for some of our training programs. You can contact support@simplilearn.com for more information.

  • Can I extend the access period?

    Yes, you can extend the access period by paying an additional fee. Contact support@simplilearn.com for more information.

  • Where and how can I access the e-learning content? Are there any limitations?

    Once you register with us for a course by paying the course fee, you can have 24/7 access to the e-learning content on our website. An automated course purchase confirmation mail from our side will guide you through the process.

  • I am not able to access the online course. Whom should I contact for a solution?

    Please send an email to support@simplilearn.com. You can also chat with us to get an instant solution.

  • What is the pre-requisite for taking the (ISC)2 Certified Information Systems Security Professional (CISSP®) test?

    Candidates must have a minimum of five years of full-time security professional work experience in two or more of the ten domains of the (ISC)2 CISSP® Common Body of Knowledge (CBK). They have to subscribe to the (ISC)2 Code of Ethics.

  • What certification does the training provide?

    CISSP® certification is provided after the completion of CISSP® test.

  • What is the duration of the test?

    You are required to attempt all questions in 6 hours.

  • What is the pre-requisite for taking the (ISC)2 Certified Information Systems Security Professional (CISSP®) test?

    Candidates must have a minimum of five years of full-time security professional work experience in two or more of the ten domains of the (ISC)2 CISSP® Common Body of Knowledge (CBK). They have to subscribe to the (ISC)2 Code of Ethics.

  • What certification does the training provide?

    CISSP® certification is provided after the completion of CISSP® test.

  • What is the structure of the test?

    The test consists of multiple-choice questions. There are no case study type questions, and the test is not adaptive. You will be required to attempt approximately 250 questions.

  • What role does American National Standards Institute (ANSI) in CISSP certification?

    All the ISC2 are accredited by American National Standards Institute (ANSI)

  • What are the learning elements included in this course?

    Simplilearn’s CISSP includes:

    • 1 introductory lesson and 10 core lessons, each lesson covering one domain of ISC2
    • 100+ quizzes across all lessons
    • 2 case studies covering a comprehensive scenario
    • 5 CISSP Simulation Exams
    • 13 tips and tricks videos
    • Exclusive versions of Glossary and Acronyms related to CISSP

Reviews

The course was well balanced and covered each domain clearly and in good detail. The instructor was very knowledgeable and led a very effective course.

Read more Read less

I would like to thank Simplilearn to provide a knowledgeable trainer. It was a great experience with Simplilearn team.

The course was aptly handled. The bullet points were perfect; the content extensive. Faculty was cool, and made things look like reachable.

Read more Read less

It has been quite an interactive course. I really appreciate his knowledge. I would recommened it to others.

One of the interesting and interactive sessions I have ever attended.

Drop us a Query
Name *
Email *
Your Query *
Looking for a training for
Myself My team/organization
I agree to be contacted over email
1800-232-5454(9am-7pm)
We are looking into your query.
Our consultants will get in touch with you soon.
 
Group Buy

corporatesales@simplilearn.com

Knowledge Bank

Request for a custom quote

Please fill in the details and our inhouse support team will get back to you within 1 business day

Name*

Email*

Phone*

Course
Company
Looking for*
Online license
training
Onsite
training
Online Virtual
training
Please select one of the above
Your Query
I agree to be contacted over mail
Please accept to proceed
/index/hidden/ - Never remove this line