Certified Information Systems Security Professional

328 Learners

Course Overview

Certified Information Systems Security Professional is a globally respected certification that validates deep knowledge in cybersecurity domains like security architecture, risk management, and incident response. It’s ideal for experienced professionals aiming for leadership roles.

Skills Covered

  • Security and Risk Management
  • Security Architecture and Engineering
  • Identity and Access Management IAM
  • Security Operations
  • Asset Security
  • Communication and Network Security
  • Security Assessment and Testing
  • Software Development Security
  • Security and Risk Management
  • Asset Security
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management IAM
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security
  • Security and Risk Management
  • Asset Security
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management IAM
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Course Curriculum

Eligibility


Minimum five years of cumulative, full-time experience in two or more of the as per Exam Outline domains.
Post-secondary degree in computer science, IT, or related fields may substitute for up to one year of experience.
An additional credential from the approved list may also substitute for up to one year of experience.
Part-time work and internships can count towards the experience requirement.  OR
Candidates without the required experience can become an Associate by passing the examination.
Associates have six years to earn the necessary five years of required experience.
Read More

Pre-requisites

Work Experience
Full-Time Experience: Your work experience is accrued monthly. Thus, you must have worked a minimum of 35 hours/week for four weeks in order to accrue one month of work experience.
Part-Time Experience: Your part-time experience cannot be less than 20 hours a week and no more than 34 hours a week.
- 1040 hours of part-time = 6 months of full-time experience
- 2080 hours of part-time = 12 months of full-time experience
Internship: A paid or unpaid internship is acceptable. You will need documentation on company/organization letterhead confirming your position as an intern. If you are interning at a school, the document can be on the registrar's stationery.
Read More

Course Content

  • CISSP Training

    Preview
    • Domain 01: Security and Risk Management

      02:17:00Preview
      • 1.01 Introduction
        02:05
      • 1.02 Professional Ethics
        01:49
      • 1.03 (ISC)2 Code of Ethics
        01:46
      • 1.04 Organization Code of Ethics
        01:36
      • 1.05 Authenticity Non-Repudiation
        01:32
      • 1.06 Due Care Due Diligence
        02:32
      • 1.07 Security Controls
        07:26
      • 1.08 CIA Triad
        09:10
      • 1.09 OECD Privacy Principles
        03:11
      • 1.10 GDPR
        06:19
      • 1.11 Intellectual Property
        09:40
      • 1.12 Investigation Types
        08:05
      • 1.13 Security Policy
        08:21
      • 1.14 Business Continuity
        02:47
      • 1.15 Contingency Planning
        03:58
      • 1.16 Business Impact Analysis
        05:48
      • 1.17 Risk Management
        03:01
      • 1.18 Risk Identification
        11:06
      • 1.19 Risk Assessment
        14:21
      • 1.20 Risk Response
        04:42
      • 1.21 Risk Monitor
        07:33
      • 1.22 Threat Modeling
        00:58
      • 1.23 Threat Modeling Approaches
        02:25
      • 1.24 Threat Modeling Process
        07:46
      • 1.25 Minimum Security Requirements
        03:03
      • 1.26 Service Level Requirements
        01:46
      • 1.27 Awareness and Training
        04:14
    • Domain 02: Asset Security

      31:20Preview
      • 2.01 Introduction
        01:09
      • 2.02 Asset Classification
        02:05
      • 2.03 Data Lifecycle
        04:23
      • 2.04 Data Roles
        08:14
      • 2.05 Data Collection
        01:52
      • 2.06 Data Location
        04:31
      • 2.07 Data Maintenance
        01:27
      • 2.08 Data Remanence
        06:25
      • 2.09 Scoping and Tailoring
        01:14
    • Domain 03: Security Architecture and Engineering

      01:37:06Preview
      • 3.01 Introduction
        01:35
      • 3.02 Secure Design Principles
        14:42
      • 3.03 Security Models
        06:56
      • 3.04 Cloud Based Systems
        04:22
      • 3.05 Cloud Service Models
        04:46
      • 3.06 Cloud Deployment Models
        03:00
      • 3.07 Shared Responsibility Model
        02:52
      • 3.08 Microservices
        07:00
      • 3.09 Containerization
        05:14
      • 3.10 High Performance Computing Systems
        02:13
      • 3.11 Edge and Fog Computing
        06:03
      • 3.12 Cryptography
        05:55
      • 3.13 Cryptographic Hash
        03:15
      • 3.14 Digital Signatures
        05:32
      • 3.15 Cryptanalytic Attacks
        14:49
      • 3.16 Fire
        08:52
    • Domain 04: Communication and Network Security

      01:24:17Preview
      • 4.01 Introduction
        00:59
      • 4.02 OSI Model
        15:27
      • 4.03 Network Topology
        05:27
      • 4.04 Wifi
        17:24
      • 4.05 Bluetooth
        05:38
      • 4.06 Other Wireless Technology
        17:43
      • 4.07 CDN.mp4
        03:05
      • 4.08 Transmission Media
        06:15
      • 4.09 Firewall
        04:47
      • 4.10 Firewall Architecture
        03:28
      • 4.11 802.1x
        04:04
    • Domain 05: Identity and Access Management

      36:49Preview
      • 5.01 Introduction
        01:15
      • 5.02 Access Control
        06:52
      • 5.03 Multifactor Authentication
        02:43
      • 5.04 Biometric
        06:49
      • 5.05 Just in Time
        02:40
      • 5.06 Access control models
        06:21
      • 5.07 Identity and access provisioning lifecycle
        02:30
      • 5.08 Privilege Escalation
        01:55
      • 5.09 Kerberos
        05:44
    • Domain 06: Security Assessment and Testing

      34:01Preview
      • 6.01 Introduction
        01:07
      • 6.02 Security Assessment Program
        12:05
      • 6.03 Code Review
        03:55
      • 6.04 Synthetic Monitoring
        04:23
      • 6.05 Breach Attack
        02:31
      • 6.06 Compliance Checks
        00:48
      • 6.07 Account Management
        01:16
      • 6.08 Backup Verification
        00:50
      • 6.09 Management Review and Approval
        00:42
      • 6.10 Training and Awareness
        01:03
      • 6.11 Ethical Disclosure
        04:31
      • 6.12 Exception Handling
        00:50
    • Domain 07: Security Operations

      01:28:37Preview
      • 7.01 Introduction
        01:51
      • 7.02 Digital Forensics
        08:08
      • 7.03 SIEM
        03:51
      • 7.04 UEBA
        03:25
      • 7.05 SOAR
        04:06
      • 7.06 Threat Intelligence
        01:03
      • 7.07 Incident Management
        07:14
      • 7.08 Firewall Types
        12:54
      • 7.09 IDs and IPs
        07:25
      • 7.10 Whitelisting Blacklisting
        01:16
      • 7.11 Honeypots
        02:16
      • 7.12 Patch Management
        05:40
      • 7.13 Backup Storage Strategies
        03:41
      • 7.14 Backup Schemes
        11:07
      • 7.15 Electronic Backup Solutions
        04:59
      • 7.16 Recovery Sites
        05:34
      • 7.17 Personal Safety
        04:07
    • Domain 08: Software Development Security

      46:13Preview
      • 8.01 Introduction.mp4
        01:11
      • 8.02 SDLC
        07:03
      • 8.03 Maturity Models
        07:50
      • 8.04 Change Management.mp4
        01:26
      • 8.05 IPT
        00:53
      • 8.06 Toolsets
        00:46
      • 8.07 IDE
        02:01
      • 8.08 Runtime System
        01:00
      • 8.09. CI and CD
        02:17
      • 8.10. Software Configuration Management
        01:38
      • 8.11 Software Testing
        02:09
      • 8.12 Free and Proprietary
        06:51
      • 8.13 Secure Coding
        11:08

Why Join this Program

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts
  • Acknowledgement
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, OPM3 and the PMI ATP seal are the registered marks of the Project Management Institute, Inc.