Course description

  • What are the course objectives?

    The CISSP certification course in Hyderabad offered by Simplilearn is ideal for professionals preparing for the CISSP exam. The course is aligned to the (ISC)² CBK 2015 requirements and educates you on the industry’s latest best practices. You will be able to use Information Security standards that are globally approved for the organization to design, build, and maintain a safe business environment.
     
    There is a huge rise in the requirement of skilled IT security professionals as many companies have reported security breaches. A shortage of 1.5 million security professionals is expected in the year 2019 according to Frost and Sullivan. 

  • What skills will you learn in this CISSP training course?

    The CISSP training in Hyderabad can be taken up to learn the following:
    • Develop working knowledge in the 8 domains prescribed by the CISSP Common Book of Knowledge, 2015.
    • Acquire the relevant knowledge and skills required to pass the CISSP certification exam.
    • Define the architecture, design, and management of the security of your organization.

    Along with that, you can also earn the requisite 30 CPEs required to take up the CISSP certification exam.

  • Who should take the CISSP training in Hyderabad?

    Professionals of the IT security domain undergo CISSP certification as it is the most acknowledged professional requirement of this field across the world. The following professionals find the CISSP certification ideal:
    • Security Consultants/Managers
    • Security Systems Engineers
    • Chief Information Security Officers
    • IT Directors/Managers
    • Network Architects 
    • Security Auditors/Architects

  • What types of projects will you complete during the course?

    The CISSP course does not include any projects.

  • What types of jobs can benefit from a CISSP certification?

    The CISSP certification is beneficial for:

    • Information security audit professional
    • Information security manager
    • Cloud security enablement engineer
    • Cybersecurity strategy leader
    • Lead information security engineer

  • What are the career benefits of the CISSP Certification?

    Information security professionals are in growing demand as many companies are now investing heavily in IT security. The reason is the rising incidents of breaches in the information security of the organizations. Learners can develop the following skills by undertaking the CISSP certification training:

    • Technologies that improve an organization’s security structure
    • Knowledge of eight important security areas ranging from access control to software development
    • Technical security and managerial proficiency

Course preview

    • Domain 00 - Introduction

      14:53
      • 1 CISSP®—Introduction
        01:06
      • 2 Objectives
        00:20
      • 3 CISSP®
        01:19
      • 4 (ISC)²®
        00:58
      • 5 CISSP® Domains
        02:47
      • 6 Benefits of CISSP® for Professionals
        01:01
      • 7 Benefits of CISSP® for Employers
        01:06
      • 8 CISSP® Certification Requirements
        00:42
      • 9 CISSP® Certification Requirements (contd.)
        00:21
      • 10 CISSP® Certification Requirements (contd.)
        00:57
      • 11 CISSP® Certification Requirements (contd.)
        01:05
      • 12 CISSP® Examination
        02:36
      • 13 CISSP® Examination (contd.)
        00:30
      • 14 Conclusion
        00:05
    • Domain 01 - Security and Risk Management

      2:12:33
      • 1 Domain 01—Security and Risk Management
        00:10
      • 2 Objectives
        00:32
      • 3 Importance of Information Security and Risk Management
        01:03
      • 4 Role and Importance of CIA in ISM
        01:07
      • 5 Confidentiality
        01:51
      • 6 Integrity
        01:32
      • 7 Availability
        00:57
      • 8 Information Security
        00:33
      • 9 Information Security Management
        00:26
      • 10 Information Security Governance
        01:06
      • 11 IT Security and Organizational Goals, Mission, and Objectives
        00:29
      • 12 Goals, Mission, and Objectives
        01:55
      • 13 Aligning Security with Goals, Mission, and Objectives
        00:41
      • 14 Business Scenario
        01:14
      • 15 Organizational Processes
        01:28
      • 16 Auditing
        00:21
      • 17 Control Framework
        00:40
      • 18 Due Care
        00:31
      • 19 Due Diligence
        00:28
      • 20 Security Controls
        00:49
      • 21 Service Level Agreements
        00:58
      • 22 Managing Third - Party Governance
        02:23
      • 23 Offshoring Privacy Requirements and Compliance
        01:07
      • 24 Business Scenario
        00:52
      • 25 Layers of Responsibility
        01:03
      • 26 Security Policies
        01:31
      • 27 Types of Security Policies
        01:35
      • 28 Security Policy Implementation
        02:07
      • 29 Policy Chart
        01:08
      • 30 Standards, Guidelines, Procedures, and Baselines
        02:07
      • 31 Business Scenario
        00:30
      • 32 Compliance—Need for Compliance
        01:23
      • 33 Regulatory Compliance
        00:45
      • 34 Compliance
        00:39
      • 35 Compliance (contd.)
        00:57
      • 36 Compliance (contd.)
        00:48
      • 37 Standards/Manuals/Guidelines for Compliance
        01:09
      • 38 Computer Crimes
        00:27
      • 39 Introduction to Computer Crimes
        00:54
      • 40 Categories of Computer Crimes
        02:28
      • 41 Business Scenario
        00:51
      • 42 Major Legal Systems
        00:45
      • 43 Common Law and Civil Law
        01:42
      • 44 Customary Law and Religious Law
        01:44
      • 45 Mixed Law
        00:28
      • 46 Business Scenario
        00:36
      • 47 Introduction to Intellectual Property (IP) Law
        01:01
      • 48 Types of Intellectual Property (IP) Law
        01:51
      • 49 Types of Intellectual Property (IP) Law (contd.)
        01:44
      • 50 Types of Intellectual Property (IP) Law (contd.)
        01:00
      • 51 Business Scenario
        00:39
      • 52 Import or Export Controls and Trans - Border Data Flow
        01:10
      • 53 Introduction to Privacy
        01:59
      • 54 U.S. Privacy Laws
        01:14
      • 55 U.S. Privacy Laws (contd.)
        01:21
      • 56 U.S. Guidelines for Managing Privacy
        01:41
      • 57 EU Council Directive (Law) on Data Protection
        01:18
      • 58 The U.S.-European Union Safe Harbor
        05:44
      • 59 Security Definitions
        02:40
      • 60 Information Risk Management
        01:09
      • 61 Business Scenario
        00:54
      • 62 Introduction to Risk Analysis
        01:06
      • 63 Goals of Risk Analysis
        00:26
      • 64 Risk Analysis Team
        00:54
      • 65 Steps for Risk Analysis
        00:50
      • 66 Information and Assets Valuation
        01:16
      • 67 Risk Analysis Types
        00:41
      • 68 Quantitative Risk Analysis—Steps
        01:47
      • 69 Quantitative Risk Analysis—Problem
        00:39
      • 70 Qualitative Risk Analysis
        01:10
      • 71 Delphi Technique
        01:04
      • 72 Quantitative vs.Qualitative
        00:29
      • 73 Hybrid Analysis
        00:45
      • 74 Countermeasure Selection—Problem
        00:56
      • 75 Countermeasure Selection—Other Factors
        00:57
      • 76 Handling Risk
        01:39
      • 77 Business Scenario
        00:51
      • 78 Threat Modeling
        00:59
      • 79 Need for Business Continuity Planning
        00:55
      • 80 Basic Concepts—Disruptive Events
        02:26
      • 81 Basic Concepts—Business Continuity Planning
        00:47
      • 82 Importance of Business Continuity Planning
        00:31
      • 83 Business Continuity Planning Phases
        00:53
      • 84 BCP/DRP Phase 1—Project Initiation and Scoping
        02:54
      • 85 BCP/DRP Phase 2—Business Impact Analysis (BIA)
        01:11
      • 86 BIA—Goals
        01:20
      • 87 BIA—Steps
        03:32
      • 88 BIA Steps—Business Unit Level
        01:07
      • 89 Maximum Tolerable Downtime (MTD)
        01:46
      • 90 Failure and Recovery Metrics
        02:52
      • 91 Failure and Recovery Metrics (contd.)
        01:46
      • 92 Stages of Failure and Recovery
        00:52
      • 93 BCP/DRP Phase 3—Identify Preventive Controls
        01:19
      • 94 Importance of Managing Personnel Security
        00:51
      • 95 Managing Personnel Security—Hiring Practices
        00:54
      • 96 Managing Personnel Security—Employee Termination
        00:47
      • 97 Vendor, Contractors, and Consultant Controls
        00:47
      • 98 Best Work Practices
        01:44
      • 99 Business Scenario
        00:48
      • 100 Importance of Security Awareness Training
        00:54
      • 101 Security Awareness Training: Awareness, Training, and Education
        01:28
      • 102 Implementation of Security Awareness Training Program
        00:38
      • 103 Importance of Content Updates
        00:23
      • 104 Importance of Managing Security Function
        00:53
      • 105 Best Practices—Budget and Establish Security Metrics
        01:28
      • 106 Best Practices—Resources and Develop and Implement Strategies
        01:23
      • 107 Best Practices—Completeness and Effectiveness of the Program
        00:25
      • 108 Business Scenario
        00:44
      • 109 (ISC)² Code of Ethics
        02:31
      • 110 Quiz
      • 111 Summary
        00:54
      • 112 Conclusion
        00:06
    • Domain 02 - Asset Security

      58:26
      • 1 Domain 02 Asset Security
        00:13
      • 2 Objectives
        00:28
      • 3 Importance of Asset Security
        00:39
      • 4 Need for Information Classification
        01:12
      • 5 Information Classification Objectives
        00:56
      • 6 Government or Military Sector Classification
        01:33
      • 7 Commercial or Private Sector Classification
        01:50
      • 8 Information Classification Criteria
        01:52
      • 9 Data Classification Considerations
        00:47
      • 10 Role Responsible for Data Classification
        00:51
      • 11 Business Scenario
        00:37
      • 12 Data Management
        00:53
      • 13 Best Practices for Data Management
        00:54
      • 14 Data Policy
        01:14
      • 15 Data Ownership
        00:54
      • 16 Data Ownership Best Practices
        00:45
      • 17 Data Custodians
        01:15
      • 18 Data Custodians (contd.)
        00:33
      • 19 Data Quality
        01:09
      • 20 Data Quality—Aspects
        00:32
      • 21 Data Quality Assurance and Quality Control
        00:49
      • 22 Data Documentation
        00:44
      • 23 Data Documentation Practices
        01:28
      • 24 Data Standards
        00:58
      • 25 Data Control Lifecycle
        00:33
      • 26 Data Specification and Modeling
        00:37
      • 27 Database Maintenance
        00:38
      • 28 Data Audit
        00:41
      • 29 Data Storage and Archiving
        00:59
      • 30 Data Security
        00:58
      • 31 Data Access, Sharing, and Dissemination
        00:56
      • 32 Data Publishing
        00:32
      • 33 Data Handling Requirements
        01:25
      • 34 Media Resource Protection
        03:32
      • 35 Data Remanence
        01:51
      • 36 Business Scenario
        00:45
      • 37 Asset Management
        01:17
      • 38 Software Licensing
        00:45
      • 39 Equipment Lifecycle
        01:00
      • 40 Protecting Privacy
        02:06
      • 41 Ensuring Appropriate Retention
        01:06
      • 42 Data Security Controls
        01:36
      • 43 Data in Transit—Best Practices
        01:11
      • 44 Scoping and Tailoring
        00:52
      • 45 Scoping and Tailoring (contd.)
        01:02
      • 46 Standards Selection—US DoD
        02:10
      • 47 Standards Selection—International Standards
        01:45
      • 48 Standards Selection National Cyber Security Framework Manual
        00:48
      • 49 Standards Selection Center for Strategic and International Studies
        01:00
      • 50 Standards Selection Critical Security Controls
        01:23
      • 51 Standards Selection Security Content Automation Protocol
        01:19
      • 52 Framework for Improving Critical Infrastructure Cybersecurity
        01:04
      • 53 Business Scenario
        00:38
      • 54 Quiz
      • 55 Summary
        00:44
      • 56 Conclusion
        00:07
    • Domain 03 - Security Engineering

      2:48:47
      • 1 Domain 03 Security Engineering
        00:14
      • 2 Objectives
        00:23
      • 3 Security Architecture and Design - Case Study
        00:42
      • 4 Security Engineering
        00:31
      • 5 Architecture Framework
        01:29
      • 6 Zachman Framework
        01:11
      • 7 TOGAF
        00:45
      • 8 ITIL
        01:32
      • 9 Creating a Security Architecture
        03:00
      • 10 Enterprise Security Architecture
        02:06
      • 11 Common Security Services in ESA
        01:29
      • 12 SABSA Framework
        00:58
      • 13 SABSA Matrix
        04:01
      • 14 Business Scenario
        00:41
      • 15 ISO/IEC 27001:2013 Security Standards
        01:08
      • 16 ISO/IEC 27002 Code of Practice for Information Security Management
        01:37
      • 17 Security Models
        01:06
      • 18 State Machine Model
        00:24
      • 19 Multilevel Security Models
        01:07
      • 20 Matrix-Based Model
        00:48
      • 21 Non-Interference Model
        00:57
      • 22 Information flow model
        00:40
      • 23 Examples of Security Models: Bell–LaPadula Confidentiality Model
        02:13
      • 24 Examples of Security Models: Biba Integrity Model
        01:26
      • 25 Examples of Security Models: Clark–Wilson integrity model
        01:13
      • 26 Brewer Nash, Graham Denning, and Harrison Ruzzo Ullman models
        01:15
      • 27 Business Scenario
        00:34
      • 28 Evaluation Criteria
        01:04
      • 29 CSEC
        02:20
      • 30 Information Technology Security Evaluation Criteria
        01:20
      • 31 Common Criteria
        01:15
      • 32 Common Criteria Evaluation Process
        00:50
      • 33 Common Criteria Levels
        01:23
      • 34 Payment Card Industry Data Security Standard
        00:51
      • 35 Certification and Accreditation
        00:36
      • 36 Certification and Accreditation Standards
        01:33
      • 37 SEI—CMMI
        01:49
      • 38 SEI—CMMI Levels
        00:46
      • 39 Business Scenario
        01:11
      • 40 System Security Architecture
        01:19
      • 41 Mainframes and Other Thin Client Systems
        01:40
      • 42 Middleware and Embedded Systems
        00:23
      • 43 Pervasive Computing and Mobile Computing Devices
        00:15
      • 44 System Components Processors
        01:08
      • 45 System Components Memory
        00:51
      • 46 System Components Storage
        00:17
      • 47 System Components Trusted Computing Base (TCB)
        00:23
      • 48 System Components Reference Monitor
        00:29
      • 49 System Components—Trusted Platform Module (TPM)
        00:38
      • 50 System Components Peripherals and Other Input/Output Devices
        00:42
      • 51 System Components Operating System
        00:40
      • 52 System Components Ring Model
        00:34
      • 53 System Components System Kernel
        00:54
      • 54 Distributed Systems
        00:34
      • 55 Virtualization
        00:28
      • 56 Hypervisor
        00:45
      • 57 Cloud Computing
        00:10
      • 58 Service models
        01:15
      • 59 Grid Computing
        00:12
      • 60 Peer to Peer Networking (P2P)
        00:20
      • 61 Business Scenario
        00:56
      • 62 Security Threats and Countermeasures
        00:22
      • 63 Assessing and Mitigating Vulnerabilities and Threats
        01:30
      • 64 Assessing and Mitigating Vulnerabilities and Threats (contd.)
        00:54
      • 65 Assessing and Mitigating Vulnerabilities and Threats (contd.)
        01:05
      • 66 Best Practices
        00:45
      • 67 Best Practices (contd.)
        00:30
      • 68 Best Practices Techniques and Technologies
        00:59
      • 69 Best Practices Techniques and Technologies (contd.)
        00:30
      • 70 Best Practices Techniques and Technologies (contd.)
        00:24
      • 71 Best Practices Techniques and Technologies (contd.)
        00:37
      • 72 Best Practices Techniques and Technologies (contd.)
        00:42
      • 73 Introduction to Cryptography
        02:40
      • 74 Cryptographic Lifecycle
        00:56
      • 75 Algorithm or Protocol Governance
        00:52
      • 76 Cryptography Terms
        02:45
      • 77 Strength of a Cryptosystem
        01:29
      • 78 Cryptography Methods Substitution Cipher
        01:31
      • 79 Cryptography Methods Transposition Cipher
        00:24
      • 80 Cryptography Methods Book or Running Key Cipher
        01:09
      • 81 Cryptography Methods Concealment Cipher
        00:43
      • 82 Cryptography Methods Steganography and DRM
        01:19
      • 83 Business Scenario
        00:36
      • 84 Introduction to Symmetric Cryptography
        02:01
      • 85 Symmetric Key Ciphers
        01:16
      • 86 Block Cipher
        00:47
      • 87 Stream Cipher
        02:02
      • 88 Block Cipher Designs
        00:41
      • 89 Data Encryption Standard (DES)
        01:33
      • 90 DES Algorithm
        01:35
      • 91 DES Operation Modes Electronic Code Book
        01:01
      • 92 DES Operation Modes Cipher Block Chaining
        01:07
      • 93 DES Operation Modes Cipher Feed Back
        01:22
      • 94 DES Operation Modes Output Feed Back
        00:44
      • 95 DES Operation Modes—Counter
        01:01
      • 96 Triple DES
        01:46
      • 97 Advanced Encryption Standard (AES)
        01:17
      • 98 AES Algorithm
        00:14
      • 99 AES Algorithm Key Expansion and Initial Round
        00:15
      • 100 Advanced Encryption Standard (AES) Algorithm—Rounds
        02:01
      • 101 AES Algorithm Final Round
        00:08
      • 102 Other Symmetric Systems
        01:54
      • 103 Other Symmetric Systems (contd.)
        01:11
      • 104 Business Scenario
        00:43
      • 105 Introduction to Asymmetric Cryptography
        02:07
      • 106 Introduction to Asymmetric Cryptography Diagram
        00:09
      • 107 Introduction to RSA Algorithm
        00:54
      • 108 RSA Algorithm Process
        01:20
      • 109 Other Types of Asymmetric Cryptography Elliptic Curve Cryptosystems
        01:02
      • 110 Other Types of Asymmetric Cryptography Diffie-Hellman Key Exchange
        00:35
      • 111 Public Key Cryptography
        01:25
      • 112 Symmetric vs. Asymmetric Cryptography
        02:45
      • 113 Advantages and Disadvantages
        00:54
      • 114 Introduction to Public Key Infrastructure
        02:15
      • 115 PKI Certification
        01:48
      • 116 PKI Certification (contd.)
        00:33
      • 117 PKI Steps—Part 1
        00:44
      • 118 PKI Steps—Part 2
        00:58
      • 119 One-Way Hash
        01:13
      • 120 Hashing Algorithms
        02:09
      • 121 Hashing Algorithms (contd.)
        01:41
      • 122 Salting
        00:34
      • 123 Message Authentication Code (MAC)
        01:50
      • 124 Digital Signatures
        01:15
      • 125 Key Management
        01:30
      • 126 Key Management Principles
        01:50
      • 127 Escrowed Encryption
        02:44
      • 128 Business Scenario
        00:58
      • 129 Need for Physical and Environmental Security
        01:50
      • 130 Business Scenario
        01:02
      • 131 Site and Facility Design Criteria
        02:27
      • 132 Information Protection Environment
        00:53
      • 133 Crime Prevention Through Environmental Design (CPTED)
        01:02
      • 134 Site Location
        01:38
      • 135 Construction
        01:08
      • 136 Support Facilities
        01:46
      • 137 Business Scenario
        00:51
      • 138 Secure Operational Areas
        03:15
      • 139 Business Scenario
        00:49
      • 140 Environmental Controls
        00:21
      • 141 Environmental Controls (Contd.)
        01:05
      • 142 Fire Detection and Suppression
        00:44
      • 143 Power Supply
        02:03
      • 144 Power Supply (contd.)
        00:57
      • 145 HVAC
        00:43
      • 146 Training and Awareness
        00:23
      • 147 Business Scenario
        01:00
      • 148 Quiz
      • 149 Summary
        00:48
      • 150 Conclusion
        00:07
    • Domain 04 - Communications and Network Security

      2:07:22
      • 1 Domain 04—Communications and Network Security
        00:15
      • 2 Objectives
        00:27
      • 3 Importance of Communications and Network Security—Case Study
        00:39
      • 4 Introduction to Secure Network Architecture and Design
        00:26
      • 5 Open Systems Interconnection
        03:43
      • 6 OSI Model Layers
        01:15
      • 7 Physical Layer
        01:09
      • 8 Data Link Layer
        01:18
      • 9 Network Layer
        00:49
      • 10 Transport Layer
        01:01
      • 11 Session Layer
        00:52
      • 12 Presentation Layer
        01:16
      • 13 Application Layer
        00:47
      • 14 Transmission Control Protocol/Internet Protocol (TCP/IP) Model
        01:08
      • 15 Network Access Layer and Internet Layer
        01:08
      • 16 Host-to-Host Layer and Application Layer
        01:10
      • 17 Comparison of OSI and TCP/IP Models
        01:17
      • 18 Introduction to IP Addressing
        00:48
      • 19 IPv4 and IPv6
        02:35
      • 20 Classful IP Addressing
        00:38
      • 21 Class A
        00:31
      • 22 Class B
        00:30
      • 23 Class C
        00:27
      • 24 Class D and Class E
        00:30
      • 25 Classless Inter-Domain Routing
        02:41
      • 26 Private Networks and Loopback Address
        01:42
      • 27 Types of IP Addressing
        01:15
      • 28 Routed and Routing Protocols
        01:56
      • 29 Types of Network Protocols
        00:15
      • 30 Transmission Control Protocol (TCP)
        01:06
      • 31 User Datagram Protocol (UDP)
        00:46
      • 32 Internet Protocol
        00:20
      • 33 Address Resolution Protocol
        01:37
      • 34 Internet Control Message Protocol (ICMP)
        00:29
      • 35 Hypertext Transfer Protocol (HTTP)
        01:56
      • 36 Implications of Multi-Layer Protocols
        00:53
      • 37 Distributed Network Protocol
        01:07
      • 38 LAN/Network Technologies
        04:14
      • 39 Transmission Media
        00:26
      • 40 Twisted Pair
        02:00
      • 41 Coaxial Cable Box
        01:45
      • 42 Fiber-Optic Cable Box
        01:42
      • 43 Network Topologies
        01:52
      • 44 Media Access Technologies
        00:46
      • 45 Carrier-Sense Multiple Access with Collision Detection
        01:20
      • 46 Carrier-Sense Multiple Access with Collision Avoidance
        01:04
      • 47 Flavors of LAN transmission methods
        00:30
      • 48 List of Networking Devices
        02:33
      • 49 VLANs
        02:08
      • 50 Gateways
        01:03
      • 51 Network Access Control Devices
        00:38
      • 52 Packet-Filtering and Application-Level
        02:40
      • 53 Circuit-Level and Stateful-Inspection
        01:39
      • 54 Firewall Architectures
        02:37
      • 55 Network Security Terms
        01:51
      • 56 Business Scenario
        00:26
      • 57 Networks
        01:09
      • 58 Types of Networks
        01:09
      • 59 WAN Technologies
        01:11
      • 60 WAN Switching and Devices
        01:55
      • 61 Network Address Translation and Frame Relay
        01:36
      • 62 Multi-Protocol Label Switching and VoIP
        00:58
      • 63 Fiber Channel over Ethernet and Internet Small Computer System Interface
        01:05
      • 64 Virtualized Networks
        01:02
      • 65 Introduction to Remote Access
        00:45
      • 66 VPN using PPTP and L2TP
        01:44
      • 67 Internet Security Protocol (IPsec)
        01:06
      • 68 Internet Security Protocol (IPsec) Modes of Operation
        01:47
      • 69 IPsec Security Protocols—Authentication Header (AH)
        02:44
      • 70 IPsec Security Protocols—Encapsulating Security Payload (ESP)
        01:26
      • 71 Components of the IPsec Process
        01:28
      • 72 Components of the IPsec Process (contd.)
        01:18
      • 73 IPsec Process
        00:59
      • 74 Secure Access Protocols
        02:49
      • 75 Secure Access Protocols (contd.)
        02:10
      • 76 Secure Access Protocols (contd.)
        01:03
      • 77 Remote Access Security Methods
        00:32
      • 78 Multimedia Collaboration
        00:52
      • 79 Wireless Technologies
        00:29
      • 80 IEEE Wireless Standards and Spread-Spectrum Technologies
        01:17
      • 81 Direct Sequence Spread Spectrum and Frequency-Hopping Spread Spectrum
        01:20
      • 82 WLAN Operational Modes
        01:30
      • 83 Bluetooth
        01:37
      • 84 Bluetooth Attack
        00:15
      • 85 Blue Jacking and Blue Snarfing
        01:09
      • 86 Blue Bugging, Backdoor Attacks, and Denial of Service Attacks
        01:03
      • 87 Wireless Security
        06:29
      • 88 Business Scenario
        00:49
      • 89 Network Attacks
        02:33
      • 90 Network Attacks (contd.)
        02:17
      • 91 Network Attacks—Countermeasures
        03:02
      • 92 Quiz
      • 93 Summary
        00:40
      • 94 Conclusion
        00:08
    • Domain 05 - Identity and Access Management

      1:32:26
      • 1 Domain 05—Identity and Access Management
        00:15
      • 2 Objectives
        00:31
      • 3 Importance of Identity and Access Management in Information Security
        00:59
      • 4 Controlling Physical and Logical Access to Assets
        01:23
      • 5 Controlling Physical and Logical Access to Assets (contd.)
        01:51
      • 6 Access Subject Object and Access controls
        01:13
      • 7 Identity and Access Management Policy
        00:47
      • 8 Identification Authentication and Authorization
        01:21
      • 9 Identity Management
        00:32
      • 10 Identity and Access Provisioning Lifecycle
        01:28
      • 11 Identity and Access Provisioning Lifecycle (contd.)
        00:48
      • 12 Guidelines for User Identification
        00:53
      • 13 Verifying Identification Information
        01:41
      • 14 Strong Authentication
        01:26
      • 15 Biometrics—Characteristics
        02:11
      • 16 Types of Biometrics
        01:42
      • 17 FRR FAR CER
        02:04
      • 18 Passwords
        01:15
      • 19 Password Types
        01:43
      • 20 Tokens
        00:30
      • 21 Token Device—Synchronous
        00:48
      • 22 Token Device—Asynchronous
        00:40
      • 23 Memory Cards and Smart Cards
        01:39
      • 24 Attacks on Smart Cards—Fault Generation and Micro-Probing
        02:08
      • 25 Access Criteria
        02:04
      • 26 Authorization Concepts
        02:22
      • 27 Identity Management Implementation
        00:31
      • 28 Password Management
        02:02
      • 29 Directory Management
        01:05
      • 30 Directory Technologies
        01:35
      • 31 Accounts Management
        01:16
      • 32 Profile Management
        00:49
      • 33 Web Access Management
        00:30
      • 34 Single Sign-On (SSO)
        01:49
      • 35 SSO Technologies
        01:01
      • 36 Kerberos
        02:41
      • 37 Kerberos Steps
        01:35
      • 38 Problems with Kerberos
        00:54
      • 39 Business Scenario
        01:01
      • 40 Access Control Types—Security Layer
        01:17
      • 41 Access Control Types—Functionality
        01:39
      • 42 Business Scenario
        00:24
      • 43 Access Control Models—DAC
        01:00
      • 44 Access Control Models—MAC
        01:00
      • 45 Access Control Models—RBAC
        00:51
      • 46 Business Scenario
        00:28
      • 47 Access Control Concepts
        03:12
      • 48 Types of Access Control Administration
        02:19
      • 49 Remote Authentication Dial-In User Service (RADIUS)
        01:50
      • 50 TACACS and TACACS+
        00:56
      • 51 DIAMETER
        00:58
      • 52 Accountability
        01:43
      • 53 Accountability (contd.)
        00:40
      • 54 Session Management
        00:56
      • 55 Registration and Proof of Identity
        00:42
      • 56 Credential Management Systems
        00:47
      • 57 Credential Management Systems—Risks and benefits
        00:42
      • 58 Federated Identity Management
        00:45
      • 59 Federated Identity Management Models
        00:51
      • 60 Federated Identity Management Models (contd.)
        01:06
      • 61 Federated Identity Management Models (contd.)
        00:48
      • 62 Identity as a Service
        00:44
      • 63 Identity as a Service—Functionality
        01:53
      • 64 Identity as a Service—Possible Issues
        01:07
      • 65 Integrate Third-Party Identity Services
        01:05
      • 66 Integrate Third-Party Identity Services (contd.)
        00:49
      • 67 Unauthorized Disclosure of Information
        03:37
      • 68 Threats to Access Control
        04:27
      • 69 Protection against Access Control Attacks
        00:39
      • 70 Access Control Best Practices
        00:53
      • 71 Access Control Best Practices (contd.)
        00:29
      • 72 Quiz
      • 73 Summary
        00:39
      • 74 Conclusion
        00:07
    • Domain 06 - Security Assessment and Testing

      46:04
      • 1 Domain 06—Security Assessment and Testing
        00:14
      • 2 Objectives
        00:25
      • 3 Security Assessment and Testing—Introduction
        00:36
      • 4 Assessment and Test Strategies
        00:48
      • 5 Vulnerability Assessment
        01:04
      • 6 Penetration Testing
        01:18
      • 7 Log Management
        01:14
      • 8 Log Management—Advantages and Challenges
        00:44
      • 9 Log Management—Best Practices
        00:48
      • 10 Log Management—Operational Process
        00:40
      • 11 Logged Events
        00:27
      • 12 Synthetic Transactions
        00:59
      • 13 Reasons to Use Synthetic Transactions
        00:51
      • 14 Code Review and Testing
        00:49
      • 15 Testing Techniques
        01:16
      • 16 Security Testing in the SDLC
        01:55
      • 17 Software Product Testing Levels
        01:05
      • 18 Misuse Case Testing
        00:37
      • 19 Misuse Case Testing—Scenarios
        01:19
      • 20 Test Coverage Analysis
        00:38
      • 21 Interface Testing
        00:35
      • 22 API Testing (contd.)
        00:59
      • 23 Interface Testing (contd.)
        00:27
      • 24 GUI Testing
        00:51
      • 25 Common Software Vulnerabilities
        01:28
      • 26 Business Scenario
        00:54
      • 27 Information Security Continuous Monitoring
        01:32
      • 28 Information Security Continuous Monitoring—Strategy and Process
        01:55
      • 29 Risk Evaluation and Control—Metrics
        01:00
      • 30 Security Controls Monitoring Frequencies
        02:24
      • 31 ISCM—Benefits
        00:50
      • 32 Key Performance and Risk Indicators
        01:12
      • 33 Internal and Third Party Audits
        01:33
      • 34 Audit Frequency and Scope
        00:47
      • 35 Statement on Auditing Standards No. 70
        01:43
      • 36 Service Organization Controls
        00:57
      • 37 SOC 1 Report
        01:23
      • 38 SOC 2 Report
        01:40
      • 39 SOC 2 Reports (contd.)
        01:07
      • 40 SOC 3 Report
        00:41
      • 41 SOC 1, SOC 2, and SOC 3 Comparison
        00:58
      • 42 Audit Process—Audit Preparation Phase
        01:03
      • 43 Audit Process—Audit Phase
        00:43
      • 44 Business Scenario
        00:36
      • 45 Quiz
      • 46 Summary
        00:52
      • 47 Conclusion
        00:07
    • Domain 07 - Security Operations

      3:06:24
      • 1 Domain 07—Security Operations
        00:15
      • 2 Objectives
        00:24
      • 3 Importance of Security Operations—Case Study
        00:47
      • 4 Introduction to Investigations
        00:41
      • 5 Investigation Challenges
        01:04
      • 6 Investigations—Primary Activities
        01:51
      • 7 Crime Scene
        00:52
      • 8 Forensic Investigation Guidelines
        01:07
      • 9 Incident Response Terminologies
        01:53
      • 10 Incident Response Goals
        00:28
      • 11 Incident Response Team
        01:39
      • 12 Incident Response Procedures
        02:19
      • 13 Incident Response Procedures (contd.)
        00:59
      • 14 Incident Response Procedures (contd.)
        00:27
      • 15 Incident Response Procedures (contd.)
        00:31
      • 16 Business Scenario
        00:52
      • 17 Evidence
        01:21
      • 18 Evidence Lifecycle
        01:17
      • 19 Chain of Evidence
        01:04
      • 20 Types of Evidence
        03:47
      • 21 Computer Forensics Procedure
        00:50
      • 22 Requirements for Investigation Types
        01:15
      • 23 Logging and Monitoring Activities
        00:40
      • 24 Intrusion Detection System
        02:52
      • 25 Intrusion Prevention System
        02:30
      • 26 Security Information and Event Management (SIEM)
        01:12
      • 27 Security Information and Event Management (SIEM)—Characteristics
        00:45
      • 28 Continuous Monitoring
        00:53
      • 29 Egress Filtering
        01:00
      • 30 Data Leak or Loss Prevention (DLP)
        01:26
      • 31 Steganography and Digital Watermarking
        00:58
      • 32 Business Scenario
        00:44
      • 33 Secure Provisioning of Resources through Configuration Management
        01:08
      • 34 Secure Provisioning of Resources through Configuration Management (contd.)
        00:52
      • 35 Introduction to Security Operations
        00:37
      • 36 Security Operations Concepts
        00:44
      • 37 Security Operations
        00:51
      • 38 Effects of Operations Controls on C.I.A.
        00:29
      • 39 Business Scenario
        01:03
      • 40 Operational Resilience
        01:08
      • 41 Threats to Operations
        02:12
      • 42 Threats to Operations (contd.)
        02:36
      • 43 Vulnerabilities
        03:30
      • 44 Controls
        01:49
      • 45 Business Scenario
        00:44
      • 46 Need for Controlling Privileged Accounts
        01:18
      • 47 Identity and Access Management
        01:30
      • 48 Types of Accounts
        01:29
      • 49 Commonly Used Roles
        01:01
      • 50 Commonly Used Roles (contd.)
        01:53
      • 51 Monitoring Special Privileges
        00:33
      • 52 Service Level Agreements (SLAs)
        01:15
      • 53 Business Scenario
        00:45
      • 54 Protect Valuable Assets
        01:28
      • 55 Protecting Physical Assets
        00:45
      • 56 Protecting Information Assets
        01:07
      • 57 Protecting Resources
        01:33
      • 58 Controls for Protecting Assets—Hardware Controls
        01:51
      • 59 Controls for Protecting Assets—Software Controls
        02:02
      • 60 Controls for Protecting Assets—Media Controls
        02:00
      • 61 Controls for Protecting Assets—Administrative Controls
        02:51
      • 62 Cloud and Virtual Storage
        00:53
      • 63 Cloud and Virtual Storage Security Issues
        00:53
      • 64 Types of Virtualized Storage
        02:00
      • 65 Hard Copy Records
        00:46
      • 66 Business Scenario
        00:34
      • 67 Incident Management
        01:46
      • 68 Security Measurements, Metrics, and Reporting
        00:32
      • 69 Managing Security Technologies
        00:42
      • 70 Incident Management—Detection Phase
        00:27
      • 71 Intrusion Detection System
        00:46
      • 72 Security Information Event Management (SIEM)
        02:38
      • 73 Anti-Malware Systems
        00:59
      • 74 Monitoring Techniques—Violation Analysis
        01:12
      • 75 Incident Management—Other Phases
        00:57
      • 76 Trusted Recovery and System Recovery
        01:54
      • 77 Problem Management
        01:29
      • 78 Operating and Maintaining Preventive Measures
        01:02
      • 79 Patch Management
        01:15
      • 80 Vulnerability Management
        01:19
      • 81 Change Management
        01:39
      • 82 Change Control Process
        01:23
      • 83 Configuration Management
        02:24
      • 84 Configuration Management (contd.)
        00:26
      • 85 Business Scenario
        00:37
      • 86 Develop a Recovery Strategy
        01:18
      • 87 Types of Recovery—Business Recovery and Facility and Supply Recovery
        00:44
      • 88 Types of Recovery—User Recovery
        00:29
      • 89 Types of Recovery—Operational Recovery
        00:56
      • 90 Recovery Partners Strategy
        02:44
      • 91 Backup Sites
        00:51
      • 92 Backup Sites (contd.)
        03:06
      • 93 Backup Sites (contd.)
        01:36
      • 94 Backup Methods
        01:36
      • 95 Importance of Maintaining Resilient Systems
        02:35
      • 96 Redundancy and Fault Tolerance
        01:54
      • 97 Redundancy and Fault Tolerance Methods
        01:13
      • 98 Redundancy and Fault Tolerance Methods (contd.)
        04:21
      • 99 Best Practices for Backup and Recovery
        00:55
      • 100 Business Scenario
        00:43
      • 101 Disaster Recovery—Planning Design and Development
        00:37
      • 102 Planning Design and Development—Step 1 and Step 2
        01:38
      • 103 Planning Design and Development—Step 3 and Step 4
        02:19
      • 104 Disaster Recovery Phases—Implementation, Testing, and Training
        00:44
      • 105 Importance of Testing
        00:19
      • 106 Types of Testing
        01:04
      • 107 Types of Testing (contd.)
        01:30
      • 108 Types of Testing (contd.)
        01:54
      • 109 Training
        02:57
      • 110 Disaster Recovery Phases—Maintenance
        02:49
      • 111 Disaster Recovery Phases—Maintenance (contd.)
        00:26
      • 112 Business Scenario
        01:04
      • 113 Perimeter Security
        01:32
      • 114 Barriers
        00:37
      • 115 Fences
        01:14
      • 116 Gates
        01:40
      • 117 Walls and Bollards
        01:13
      • 118 Perimeter Intrusion Detection
        04:26
      • 119 Business Scenario
        00:42
      • 120 Importance of Lighting
        01:12
      • 121 Types of Lighting Systems
        01:20
      • 122 Types of Lights
        01:21
      • 123 Access Control
        01:41
      • 124 Types of Access Control Systems
        06:33
      • 125 Business Scenario
        00:42
      • 126 Building and Inside Security
        08:05
      • 127 Personnel Security
        01:28
      • 128 Business Scenario
        00:50
      • 129 Quiz
      • 130 Summary
        01:00
      • 131 Conclusion
        00:06
    • Domain 08 - Software Development Security

      1:50:55
      • 1 Domain 08 - Software Development Security
        00:15
      • 2 Objectives
        00:25
      • 3 Importance of Software Development Security
        00:51
      • 4 System Environments
        01:09
      • 5 Distributed Environment
        00:11
      • 6 Client/Server Systems and Local Environment
        00:35
      • 7 Distributed Data Processing and Agents
        00:45
      • 8 Applets
        00:42
      • 9 Programming Concepts
        01:22
      • 8.010 Complier Vs Interpreter
        01:39
      • 11 Programming and Software
        01:40
      • 12 Threats in the Software Environment
        01:15
      • 13 Threats in the Software Environment (contd.)
        02:11
      • 14 Threats in the Software Environment (contd.)
        01:07
      • 15 Threats in the Software Environment (contd.)
        01:03
      • 16 Threats in the Software Environment (contd.)
        00:49
      • 17 Threats in the Software Environment (contd.)
        00:46
      • 18 Business Scenario
        01:12
      • 19 System Life Cycle and Systems Development
        02:35
      • 20 Systems Development Life Cycle
        02:31
      • 21 SDLC—Operation and Maintenance
        00:42
      • 22 Integrated Product Team (IPT)
        00:42
      • 23 DevOps
        00:39
      • 24 Software Testing Methods
        03:18
      • 25 Software Testing Levels
        00:43
      • 26 Application Controls
        00:35
      • 27 Software Development Methods
        01:09
      • 28 Software Development Methods (contd.)
        01:09
      • 29 Software Development Methods (contd.)
        00:53
      • 30 Software Development Methods (contd.)
        00:54
      • 31 Software Development Methods (contd.)
        01:32
      • 32 Java Security
        00:57
      • 33 Secure Software Development Best Practices
        00:47
      • 34 Business Scenario
        01:05
      • 35 Object - Oriented Programming Terms
        01:01
      • 36 Object - Oriented Programming Terms (contd.)
        00:34
      • 37 Object-Oriented Programming—Definition
        01:23
      • 38 Distributed Object-Oriented Systems
        01:47
      • 39 Object Request Brokers
        00:49
      • 40 COM—Component Object Model
        00:28
      • 41 DCOM—Distributed Component Object Model
        00:38
      • 42 CORBA—Common Object Request Broker Architecture
        00:58
      • 43 Software Security and Assurance
        01:18
      • 44 Software Security and Assurance (contd.)
        00:43
      • 45 Software Security and Assurance (contd.)
        00:53
      • 46 Software Security and Assurance (contd.)
        00:42
      • 47 Software Security and Assurance (contd.)
        00:41
      • 48 Software Security and Assurance (contd.)
        00:50
      • 49 Software Security and Assurance (contd.)
        00:40
      • 50 Software Security and Assurance (contd.)
        00:55
      • 51 Software Security and Assurance (contd.)
        00:40
      • 52 Software Security and Assurance (contd.)
        00:36
      • 53 Software Security and Assurance (contd.)
        00:56
      • 54 Software Security and Assurance (contd.)
        00:54
      • 55 Software Security and Assurance (contd.)
        00:35
      • 56 Software Security : XML and Security Assertion Markup Language
        01:23
      • 57 Software Security: SOA
        02:15
      • 58 Audit and Assurance Mechanisms
        02:24
      • 59 Assessing the Effectiveness of Software Security
        00:51
      • 60 Assessing the Effectiveness of Software Security (contd.)
        00:51
      • 61 Assessing the Security Impact of Acquired Software
        01:15
      • 62 Code Repositories and Application Programming Interfaces
        01:04
      • 63 Business Scenario
        00:47
      • 64 Database and Data Warehousing Environments
        01:25
      • 65 Database Terms
        01:09
      • 66 Types of Databases
        00:27
      • 67 Types of Databases (contd.)
        00:27
      • 68 Types of Databases (contd.)
        00:41
      • 69 Types of Databases (contd.)
        00:29
      • 70 Types of Databases (contd.)
        00:43
      • 71 Database—Threats and Vulnerabilities
        04:40
      • 72 Introduction to Data Warehousing
        01:04
      • 73 Data Warehousing Concepts
        01:57
      • 74 Database Normalization
        01:17
      • 75 DBMS Controls
        04:26
      • 76 Business Scenario
        00:39
      • 77 Malwares—Types
        04:56
      • 78 Malware Protection
        01:31
      • 79 Business Scenario
        00:35
      • 80 Importance and Role of Knowledge Management
        01:03
      • 81 Knowledge-Based System/Artificial Intelligence
        00:33
      • 82 Knowledge-Based System—Expert System
        01:22
      • 83 Knowledge-Based System—Neural Network
        01:33
      • 84 Web Application Environment—Threats and Vulnerabilities
        01:35
      • 85 Web Application Environment Security
        01:03
      • 86 Web Application Environment Security (contd.)
        01:14
      • 87 Web Application Environment Security (contd.)
        00:34
      • 88 Web Application Environment Security (contd.)
        00:45
      • 89 The Ten Best Practices for Secure Software Development—(ISC)2
        06:28
      • 90 Quiz
      • 91 Summary
        01:07
      • 92 Conclusion
        00:13
    • Domain 00 - Introduction

      12:04
      • 0.01 Introduction
        12:04
    • Domain 01 - Security and Risk Management

      36:14
      • 1.01 Security and Risk Management
        36:14
      • Quiz
    • Domain 02 - Asset Security

      05:28
      • 2.01 Asset Security
        05:28
      • Quiz
    • Domain 03 - Security Engineering

      13:20
      • 3.01 Security Engineering
        13:20
      • Quiz
    • Domain 04 - Communications and Network Security

      06:04
      • 4.01 Communications and Network Security
        06:04
      • Quiz
    • Domain 05 - Identity and Access Management

      03:32
      • 5.01 Identity and Access Management
        03:32
      • Quiz
    • Domain 08 - Software Development Security

      06:42
      • 8.01 Software Development Security
        06:42
      • Quiz
    • {{childObj.title}}

      • {{childObj.childSection.chapter_name}}

        • {{lesson.title}}
      • {{lesson.title}}

    View More

    View Less

Exam & certification FREE PRACTICE TEST

  • How do I become a CISSP certified professional?

    You can become a CISSP certified professional after passing the CISSP exam. The computer-based exam is conducted worldwide at Pearson VUE testing centers. 
    The link is: https://cert.isc2.org/cissp-exam-outline-form/

    For the US, Canada, and Europe students: Exam Pass Guarantee*
    An exam Pass Guarantee is offered by Simplilearn to the aspirants. Aspirants are given a voucher (free of charge) for retaking the exam after a failed attempt in the ISC2 CISSP exam.

    T&C for claiming the retake voucher as a part of the exam pass guarantee:

    1. Attend a minimum of one complete trainer-led online class
    2. Submit proof of failure given by ISC2
    3. Achieve more than 85% score in at least 3 of the 5 test papers provided with the CISSP course
    4. Must appear for the CISSP exam within 30 days of completing the course

  • What are the prerequisites for CISSP certification?

    The prerequisite for ISC2 organized CISSP certification is:
     
    A minimum of 5 years of full-time work experience in 2 or more out of 8 CISSP – CBK 2018 domains.
     
    Applicants who do not have the required experience are awarded an ISC2 associate title. The title gets replaced with CISSP certificate on gaining the necessary 5 years of experience and submitting its proof.
     
    To advance a career in Information Security domain, professionals can undergo CISSP training and gain the required mobility and credibility.

  • What do I need to do to unlock my Simplilearn certificate?

    The Simplilearn certificate can be obtained by the following steps:
    • For Online Classroom learning, one entire batch needs to attend along with a simulation test with at least a 60% score.
    • Applicants need to finish 85% of the course and pass a simulation test with at least a 60% score for Online Self-Paced learning.

  • What is the passing score for the CISSP Certification exam?

    Learners need to score a minimum of 700 to pass the CISSP certification exam.

  • How do I fill out and submit the CISSP application form online?

    1. Review exam availability by credential.
    2. Create an account in the Pearson VUE website and check the Pearson VUE NDA.
    3. Find a convenient test center to take the exam
    4. Then select the appropriate time
    5. Complete the payment.

  • Do you provide assistance for the exam application process?

    Applicants can visit the Help and Support portal to get the assistance regarding the CISSP exam application process from Simplilearn.

  • How many attempts do I have to pass the CISSP exam?

    You will have three attempts to pass the exam in a calendar year. In case the candidate does not clear the CISSP exam in their first attempt, they will have to wait for a period of 30 days before re-attempting the exam. If the candidate fails to clear the exam in the second attempt also, they will have to wait for 90-days before taking up the exam again. If the third attempt to clear the exam was also not successful, then the candidate will have to wait for 180-days before re-appearing for the exam.

    Candidates will not be allowed to take up this exam more than 3 times in a 12 months period.

  • How long does it take to receive the CISSP Certification exam results?

    Aspirants can expect to get the CISSP exam result in 2-4 weeks.

  • How long is the CISSP Certification valid for?

    The CISSP certification has three years of validity.

  • If I fail the CISSP Exam, how soon can I retake it?

    The CISSP exam can be retaken after 30 days of the failed attempt.

  • If I fail in the CISSP Exam, can I apply for re-evaluation?

    There is no reevaluation of the CISSP exam for a failed attempt.

  • I have passed the CISSP Certification examination. When and how do I receive my certificate?

    After receiving the CISSP exam results email, learners can expect to get their certificate email within 4-6 weeks.

  • What if I miss a class?

    Learners can access the recordings of each session, that Simplilearn provides, on missing a session. Learners who enroll for Flexi-Pass can attend 15 sessions for a period of 90 days.

  • How do I schedule/book my exam?

    Please click the below link for information regarding the booking process.
    https://www.simplilearn.com/ice9/about_course_images/Raise_exam_request_through_LMS.pdf

  • Do you provide any practice tests as part of this course?

    Yes, we provide 1 practice test as part of our course to help you prepare for the actual certification exam. You can try this Free CISSP Exam Prep Practice Test to understand the type of tests that are part of the course curriculum. 

Course advisor

Dean Pompilio
Dean Pompilio Technical Trainer, Owner- Steppingstonesolutions Inc

Mr.Pompilio has been an IT Professional since 1989. He has worn many hats along the way and holds over 20 IT certifications which include EC-Council CEI, CEH, CHFI, CISSP, CISA, CISM. His passion is to help IT professionals achieve their training goals and career growth.

Reviews

Doreen Robin Phillips
Doreen Robin Phillips Consultant - Global Mobility, Hyderabad

Training was good, elaborations are very good and the case study shared was great.

Rakesh Sharma
Rakesh Sharma IT Consultancy and Advisory, Mumbai

I loved the course on CISSP® - Certified Information Systems Security Professional from Simplilearn. It was concise, comprehensive and easy to follow. Their videos, live sessions, and exams are excellent.

Read more Read less
Madhan Mohan Venkatasamy
Madhan Mohan Venkatasamy Security Consultant at IBM India Private Limited, Bangalore

I had enrolled Simplilearn software security course CISSP® - Certified Information Systems Security Professional certification. It has been excellent as it covers all the bases from study material to Q&A's, all with the convenience of preparing from home, through online. Their material is amazing and is highly competitive cyber security course. I would recommend Simplilearn for preparation of any IT software based competitive exam.

Read more Read less
Fernandez Vijay
Fernandez Vijay Technical Specialist - Security at Microland Limited, Bangalore

Simplilearn has been a great learning platform for me. I had enrolled for CISSP and my expectation was met, with the expertise the trainer had on the concepts. I look forward to doing more course with Simplilearn.

Read more Read less
Vijay Chaitanya Reddy Kovvuri
Vijay Chaitanya Reddy Kovvuri Information Security at Syntel, Pune

Interactive sessions...Example scenarios are good...The overall flow was good…

Manoj Sharma
Manoj Sharma Information Security Manager, Delhi

The precise syllabus, quality of webEx app, the quality of trainers and the ease of use of Simplilearn website... Highly satisfied.

R Giri
R Giri Sr.Manager - IT at Syndicate Bank, Bangalore

The concepts of the Instructor was mind-blowing...Lots of Industry examples...Very well organized...

Akbar Ali
Akbar Ali Systems Engineer at Allscripts, Pune

One of the interesting and interactive sessions I have ever attended.

Nityanand Singh
Nityanand Singh Associate Manager-IT Operations at Tredence, Bangalore

Really good training. It helped me to clear a lot of doubts which were present in my mind for a long time.

Sujay Sonar
Sujay Sonar Business Analyst at Cognizant Technology Solutions, Pune

The course content is very good and satisfactory. The trainer is also good with his teaching abilities.

Chandrakant Khairnar
Chandrakant Khairnar Product Manager, Mumbai

Training was up to the mark, solved my purpose of joining the course, a kick-starter to exam preparation and getting the basics right.

Jenish James
Jenish James IT Security Analyst at Halliburton, Pune

The training was nice and to the point. The trainer was nice and helpful. He cleared all our course-related doubts.

Rohit Pandita
Rohit Pandita Manager, Mumbai

Scenario based examples with elaborate details when required. Very strategic and useful way of teaching.

Melwyn Menezes
Melwyn Menezes Mumbai

It was a very good and informative training program conducted by Simplilearn.

Sarang Chalikwar
Sarang Chalikwar Security Architect, Mumbai

Excellent training; the trainer is having in-depth knowledge in all domains. He was able to map his experience with real time examples while delivering sessions.

Read more Read less

    FAQs

    • What is the average salary for an Information Security Engineer in Hyderabad?

      An average salary of Rs 1,390,000 per year is expected to be earned by Information Security Engineers in Hyderabad, as per the survey of Payscale. Professionals who undergo CISSP®- Certified Information Systems Security Professional program has the capability of earning even more.

    • What are other types of roles within the Cyber Security space available in Hyderabad?

      Various job roles are offered by companies in Hyderabad in the domain of cybersecurity. Listed below are some of them:

      • Security Engineer
      • Cybersecurity Testing
      • Information Security Consultant
      • Application Security
      • Cybersecurity Architect

    • Which companies are hiring Information Security Engineers in Hyderabad?

      There are many companies in Hyderabad that have a requirement for skilled Information Security Engineers. Some of them are Wells Fargo, Honeywell, OSI Systems, HSBC, Service Now, and Solenis.

    • Who are the instructors for the live classroom training?

      All our highly-qualified trainers are CISSP certified with more than 16 years of experience working in the domain.

    • What certification will I receive after completing the CISSP training in Hyderabad?

      Applicants who complete the CISSP certification training in Hyderabad get the following:
      1. A course completion certificate
      2. 32 hours CPE certificate

    • How does online classroom training work?

      Simplilearn offers the online classroom training for the CISSP course via live video streaming. A CISSP certified trainer who has more than 16 years of work experience conducts the classes in the presence of a global audience and enhance the learning experience of the learners.

    • Is this live training, or will I watch pre-recorded videos?

      There is live online video streaming of all the classes that form a part of the CISSP training program. During the sessions, applicants can participate in the discussions and ask their questions to the mentors. Recordings of each session are also provided for reference in the future.

    • What tools do I need to attend the training sessions?

      The CISSP training can be attended with the following tools:
      • Windows: Windows XP SP3 or higher
      • Mac: OSX 10.6 or higher
      • Internet speed: Preferably 512 Kbps or higher
      • Headset, speakers, and microphone

    • What else will I receive as part of the CISSP training in Hyderabad?

      The CISSP training in Hyderabad offers the following to the applicants:
      • Best-in-class e-learning course material
      • Practice simulation tests
      • Tips and tricks videos
      • Online participant handbook with cross-references to the e-learning segments

    • Is the CISSP exam fee included in the course fee?

      No, the CISSP course fee does not include the exam fee as well. Visit the website www.pearsonvue.com to book the exam.
      The exam fee is specifically included with the course fee for Canada, America, and Europe only.

    • How many questions are there in the CISSP certification exam?

      The CISSP exam is conducted for 3 hours and may consist of 100 - 150 MCQs as the exam has moved to an adaptive testing platform.

    • What is the cost of CISSP certification?

      Applicants need to pay $699 for the CISSP exam voucher.

    • Do you provide assistance in the exam application process?

      Any queries regarding the course or the exam application process can be posted at community.simplilearn.com. Simplilearn provides the necessary assistance.

    • How does Simplilearn assure me that the training and course material delivered are effective?

      Aspirants get the confidence to pass the CISSP exam with Simplilearn’s training and course material as it adopts a practical learning approach. The training provides relevant knowledge that is beneficial beyond the exam as well.

    • Can I cancel my enrollment? Will I get a refund?

      Yes, applicants can cancel their enrollment in the CISSP course. They get a complete refund after deduction of the administration fee. Our Refund Policy can be checked for further details.

    • I’d like to learn more about this training program. Whom should I contact?

      Applicants can use the Contact Us form available on Simplilearn website to learn more about the training program. We also have a Live Chat option which is active 24/7 for customer assistance.

    • What is the Certification Process?

      Professionals can easily face the difficulties in IT world by undertaking Simplilearn’s CISSP training in Hyderabad. The course completion certificate can be achieved by:
      • Attending one entire batch or finishing 85% of the course
      • Submitting a project and getting it assessed by the domain experts
      • Passing the simulation exams, if they are included in the course.

    • Who are our instructors and how are they selected?

      The instructors for Simplilearn’s CISSP course in Hyderabad are highly qualified, have 10+ years of relevant work and training experience. A strict selection procedure is adopted by Simplilearn to recruit the trainers. The procedure involves profile screening, technical assessment, and a training demonstration. A high alumni rating is also expected from the trainers.

    • What is Global Teaching Assistance?

      A dedicated team of subject matter experts forms a part of Simplilearn’s CISSP training in Hyderabad. The learning experience of the aspirants is enhanced by our trainers throughout the course. From class onboarding to project mentoring and job guidance, the trainers help you get certified in the initial effort. The teaching assistant is available during business hours.

    • What is covered under the 24/7 Support promise?

      The support team of Simplilearn is available to provide 24/7 guidance through calls, email or chat regarding the CISSP course. A community forum moderated by a dedicated team can also be used by the applicants to get the on-demand assistance. The community forum, moreover, comes with unlimited access.

    • What is covered under the 24/7 Support promise?

      We offer 24/7 support through email, chat, and calls. We also have a dedicated team that provides on demand assistance through our community forum. What’s more, you will have lifetime access to the community forum, even after completion of your course with us.

    CISSP Training & Certification in Hyderabad, India

    Hyderabad is a growing metropolitan area of the Southern Indian state of Telangana. The city was historically  a prosperous diamond and pearl trading center, but is now home to more than 1,300 IT firms, including: Google, IBM, Yahoo, Dell, Facebook, Infosys, TCS, Wipro and more. Therefore, Hyderabad offers  IT professionals plenty of opportunities to grow in their careers.

    Considered the gold standard in the IT security field, CISSP is designed to train people in the field of information assurance. In this course, professionals will learn to define all aspects of IT security. Aligned to the (ISC)² CBK 2015 requirements, this course is extensive and result-driven. Professionals who take this course will be able to identify weak spots in IT infrastructure and mend them before an attack. Certified security specialists have the potential to earn up to 16 lakhs a year and are in demand globally.

    If you’re seeking a CISSP training and certification course in Hyderabad, Simplilearn’s blended learning delivery model combines the convenience of self-paced online training with the personal motivation of live virtual classroom instruction, the reinforcement of relevant practical projects and the support of 24/7 live teaching assistants. Our CISSP course in Hyderabad is crafted by experts to help you prepare for and pass the CISSP certification exam on your first attempt. This training program provides hands-on experience and gets you ready for security specialist roles in the industry. Simplilearn understands that a CISSP Training and Certification in Hyderabad is not just a milestone but the start of your journey on the path of continuous improvement. Make the most of your current or future security specialist career with an intensive training course for CISSP training and certification in Hyderabad from Simplilearn.

     

    Our Hyderabad Correspondence / Mailing address

    Simplilearn Solutions Pvt Ltd, 1st Floor, Phoenix Tech Tower, Plot No. 14/46, Survey No. 1(part), IDA - Uppal Village and Mandal, Uppal Notified Industrial Area Service Society, Ranga Reddy District, Hyderabad - 500039, Telangana, India, Call us at: 1800-102-9602

    • Disclaimer
    • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.