Course Overview

Course Overview to be entered here

Training Options

online Bootcamp

$ 3,799

  • 90 days of flexible access to online classes
  • num_of_days days of access to high-quality, self-paced learning content designed by industry experts
  • Classes starting from:-
23rd May: Weekend Class
22nd Jun: Weekday Class
Show all classes

Course Curriculum

Course Content

  • CISSP Certification Training with Exam

    Preview
    • Domain 01: Security and Risk Management

      Preview
      • 1.01 Introduction
        02:05
      • 1.02 Professional Ethics
        01:49
      • 1.03 (ISC)2 Code of Ethics
        01:46
      • 1.04 Organization Code of Ethics
        01:36
      • 1.05 Authenticity Non-Repudiation
        01:32
      • 1.06 Due Care Due Diligence
        02:32
      • 1.07 Security Controls
        07:26
      • 1.08 CIA Triad
        09:10
      • 1.09 OECD Privacy Principles
        03:11
      • 1.10 GDPR
        06:19
      • 1.11 Intellectual Property
        09:40
      • 1.12 Investigation Types
        08:05
      • 1.13 Security Policy
        08:21
      • 1.14 Business Continuity
        02:47
      • 1.15 Contingency Planning
        03:58
      • 1.16 Business Impact Analysis
        05:48
      • 1.17 Risk Management
        03:01
      • 1.18 Risk Identification
        11:06
      • 1.19 Risk Assessment
        14:21
      • 1.20 Risk Response
        04:42
      • 1.21 Risk Monitor
        07:33
      • 1.22 Threat Modeling
        00:58
      • 1.23 Threat Modeling Approaches
        02:25
      • 1.24 Threat Modeling Process
        07:46
      • 1.25 Minimum Security Requirements
        03:03
      • 1.26 Service Level Requirements
        01:46
      • 1.27 Awareness and Training
        04:14
    • Domain 02: Asset Security

      Preview
      • 2.01 Introduction
        01:09
      • 2.02 Asset Classification
        02:05
      • 2.03 Data Lifecycle
        04:23
      • 2.04 Data Roles
        08:14
      • 2.05 Data Collection
        01:52
      • 2.06 Data Location
        04:31
      • 2.07 Data Maintenance
        01:27
      • 2.08 Data Remanence
        06:25
      • 2.09 Scoping and Tailoring
        01:14
    • Domain 03: Security Architecture and Engineering

      Preview
      • 3.01 Introduction
        01:35
      • 3.02 Secure Design Principles
        14:42
      • 3.03 Security Models
        06:56
      • 3.04 Cloud Based Systems
        04:22
      • 3.05 Cloud Service Models
        04:46
      • 3.06 Cloud Deployment Models
        03:00
      • 3.07 Shared Responsibility Model
        02:52
      • 3.08 Microservices
        07:00
      • 3.09 Containerization
        05:14
      • 3.10 High Performance Computing Systems
        02:13
      • 3.11 Edge and Fog Computing
        06:03
      • 3.12 Cryptography
        05:55
      • 3.13 Cryptographic Hash
        03:15
      • 3.14 Digital Signatures
        05:32
      • 3.15 Cryptanalytic Attacks
        14:49
      • 3.16 Fire
        08:52
    • Domain 04: Communication and Network Security

      Preview
      • 4.01 Introduction
        00:59
      • 4.02 OSI Model
        15:27
      • 4.03 Network Topology
        05:27
      • 4.04 Wifi
        17:24
      • 4.05 Bluetooth
        05:38
      • 4.06 Other Wireless Technology
        17:43
      • 4.07 CDN.mp4
        03:05
      • 4.08 Transmission Media
        06:15
      • 4.09 Firewall
        04:47
      • 4.10 Firewall Architecture
        03:28
      • 4.11 802.1x
        04:04
    • Domain 05: Identity and Access Management

      Preview
      • 5.01 Introduction
        01:15
      • 5.02 Access Control
        06:52
      • 5.03 Multifactor Authentication
        02:43
      • 5.04 Biometric
        06:49
      • 5.05 Just in Time
        02:40
      • 5.06 Access control models
        06:21
      • 5.07 Identity and access provisioning lifecycle
        02:30
      • 5.08 Privilege Escalation
        01:55
      • 5.09 Kerberos
        05:44
    • Domain 06: Security Assessment and Testing

      Preview
      • 6.01 Introduction
        01:07
      • 6.02 Security Assessment Program
        12:05
      • 6.03 Code Review
        03:55
      • 6.04 Synthetic Monitoring
        04:23
      • 6.05 Breach Attack
        02:31
      • 6.06 Compliance Checks
        00:48
      • 6.07 Account Management
        01:16
      • 6.08 Backup Verification
        00:42
      • 6.09 Management Review and Approval
        00:50
      • 6.10 Training and Awareness
        01:03
      • 6.11 Ethical Disclosure
        04:31
      • 6.12 Exception Handling
        00:50
    • Domain 07: Security Operations

      Preview
      • 7.01 Introduction
        01:51
      • 7.02 Digital Forensics
        08:08
      • 7.03 SIEM
        03:51
      • 7.04 UEBA
        03:25
      • 7.05 SOAR
        04:06
      • 7.06 Threat Intelligence
        01:03
      • 7.07 Incident Management
        07:14
      • 7.08 Firewall Types
        12:54
      • 7.09 IDs and IPs
        07:25
      • 7.10 Whitelisting Blacklisting
        01:16
      • 7.11 Honeypots
        02:16
      • 7.12 Patch Management
        05:40
      • 7.13 Backup Storage Strategies
        03:41
      • 7.14 Backup Schemes
        11:07
      • 7.15 Electronic Backup Solutions
        04:59
      • 7.16 Recovery Sites
        05:34
      • 7.17 Personal Safety
        04:07
    • Domain 08: Software Development Security

      Preview
      • 8.01 Introduction.mp4
        01:11
      • 8.02 SDLC
        07:03
      • 8.03 Maturity Models
        07:50
      • 8.04 Change Management.mp4
        01:26
      • 8.05 IPT
        00:53
      • 8.06 Toolsets
        00:46
      • 8.07 IDE
        02:01
      • 8.08 Runtime System
        01:00
      • 8.09. CI and CD
        02:17
      • 8.10. Software Configuration Management
        01:38
      • 8.11 Software Testing
        02:09
      • 8.12 Free and Proprietary
        06:51
      • 8.13 Secure Coding
        11:08

Why Join this Program

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts
  • Acknowledgement
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, OPM3 and the PMI ATP seal are the registered marks of the Project Management Institute, Inc.
  • *All trademarks are the property of their respective owners and their inclusion does not imply endorsement or affiliation.
  • Career Impact Results vary based on experience and numerous factors.