CISSP® online training

  • 4.3
  • 2,202 Learners
  • Online Self Learning

Introduction Video

View Course Introduction

Key Features

About the course

What is this course about?
The Certified Information Systems Security Professional program governed by the International Information Systems Security Certification Consortium (ISC2) is globally recognized as a standardized body of knowledge for confirming professionals’ knowledge in the field of information security.

Simplilearn’s training in Certified Information Systems Security Professional (CISSP) is an ideal course package for every aspiring professional who wants to build their career in information security sector.

The CISSP professional will be able to define the architecture, design, and management which are important factors to assure security of an organization. They will also be able to create and operate duties related to information security programs.

The main aim of this course is to provide knowledge on information security and governance, risk management, software development security and related concepts which will enable a professional to cope up with the growing demand of protecting an organization’s information and assets.

Why is this certification popular?
CISSP is one of the most demanding certifications in the field of information security as this confirms an individual’s knowledge of the various domains of information security.
According to Symantec Corp. (security software company), in 2011, the global cost of cyber-attacks estimated around $388 billion, which has increased the demand of IT professionals with CISSP certification.

Simplilearn’s CISSP course will help a professional acquire the skills to design architecture and manage controls to ensure the security of business environments. With this certification, you will be able to successfully handle security issues in cloud computing, mobiles, application development, risk management, and more. The best thing about CISSP is that it will enable you to align security with business requirements.
According to one of the major employment websites, more than 70% of information security jobs required CISSP certification.

Why should you do this course?
Industries and corporations are demanding experienced information security professionals with the CISSP certification so as to protect their information and assets. Knowledge of CISSP will help you in moving from field work into management positions. It will also enhance your credibility within the organization you are working.

This course focuses on the various domains of information security. The CISSP examination is based on what the (ISC)² terms as the Common Body of Knowledge (or CBK). According to (ISC)², the CISSP CBK is taxonomy, that is, a collection of topics relevant to information security professionals worldwide. The CISSP CBK establishes a common framework of information security terms and principles that allow information security professionals to discuss, debate, and resolve matters in their profession with a common understanding. When you take up this course, you get acquainted with this framework of information security principles that help you deliver your best in protecting the assets of an organization.
According to the Global Information Security Workforce Study conducted by (ISC)² in partnership with Frost & Sullivan, certified information security professionals earn a worldwide average of 25% more than their non-certified counterparts.

What learning benefits do you get from Simplilearn’s training?
At the end of Simplilearn’s training in CISSP, you will be able to:
  • Define CISSP®
  • Explain about (ISC)²®
  • List down the different CISSP® domains
  • Understand the need for CISSP®
  • Describe Security Policy Implementation
  • Describe Information Risk Analysis and Risk Management
  • Explain methodologies of access control and their implementation
  • Describe the Architecture Frameworks
  • Describe various secure network architecture and designs
  • List the ten best practices for secure software development – (ISC)²
  • Explain the basic concepts in cryptography
  • Describe the recovery plan development, implementation, and restoration
  • Discuss compliance
  • Describe the process of effective security services management
You will develop competence in dealing with security issues related to cloud computing, mobile security, application development security, risk management, and more. You will also be able to recognize system security threats and identify countermeasures.

What are the career benefits in-store for you?
A CISSP certified professional with a working knowledge in the field of information security will have an upward career graph. Such a professional can work as information security manager, security consultant, security architect, and so on. They will find good opportunities in various industries including the IT sector.
  • Salary survey conducted by a Certification Magazine ranked CISSP as the top best-paid credentials in IT.
  • According to a survey conducted in 2008, IT professionals with CISSP certification tend to earn $21,000 more when compared to IT professionals without CISSP certification.
  • According to PayScale.com the salary for a CISSP professional ranges from $60,000 to $160,000.
How do I become Certified CISSP Professional?
You can get certified from International Information Systems Security Certification Consortium (ISC2) in CISSP:
  1. By appearing for the CISSP exam and scoring a minimum of 700 points or more.
  2. After passing the CISSP exam, within nine months, you need to submit the Application Endorsement Form. After five to six weeks of the submission, you will receive an email informing that you have passed the endorsement process and will be certified.
Who should do this course?
The CISSP certification course is suitable for IT managers, security consultants, security analysts, IT professionals, network engineers, and so on.

What qualifications do you need?
To attain the CISSP certification, a candidate must have five years of security work experience in two or more domains of (ISC)2 or four years of security work experience in two or more domains along with a college degree.

Case studies
To enhance your understanding of the concepts, the course comprises 2 downloadable case studies titled Tackling Acquisition Challenges and Effects of Social Engineering on Regulatory Compliance respectively. Both the case studies are aimed at the processed food.

Tips and Tricks
There are 13 tips and tricks videos for this course. There are 3 tips and tricks for Information Security Governance & Risk Management, and 5 tips and tricks for Security Architecture & Design and Software Development Security respectively.

Course Preview

  • CISSP
      Course Introduction Domain 00 - CISSP Introduction Domain 01 - Information Security Governance and Risk Management
      • 1.1 Information Security Governance and Risk Management     1:00
      • 1.2 Objective     1:00
      • 1.3 Importance of Information Security Governance and Risk Management     1:00
      • 1.4 Goals Mission and Objectives of Organization     1:00
      • 1.5 Role and Importance of Goals Mission and Objectives     1:00
      • 1.6 Goals Mission and Objectives    
      • 1.7 Aligning Security with Goals Mission and Objectives     1:00
      • 1.8 Business Scenario     1:00
      • 1.9 Information Security Management    
      • 1.10 Types of Computing Platforms    
      • 1.11 Information Security Governance     1:00
      • 1.12 Security Controls     1:00
      • 1.13 Types of Security Controls    
      • 1.14 Organizational Processes    
      • 1.15 Service Level Agreements     1:00
      • 1.16 Managing Third Party Governance     2:00
      • 1.17 Offshoring Privacy Requirements and Compliance     1:00
      • 1.18 Business Scenario     1:00
      • 1.19 The Big Three CIA     1:00
      • 1.20 Role and Importance of CIA in ISM     1:00
      • 1.21 Confidentiality     2:00
      • 1.22 Integrity     2:00
      • 1.23 Availability     1:00
      • 1.24 Information Classification     1:00
      • 1.25 Need for Information Classification     1:00
      • 1.26 Information Classification Objectives     1:00
      • 1.27 Government or Military Sector Classification     2:00
      • 1.28 Commercial or Private Sector Classification     2:00
      • 1.29 Information Classification Criteria     2:00
      • 1.30 Layers of Responsibility    
      • 1.31 Business Scenario     1:00
      • 1.32 Security Policy Implementation     1:00
      • 1.33 Security Policies     2:00
      • 1.34 Types of Security Policies    
      • 1.35 Security Policy Implementation    
      • 1.36 Policy Chart     1:00
      • 1.37 Standards Guidelines Procedures and Baselines    
      • 1.38 Business Scenario     1:00
      • 1.39 Information Risk Management    
      • 1.40 Security Definitions    
      • 1.41 Information Risk Management     1:00
      • 1.42 Business Scenario     1:00
      • 1.43 Risk Analysis     1:00
      • 1.44 Introduction to Risk Analysis     1:00
      • 1.45 Goals of Risk Analysis    
      • 1.46 Risk Analysis Team     1:00
      • 1.47 Steps for Risk Analysis     1:00
      • 1.48 Information and Assets Valuation     1:00
      • 1.49 Risk Analysis Types     1:00
      • 1.50 Quantitative Risk Analysis Steps     2:00
      • 1.51 Quantitative Risk Analysis Problem     1:00
      • 1.52 Qualitative Risk Analysis     1:00
      • 1.53 Delphi Technique     1:00
      • 1.54 Quantitative vs Qualitative     1:00
      • 1.55 Countermeasure Selection Problem     2:00
      • 1.56 Handling Risk     2:00
      • 1.57 Business Scenario     1:00
      • 1.58 Managing Personnel Security    
      • 1.59 Importance of Managing Personnel Security     1:00
      • 1.60 Managing Personnel Security    
      • 1.61 Vendor Contractors and Consultant Controls     1:00
      • 1.62 Business Scenarios     1:00
      • 1.63 Best Work Practices     2:00
      • 1.64 Security Awareness Training    
      • 1.65 Importance of Security Awareness Training     1:00
      • 1.66 Awareness Training and Education     1:00
      • 1.67 Security Awareness Training Implementation     1:00
      • 1.68 Managing Security Function    
      • 1.69 Importance of Managing Security Function     1:00
      • 1.70 Managing Security Function Best Practices    
      • 1.71 Business Scenario     1:00
      • 1.72 Summary     1:00
      • 1.73 Thank you    
      Domain 02 - Access Control
      • 2.1 Access Control     1:00
      • 2.2 Objectives     1:00
      • 2.3 Importance of Access Control in Informartion Security     1:00
      • 2.4 Overview of Access Control    
      • 2.5 Access Subject Object and Access controls    
      • 2.6 Identification Authentication and Authorization     1:00
      • 2.7 Privacy Accountability and Identity Management    
      • 2.8 Identity and Access Provisioning Lifecycle     1:00
      • 2.9 Identification Authentication and Authorization    
      • 2.10 Verifying Identification Information     2:00
      • 2.11 Strong Authentication    
      • 2.12 Biometrics Characteristics     2:00
      • 2.13 Types of Biometrics     2:00
      • 2.14 FRR FAR CER    
      • 2.15 Passwords     1:00
      • 2.16 Password Management     2:00
      • 2.17 Password Types     2:00
      • 2.18 Token Device    
      • 2.19 Memory Cards and Smart Cards     2:00
      • 2.20 Attacks on Smart Cards    
      • 2.21 Access Criteria     2:00
      • 2.22 Authorization Concepts    
      • 2.23 Single Sign On (SSO)     2:00
      • 2.24 SSO Technologies     1:00
      • 2.25 Kerberos     3:00
      • 2.26 Kerberos Steps     2:00
      • 2.27 Problems with Kerberos     1:00
      • 2.28 Business Scenario     1:00
      • 2.29 Types of Access Control    
      • 2.30 Access Control Types     3:00
      • 2.31 Business Scenario    
      • 2.32 Access Control Models    
      • 2.33 Access Control Models    
      • 2.34 Business Scenario    
      • 2.35 Access Control Concepts    
      • 2.36 Access Control Concepts    
      • 2.37 Access Control Administration    
      • 2.38 Types of Access Control Administration     2:00
      • 2.39 Remote Authentication Dial In User Service (RADIUS)     2:00
      • 2.40 TACACS and TACACS+     1:00
      • 2.41 DIAMETER     1:00
      • 2.42 Accountability     2:00
      • 2.43 Access Control Monitoring    
      • 2.44 Unauthorized Disclosure of Information     4:00
      • 2.45 Intrusion Detection System     3:00
      • 2.46 Access Control Monitoring Methods    
      • 2.47 Access Control Testing    
      • 2.48 Threats and Best Practices    
      • 2.49 Threats to Access Control     4:00
      • 2.50 Access Control Best Practices     1:00
      • 2.51 Quiz    
      • 2.52 Summary     1:00
      • 2.53 Thank you    
      Domain 03 - Security Architecture and Design
      • 3.1 Security Architecture and Design     1:00
      • 3.2 Objectives     1:00
      • 3.3 Importance of Security Architecture and Design     1:00
      • 3.4 Architecture Framework    
      • 3.5 Architecture Framework Definition     2:00
      • 3.6 Common Architecture Frameworks    
      • 3.7 Creating a Security Architecture    
      • 3.8 ISOIEC 270012005 Security Standards     1:00
      • 3.9 ISOIEC 27002 Code of Practice for Information Security Management     2:00
      • 3.10 Security Models    
      • 3.11 Security Models Definition     1:00
      • 3.12 Common Security Models    
      • 3.13 Examples of Security Models Bell LaPadula Confidentiality Model     2:00
      • 3.14 Examples of Security Models Biba Integrity Model     1:00
      • 3.15 Examples of Security Models Clark Wilson Integrity Model     1:00
      • 3.16 Examples of Security Models     1:00
      • 3.17 Business Scenario     1:00
      • 3.18 Evaluation Criteria    
      • 3.19 Evaluation Criteria and its Uses     1:00
      • 3.20 Types of Evaluation Criteria     1:00
      • 3.21 Trusted Computer System Evaluation Criteria     2:00
      • 3.22 Information Technology Security Evaluation Criteria     1:00
      • 3.23 Common Criteria     1:00
      • 3.24 Common Criteria Evaluation Process     1:00
      • 3.25 Common Criteria Levels     1:00
      • 3.26 Payment Card Industry Data Security Standard     1:00
      • 3.27 Identity and Access Provisioning Lifecycle     2:00
      • 3.28 SEI CMMI    
      • 3.29 Business Scenario     1:00
      • 3.30 Enterprise Security Architecture    
      • 3.31 Enterprise Security Architecture     2:00
      • 3.32 Common Security Services in ESA     2:00
      • 3.33 SABSA Framework     1:00
      • 3.34 SABSA Matrix     4:00
      • 3.35 Business Scenario     1:00
      • 3.36 System Security Architecture    
      • 3.37 System Security Architecture Definition     1:00
      • 3.38 Types of Computing Platforms    
      • 3.39 System Components    
      • 3.40 Distributed Systems    
      • 3.41 Distributed Systems Definition    
      • 3.42 Types of Distributed Systems    
      • 3.43 Business Scenario     1:00
      • 3.44 Security Threats and Countermeasures    
      • 3.45 System Vulnerabilities and Threats     6:00
      • 3.46 Best Practices     1:00
      • 3.47 Best Practices Techniques and Technologies    
      • 3.48 Quiz    
      • 3.49 Summary     1:00
      • 3.50 Thank you    
      Domain 04 - Physical (Environmental) Security
      • 4.1 Physical (Environmental) Security     1:00
      • 4.2 Objectives    
      • 4.3 Importance of Physical and Environmental Security     1:00
      • 4.4 Need for Physical and Environmental Security    
      • 4.5 Need for Physical and Environmental Security     2:00
      • 4.6 Business Scenario     1:00
      • 4.7 Site and Facility Design Criteria    
      • 4.8 Site and Facility Design     3:00
      • 4.9 Information Protection Environment     1:00
      • 4.10 Areas of Consideration for Information Protection Environment    
      • 4.11 Business Scenario     1:00
      • 4.12 Perimeter Security    
      • 4.13 Importance of Perimeter Security     1:00
      • 4.14 Barriers and Fences     2:00
      • 4.15 Gates     2:00
      • 4.16 Walls and Bollards     1:00
      • 4.17 Perimeter Intrusion Detection     1:00
      • 4.18 Open Terrain Sensors    
      • 4.19 Business Scenario     1:00
      • 4.20 Importance of Lighting     1:00
      • 4.21 Types of Lighting Systems     1:00
      • 4.22 Types of Lights     1:00
      • 4.23 Access Control    
      • 4.24 Access Control System     1:00
      • 4.25 Types of Access Control Systems    
      • 4.26 Business Scenario     1:00
      • 4.27 Building and Inside Security    
      • 4.28 Means to ensure building security    
      • 4.29 Business Scenario     1:00
      • 4.30 Secure Operational Areas    
      • 4.31 Areas    
      • 4.32 Business Scenario     1:00
      • 4.33 Environmental Controls    
      • 4.34 Classes of Fires     1:00
      • 4.35 Fire Detection and Suppression    
      • 4.36 Power Supply     2:00
      • 4.37 HVAC     1:00
      • 4.38 Training and Awareness    
      • 4.39 Business Scenario     1:00
      • 4.40 Quiz    
      • 4.41 Summary     1:00
      • 4.42 Thank you    
      Domain 05 - Telecommunications and Network security
      • 5.1 Telecommunications and Network Security     1:00
      • 5.2 Objectives    
      • 5.3 Importance of Telecommunications and Network Security in Information Security     1:00
      • 5.4 Secure Network Architecture and Design     1:00
      • 5.5 Introduction to IP Addressing     1:00
      • 5.6 IPv4 and IPv6    
      • 5.7 Classful IP Addressing    
      • 5.8 Classless Inter Domain Routing     3:00
      • 5.9 Private Networks and Loopback Address    
      • 5.10 Types of IP Addressing     1:00
      • 5.11 Routed and Routing Protocols     2:00
      • 5.12 Types of Network Protocols    
      • 5.13 Introduction to Secure Network Architecture and Design    
      • 5.14 Open Systems Interconnection     4:00
      • 5.15 Working of the OSI Model     1:00
      • 5.16 OSI Model Layers    
      • 5.17 Transmission Control Protocol Internet Protocol (TCP IP) Model     1:00
      • 5.18 TCP IP Model Layers    
      • 5.19 Comparison of OSI and TCP IP Models     1:00
      • 5.20 LAN Network Technologies    
      • 5.21 Securing Network Components    
      • 5.22 Transmission Media    
      • 5.23 Types of Transmission Media    
      • 5.24 Network Topologies     2:00
      • 5.25 Media Access Technologies     1:00
      • 5.26 Carrier Sense Multiple Access (CSMA)     1:00
      • 5.27 CSMA Functional Variations    
      • 5.28 Flavors of LAN transmission methods     1:00
      • 5.29 Networking Devices    
      • 5.30 List of Networking Devices    
      • 5.31 VLANs and Gateways    
      • 5.32 Network Access Control Devices     1:00
      • 5.33 Types of Firewalls     4:00
      • 5.34 Firewall Architectures     3:00
      • 5.35 Network Security Terms     2:00
      • 5.36 Business Scenario    
      • 5.37 Secure Communication Channels     1:00
      • 5.38 Networks    
      • 5.39 Types of Networks     1:00
      • 5.40 WAN Technologies     1:00
      • 5.41 Types of WAN Technologies    
      • 5.42 Introduction to Remote Access     1:00
      • 5.43 Remote Access Protocols    
      • 5.44 Remote Access Security Methods     1:00
      • 5.45 Multimedia Collaboration     1:00
      • 5.46 Wireless Technologies    
      • 5.47 Bluetooth     2:00
      • 5.48 Bluetooth Attack    
      • 5.49 Wireless Security     6:00
      • 5.50 Business Scenario     1:00
      • 5.51 Network Attacks and Countermeasures    
      • 5.52 Network Attacks     3:00
      • 5.53 Network Attacks (contd.)     2:00
      • 5.54 Network Attacks Countermeasures     3:00
      • 5.55 Quiz    
      • 5.56 Summary     1:00
      • 5.57 Thank you    
      Domain 06 - Software Development Security
      • 6.1 Software Development Security     1:00
      • 6.2 Objectives    
      • 6.3 Importance of Software Development Security     1:00
      • 6.4 System Environments    
      • 6.5 Introduction to System Environments and Information Security     1:00
      • 6.6 System Environments    
      • 6.7 Programming Concepts     1:00
      • 6.8 Complier Vs. Interpreter     2:00
      • 6.9 Programming and Software     2:00
      • 6.10 Threats in the Software Environment    
      • 6.11 Business Scenario     1:00
      • 6.12 System Life Cycle and Systems Development     1:00
      • 6.13 Capability Maturity Model (CMM) Levels     2:00
      • 6.14 Systems Development Life Cycle (SDLC)     2:00
      • 6.15 Introduction to Software Testing     1:00
      • 6.16 Software Testing Methods     3:00
      • 6.17 Software testing levels     1:00
      • 6.18 Application Controls     1:00
      • 6.19 Software Development Methods    
      • 6.20 Java Security     1:00
      • 6.21 Secure Software Development Best Practices     1:00
      • 6.22 Business Scenario     1:00
      • 6.23 Object Oriented Programming    
      • 6.24 Object Oriented Programming Terms    
      • 6.25 Object Oriented Programming Definition     1:00
      • 6.26 Distributed Object Oriented Systems     2:00
      • 6.27 Object Request Brokers    
      • 6.28 Software Security and Assurance    
      • 6.29 Software Security Methods    
      • 6.30 Software Security XML and SAML     1:00
      • 6.31 Software Security SOA     2:00
      • 6.32 Audit and Assurance Mechanisms     2:00
      • 6.33 Business Scenario     1:00
      • 6.34 Database and Data Warehousing Environments    
      • 6.35 Database Concepts     1:00
      • 6.36 Database Terms     1:00
      • 6.37 Types of Databases    
      • 6.38 Database Threats and Vulnerabilities     5:00
      • 6.39 Introduction to Data Warehousing     1:00
      • 6.40 Data Warehousing Concepts     2:00
      • 6.41 Database Normalization     1:00
      • 6.42 DBMS Controls     5:00
      • 6.43 Business Scenario     1:00
      • 6.44 Malwares    
      • 6.45 Types of Malwares     5:00
      • 6.46 Malware Protection     2:00
      • 6.47 Business Scenario     1:00
      • 6.48 Knowledge Management    
      • 6.49 Importance and Role of Knowledge Management     1:00
      • 6.50 Knowledge based system Artificial intelligence     1:00
      • 6.51 Knowledge based system Expert system     1:00
      • 6.52 Knowledge based system Neural network     2:00
      • 6.53 Web Application Environment    
      • 6.54 Web Application Environment Threats and Vulnerabilities     2:00
      • 6.55 Web Application Environment Security    
      • 6.56 The 10 Best Practices    
      • 6.57 The Ten Best Practices for Secure Software Development (ISC)2     6:00
      • 6.58 Quiz    
      • 6.59 Summary     1:00
      • 6.60 Thank you    
      Domain 07 - Cryptography
      • 7.1 Cryptography     1:00
      • 7.2 Objectives    
      • 7.3 Importance of Cryptography     1:00
      • 7.4 Cryptography Concepts    
      • 7.5 Introduction to Cryptography     3:00
      • 7.6 Cryptography Terms     5:00
      • 7.7 Strength of a Cryptosystem     2:00
      • 7.8 Cryptography Methods    
      • 7.9 Business Scenario     1:00
      • 7.10 Symmetric Cryptography     1:00
      • 7.11 Introduction to Symmetric Cryptography     2:00
      • 7.12 Symmetric Key Ciphers     1:00
      • 7.13 Block Cipher     1:00
      • 7.14 Stream Cipher     2:00
      • 7.15 Block Cipher Designs     1:00
      • 7.16 Data Encryption Standard (DES)     2:00
      • 7.17 DES Algorithm     2:00
      • 7.18 DES Operation Modes    
      • 7.19 Triple DES     2:00
      • 7.20 Advanced Encryption Standard (AES)     1:00
      • 7.21 AES Algorithm     2:00
      • 7.22 Other Symmetric Systems    
      • 7.23 Business Scenario     1:00
      • 7.24 Asymmetric Cryptography    
      • 7.25 Introduction to Asymmetric Cryptography     2:00
      • 7.26 Introduction to RSA Algorithm     1:00
      • 7.27 RSA Algorithm Process     1:00
      • 7.28 Other Types of Asymmetric Cryptography     2:00
      • 7.29 Public Key Cryptography     1:00
      • 7.30 Symmetric vs. Asymmetric Cryptography    
      • 7.31 Symmetric vs. Asymmetric Cryptography     3:00
      • 7.32 Advantages and Disadvantages     1:00
      • 7.33 Hash Function    
      • 7.34 Hashing Algorithms    
      • 7.35 Public Key Infrastructure    
      • 7.36 Introduction to Public Key Infrastructure     2:00
      • 7.37 PKI Certification    
      • 7.38 PKI Steps Part 1     1:00
      • 7.39 PKI Steps Part 2     1:00
      • 7.40 One Way Hash     1:00
      • 7.41 Message Authentication Code (MAC)     2:00
      • 7.42 Digital Signatures     1:00
      • 7.43 Key Management    
      • 7.44 Key Management     1:00
      • 7.45 Key Management Principles     2:00
      • 7.46 Escrowed Encryption     2:00
      • 7.47 Business Scenario     1:00
      • 7.48 Internet Security    
      • 7.49 Need for Internet Security     1:00
      • 7.50 Secure Access Protocols    
      • 7.51 Internet Security Protocol (IPsec)     1:00
      • 7.52 Internet Security Protocol (IPsec) Modes of Operation     2:00
      • 7.53 IPsec Security Protocols    
      • 7.54 Components of the IPsec Process     3:00
      • 7.55 IPsec Process     1:00
      • 7.56 Attacks on Cryptography    
      • 7.57 Attacks     7:00
      • 7.58 Best Practices     1:00
      • 7.59 Business Scenario     1:00
      • 7.60 Quiz    
      • 7.61 Summary     1:00
      • 7.62 Thank you    
      Domain 08 - Business Continuity and Disaster Recovery Planning
      • 8.1 Business Continuity and Disaster Recovery Planning     1:00
      • 8.2 Objectives     1:00
      • 8.3 Importance of Business Continuity and Disaster Recovery Planning     1:00
      • 8.4 Basic Concepts     1:00
      • 8.5 Need for Planning     1:00
      • 8.6 Disruptive Events     2:00
      • 8.7 Business Continuity Planning (BCP)     1:00
      • 8.8 Disaster Recovery Planning     1:00
      • 8.9 Disaster Recovery Process    
      • 8.10 Business Scenario     1:00
      • 8.11 BCP DRP Phases     1:00
      • 8.12 Importance of BCP DRP     1:00
      • 8.13 BCP DRP Phase     1:00
      • 8.14 BCP DRP Phase 1 Project Initiation and Scoping     3:00
      • 8.15 BCP DRP Phase 2 Business Impact Analysis (BIA)     1:00
      • 8.16 Business Impact Analysis Goals    
      • 8.17 Business Impact Analysis Steps     4:00
      • 8.18 BIA Steps Business Unit Level     1:00
      • 8.19 Maximum Tolerable Downtime (MTD)     2:00
      • 8.20 Failure and Recovery Metrics    
      • 8.21 Stages of Failure and Recovery     1:00
      • 8.22 BCP DRP Phase 3 Identify Preventive Controls     1:00
      • 8.23 BCP DRP Phase 4 Recovery Strategy     1:00
      • 8.24 Types of Recovery    
      • 8.25 Recovery Partners Strategy     3:00
      • 8.26 Backup Sites    
      • 8.27 Best Practices for Recovery     2:00
      • 8.28 BCP DRP Phase 5 Plan Design and Development     1:00
      • 8.29 Planning Design and Development Steps    
      • 8.30 BCP DRP Phase 6 Implementation Testing and Training     1:00
      • 8.31 Importance of Testing    
      • 8.32 Types of Testing    
      • 8.33 Training     3:00
      • 8.34 BCP DRP Phase 7 Maintenance     3:00
      • 8.35 Business Scenario     1:00
      • 8.36 BCP DRP Frameworks     1:00
      • 8.37 BCP DRP Frameworks    
      • 8.38 Best Practices     1:00
      • 8.39 BCP DRP Mistakes     1:00
      • 8.40 BCP DRP Best Practices     1:00
      • 8.41 BCP DRP Best Practices (Contd.)     4:00
      • 8.42 Business Scenario     1:00
      • 8.43 Quiz    
      • 8.44 Summary     1:00
      • 8.45 Thank you    
      Domain 09 - Legal Regulations Investigations and Compliance
      • 9.1 Legal Regulations Investigations and Compliance     1:00
      • 9.2 Objectives    
      • 9.3 Importance of Legal Regulations Investigations and Compliance     1:00
      • 9.4 Computer Crimes    
      • 9.5 Cybercrime Definition    
      • 9.6 Introduction to Computer Crimes     1:00
      • 9.7 Categories of Computer Crimes    
      • 9.8 Business Scenario     1:00
      • 9.9 Major Legal Systems    
      • 9.10 Introduction to Legal Systems     1:00
      • 9.11 Major Types of Legal Systems    
      • 9.12 Business Scenario     1:00
      • 9.13 Intellectual Property Law    
      • 9.14 Introduction to Intellectual Property (IP) Law     1:00
      • 9.15 Types of Intellectual Property (IP) Law    
      • 9.16 Business Scenario     1:00
      • 9.17 Privacy    
      • 9.18 Introduction to Privacy     2:00
      • 9.19 U. S. Privacy Laws     3:00
      • 9.20 U. S. guidelines for managing privacy     2:00
      • 9.21 EU Council Directive (Law) on Data Protection     1:00
      • 9.22 The U. S. European Union Safe Harbor     2:00
      • 9.23 Incident Response    
      • 9.24 Incident Response Terminologies     2:00
      • 9.25 Incident Response Goals     1:00
      • 9.26 Incident Response Team     2:00
      • 9.27 Incident response procedures    
      • 9.28 Business Scenario     1:00
      • 9.29 Investigations    
      • 9.30 Introduction to Investigations     1:00
      • 9.31 Investigation Challenges     1:00
      • 9.32 Investigations Primary Activities     2:00
      • 9.33 Evidence     1:00
      • 9.34 Evidence Lifecycle     1:00
      • 9.35 Chain of Evidence     1:00
      • 9.36 Types of Evidence     4:00
      • 9.37 Role of Computer Forensics     1:00
      • 9.38 Business Scenario     1:00
      • 9.39 Compliance    
      • 9.40 Need for Compliance     1:00
      • 9.41 Regulatory compliance     1:00
      • 9.42 Compliance Auditing Reporting and Process Function    
      • 9.43 Standards Manual Guidelines for Compliance     2:00
      • 9.44 Third Party Governance and Security     2:00
      • 9.45 (ISC)2 Code of Ethics    
      • 9.46 Preamble and Canons of (ISC)2 Code of Ethics     3:00
      • 9.47 Quiz    
      • 9.48 Summary     1:00
      • 9.49 Thank you    
      Domain 10 - CISSP Operations Security
      • 10.1 CISSP Operations Security     1:00
      • 10.2 Objectives    
      • 10.3 Importance of Operations Security     1:00
      • 10.4 Operations Security Concepts    
      • 10.5 Introduction to Operations Security     1:00
      • 10.6 Operations Security Concepts    
      • 10.7 Operations Security Domain     1:00
      • 10.8 Effects of operational controls on C. I. A.     1:00
      • 10.9 Business Scenario     1:00
      • 10.10 Maintaining Operational Resilience     1:00
      • 10.11 Operational Resilience     1:00
      • 10.12 Threats to Operations    
      • 10.13 Vulnerabilities    
      • 10.14 Controls    
      • 10.15 Business Scenario     1:00
      • 10.16 Maintaining Resilient Systems    
      • 10.17 Importance of Maintaining Resilient Systems     2:00
      • 10.18 Redundancy and Fault Tolerance     2:00
      • 10.19 Redundancy and Fault Tolerance Methods    
      • 10.20 Business Scenario     1:00
      • 10.21 Protecting Valuable Assets     1:00
      • 10.22 Need to Protect Valuable Assets     1:00
      • 10.23 Protecting Physical Assets    
      • 10.24 Protecting Information Assets     1:00
      • 10.25 Protecting Resources     2:00
      • 10.26 Controls for Protecting Assets    
      • 10.27 Business Scenario     1:00
      • 10.28 Controlling Privileged Accounts    
      • 10.29 Need for Controlling Privileged Accounts     1:00
      • 10.30 Identity and Access Management     2:00
      • 10.31 Types of Accounts     2:00
      • 10.32 Commonly Used Roles    
      • 10.33 Business Scenario     1:00
      • 10.34 Managing Security Services Effectively    
      • 10.35 Need for Effective Management of Security Services     2:00
      • 10.36 Monitoring Techniques    
      • 10.37 Anti Malware Systems     1:00
      • 10.38 Media Resource Protection     4:00
      • 10.39 Business Scenario     1:00
      • 10.40 Key Operational Processes and Procedures     1:00
      • 10.41 Operational Processes and Procedures    
      • 10.42 Backup Methods    
      • 10.43 Trusted Recovery and System Recovery     2:00
      • 10.44 Incident Management     2:00
      • 10.45 Problem Management     2:00
      • 10.46 Change Management     2:00
      • 10.47 Change Control Process     1:00
      • 10.48 Configuration Management     3:00
      • 10.49 Patch Management     1:00
      • 10.50 Auditing     3:00
      • 10.51 Business Scenario     1:00
      • 10.52 Quiz    
      • 10.53 Summary     1:00
      • 10.54 Thank you    
      Course Summary
      • Course Summary     6:00
      Tips and Tricks
      • Topics     4:00
      • Information Security Governance And Risk Management     4:00
      • Access Controls     4:00
      • Security Architecture Design     4:00
      • Physical And Environmental Security     4:00
      • Network And Telecommunication Security     5:00
      • Software Development Security     4:00
      • Cryptography     4:00
      • Business Continuity Disaster Recovery Planning     5:00
      • Legal Regulations Investigations And Compliance     4:00
      • Operations Security     4:00
      • Tricky Questions     2:00
      • Time Management     1:00

Why Simplilearn?

  • Over 100,000+ professionals trained across 150+ countries
  • 300+ workshops conducted globally every month
  • Trusted by employees of Fortune 500 companies as their learning provider for career growth and training.
  • We follow a Global Learning Framework which has proven to deliver results and has been perfected by our experience in training a million learners.
  • 2000+ certified and experienced trainers conduct trainings for various courses across the globe.
  • Free access to high quality industry-relevant webinars, articles and blogs
  • 24x7 live support via chat, mail and phone with a request to call back option
  • Exam pass rate of over 98.6%
  • Accredited, Approved and Recognized as a training organization, partner, education provider and examination center by globally renowned names like Project Management Institute of USA, APMG, CFA Institute, GARP, ASTQB, IIBA and more

Reviews

FAQs

Eligibility

  • There is no such criteria to attend training of CISSP training, Once you clear the examination to get the certificate of CISSP you required Minimum 5 years of direct full-time security work experience in two or more of the following 10 domains of the (ISC) CISSP® CBK if you failed to achieve this then you can become associate of (ISC)2

OR

  • One-year waiver of the professional experience requirement for holding an additional credential on the (ISC)2 approved list: Valid experience includes information systems security-related work performed as a practitioner, auditor, consultant, investigator or instructor, that requires Information Security knowledge and involves the direct application of that knowledge. The five years of experience must be the equivalent of actual fulltime Information Security work (not just Information Security responsibilities for a five year period); this requirement is cumulative, however, and may have been accrued over a much longer period of time.

New to CISSP® ?

Certified Information Systems Security Professional Certification is a popular IT security certification recognized globally. Simplilearn brings to you online CISSP training that gives you the liberty to prepare for CISSP exam at you own convenience. Our CISSP online training is based on CISSP exam syllabus. ...

Show Less

Most Popular Articles

Most Popular Videos

Most Popular Courses

About CISSP Certification Training

Access Days
3 Day Money Back Guarantee

3 Day Money Back Guarantee

We are sure you’ll love our content! Try it for 3 days and if you are not happy, we’ll refund your money in full, no questions asked!

How this works:

1) For refund, write to support@simplilearn.com within 3 days of purchase

2) The mode of reimbursement will be same as the mode of payment used during enrollment fees. For example: If a participant has paid through credit cards, we will reimburse through credit card

Note: Money back guarantee is void if the participant has accessed more than 50% of the course content.

$ 199

3 Day Money Back Guarantee

3 Day Money Back Guarantee

We are sure you’ll love our content! Try it for 3 days and if you are not happy, we’ll refund your money in full, no questions asked!

How this works:

1) For refund, write to support@simplilearn.com within 3 days of purchase

2) The mode of reimbursement will be same as the mode of payment used during enrollment fees. For example: If a participant has paid through credit cards, we will reimburse through credit card

Note: Money back guarantee is void if the participant has accessed more than 50% of the course content.

$ 229

Online Courses Classroom Courses Practice Tests
Login