Course Description

  • What are the course objectives?

    Simplilearn’s CISSP® certification training is aligned to the (ISC)² CBK 2018 requirements. The course trains you in the industry’s latest best practices which will help you pass the exam in the first attempt. The certification helps you develop expertise in defining the architecture and in designing, building, and maintaining a secure business environment for your organization using globally approved Information Security standards.

    With unprecedented security breaches now being reported, the demand for IT security professionals has never been higher. Cybersecurity Ventures predicts there will be 3.5 million cybersecurity job openings by 2021. Source URL: https://cybersecurityventures.com/jobs/

  • What skills will you learn from this CISSP training course?

    By the end of this CISSP training, you will:

    • Be able to define the architecture, design, and management of the security of your organization.
    • Acquire the relevant knowledge and skills required to pass the CISSP certification exam.
    • Earn the requisite 30 CPEs required to take up the CISSP certification exam.
    • Develop working knowledge in the 8 domains prescribed by the CISSP Common Book of Knowledge, 2018.

  • Who should take this CISSP training course?

    The CISSP certification is the most globally recognized professional requirement in the IT Security domain. This certification is best suited for:

    • Security Consultants/Managers
    • IT Directors/Managers
    • Security Auditors/Architects
    • Security Systems Engineers
    • Chief Information Security Officers
    • Network Architects

  • What types of projects will you complete during the CISSP training?

    There are no projects associated with this course. 

  • What types of jobs can benefit from a CISSP certification?

    • Cloud security enablement engineer
    • Information security audit professional
    • Lead information security engineer
    • Cybersecurity strategy leader
    • Information security manager

  • What are the career benefits of the CISSP Certification?

    Increasing worldwide incidents of information security breaches have forced organizations to invest heavily in IT security, giving rise to a boom in the hiring of information security professionals.  Becoming certified in CISSP will verify you have the necessary skillsets, including: 

    • Technical security and managerial proficiency
    • Knowledge of eight important security areas ranging from access control to software development
    • Expertise in technologies that improve an organization’s security structure

Course Preview

    • Lesson 01 - Course Introduction

      11:49
      • Course Introduction
        11:49
    • Lesson 02 - Security and Risk Management

      3:08:52
      • 1.01 Security and Risk Management
        01:00
      • 1.02 Information Security Management
        15:26
      • 1.03 Security Controls
        06:06
      • 1.04 Information Security Management and Governance
        07:19
      • 1.05 Goals, Mission, and Objectives
        05:06
      • 1.06 Due Care
        14:41
      • 1.07 Security Policy
        08:18
      • 1.08 Compliance
        03:13
      • 1.09 Computer Crimes
        05:02
      • 1.10 Legal Systems
        08:09
      • 1.11 Intellectual Property (IP) Law
        08:02
      • 1.12 Privacy
        10:07
      • 1.13 General Data Protection Regulation
        05:03
      • 1.14 Security
        02:27
      • 1.15 Risk Analysis
        02:38
      • 1.16 Types of Risk Analysis
        22:35
      • 1.17 Security Control Assessment
        03:33
      • 1.18 Threat Modeling
        11:17
      • 1.19 Supply-Chain Risk Management
        03:34
      • 1.20 Third-Party Management
        12:06
      • 1.21 Business Continuity Planning
        02:19
      • 1.22 Business Continuity Planning Phases
        14:47
      • 1.23 Managing Personnel Security
        08:27
      • 1.24 Security Awareness Training
        03:16
      • 1.25 Program Effectiveness Evaluation
        03:44
      • 1.26 Key Takeaways
        00:37
      • Knowledge Check
    • Lesson 03 - Asset Security

      50:15
      • 2.01 Asset Security
        01:06
      • 2.02 Information Classification
        07:51
      • 2.03 Data Classification
        03:17
      • 2.04 Data Life Cycle
        03:42
      • 2.05 Data Management
        03:26
      • 2.06 Different Roles
        02:42
      • 2.07 Data Remanence
        05:08
      • 2.08 Privacy
        10:45
      • 2.09 States of Data
        07:56
      • 2.10 Data Loss Prevention
        03:43
      • 2.11 Key Takeaways
        00:39
      • Knowledge Check
    • Lesson 04 - Security Engineering

      3:06:27
      • 3.01 Introduction
        00:54
      • 3.02 Security Engineering
        15:29
      • 3.03 Security Architecture
        04:04
      • 3.04 Security Models
        18:22
      • 3.05 Evaluation Criteria
        13:23
      • 3.06 System Security
        02:49
      • 3.07 CPU
        07:06
      • 3.08 Memory
        07:51
      • 3.09 Security Mode
        07:27
      • 3.10 Cloud Computing
        13:58
      • 3.11 IOT
        03:28
      • 3.12 Industrial Control System (ICS)
        12:17
      • 3.13 Cryptography
        12:17
      • 3.14 Encryption Methods
        05:39
      • 3.15 DES
        10:55
      • 3.16 Asymmetric Cryptography
        10:11
      • 3.17 Public Key Infrastructure
        12:24
      • 3.18 Cryptanalysis
        02:10
      • 3.19 Key Management
        04:28
      • 3.20 Critical Path Analysis
        03:12
      • 3.21 Site Location
        06:50
      • 3.22 Fire
        08:48
      • 3.23 HVAC
        02:02
      • 3.24 Key Takeaways
        00:23
      • Knowledge Check
    • Lesson 05 - Communications and Network Security

      2:51:48
      • 4.01 Introduction
        01:00
      • 4.02 Network Architecture and Design
        21:17
      • 4.03 IP Addressing
        25:37
      • 4.04 Network Protocols
        15:43
      • 4.05 Transmission Media
        21:45
      • 4.06 Firewall
        08:20
      • 4.07 Intrusion Detection System and Intrusion Prevention System
        03:09
      • 4.08 Network Access Control (NAC)
        04:16
      • 4.09 Content Delivery Network (CDN)
        04:18
      • 4.10 Networks
        06:30
      • 4.11 Software-Defined Networking (SDN)
        01:49
      • 4.12 Remote Access
        04:17
      • 4.13 Internet Security Protocol (IPsec)
        14:24
      • 4.14 Voice over Internet Protocol (VoIP)
        02:53
      • 4.15 Phreaking
        01:42
      • 4.16 Secure Access Protocols
        05:35
      • 4.17 Wireless Technologies
        19:23
      • 4.18 Network Attacks
        09:24
      • 4.19 Key Takeaways
        00:26
      • Knowledge Check
    • Lesson 06 - Identity and Access Management

      1:48:39
      • 5.01 Identity and Access Management
        00:58
      • 5.02 Identity and Access Management
        03:54
      • 5.03 Identity Management
        10:20
      • 5.04 Biometrics
        03:57
      • 5.05 Passwords
        08:56
      • 5.06 Tokens
        04:37
      • 5.07 Memory Cards and Smart Cards
        05:56
      • 5.08 Access and Authorization Concepts
        06:15
      • 5.09 Identity Management Implementation
        10:10
      • 5.10 Kerberos
        04:19
      • 5.11 Access Control Types
        04:57
      • 5.12 Access Control Models
        07:29
      • 5.13 Access Control Tools and Techniques
        10:51
      • 5.14 Accountability
        03:37
      • 5.15 Access Control Monitoring
        03:35
      • 5.16 Identity Proofing
        05:02
      • 5.17 Markup Languages
        04:41
      • 5.18 Identity as a Service (IDaaS)
        08:37
      • 5.19 Key Takeaways
        00:28
      • Knowledge Check
    • Lesson 07 - Security Assessment and Testing

      1:16:38
      • 6.01 Security Assessment and Testing
        00:56
      • 6.02 Security Assessment
        01:01
      • 6.03 Vulnerability Assessment
        07:21
      • 6.04 Penetration Testing
        07:20
      • 6.05 Audits
        15:16
      • 6.06 Log Management
        07:13
      • 6.07 Synthetic Transaction and Real Transaction
        02:41
      • 6.08 Testing
        05:28
      • 6.09 Software Testing
        18:13
      • 6.10 Interface
        05:02
      • 6.11 Key Performance Indicators (KPI)
        05:35
      • 6.12 Key Takeaways
        00:32
      • Knowledge Check
    • Lesson 08 - Security Operations

      2:14:27
      • 7.01 Security Operations
        00:49
      • 7.02 Investigation
        05:41
      • 7.03 Forensic Investigation
        04:19
      • 7.04 Evidence
        07:29
      • 7.05 Electronic Discovery
        03:05
      • 7.06 Incident Management
        07:30
      • 7.07 Security Operations Management
        24:02
      • 7.08 Identity and Access Management
        10:08
      • 7.09 Assets
        11:50
      • 7.10 Malware
        02:12
      • 7.11 Management
        07:04
      • 7.12 Recovery and Backup
        24:56
      • 7.13 Disaster Recovery
        13:01
      • 7.14 Perimeter Security
        12:03
      • 7.15 Key Takeaways
        00:18
      • Knowledge Check
    • Lesson 09 - Software Development Security

      1:57:11
      • 8.01 Software Development Security
        01:03
      • 8.02 Importance of Software Development Security
        05:54
      • 8.03 Programming Concepts
        16:11
      • 8.04 Systems Development Life Cycle
        33:35
      • 8.05 Application Program Interface
        03:59
      • 8.06 Software Security and Assurance
        13:32
      • 8.07 Database and Data Warehouse Environments
        14:32
      • 8.08 Knowledge Management
        02:01
      • 8.09 Web Application Environment
        06:24
      • 8.10 Security Threats and Attacks
        19:28
      • 8.11 Key Takeaways
        00:32
      • Knowledge Check
    • {{childObj.title}}

      • {{childObj.childSection.chapter_name}}

        • {{lesson.title}}
      • {{lesson.title}}

    View More

    View Less

Exam & Certification

  • You must pass the CISSP exam to become certified. The CISSP exam is a computer-based test (CBT) administered at Pearson VUE Testing centres around the world.

    Link: https://cert.isc2.org/cissp-exam-outline-form/

    Exam Pass Guarantee*: Except for India, Indian Subcontinent, and Africa
    Simplilearn offers Exam Pass Guarantee to our students who complete our course training. We offer a voucher (free of charge) to the students to retake the exam in case they fail ISC2 CISSP final exam.

    T&C for claiming the retake voucher as a part of exam pass guarantee:

    • Attend at least one complete instructor-led class
    • Score over 85% in at least 3 of the 5 test papers provided along with the course
    • Must give final exam within 30 days from the date of course completion
    • Produce exam failure notice received from ISC2

  • What are the prerequisites for CISSP certification?

    This CISSP training is intended for professionals who want to acquire the credibility and mobility to advance within their current Information Security careers. To claim the CISSP certificate from ISC2 it is mandatory that you have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP – CBK 2018. Incase you do not have the required five years of experience, you will be awarded an ISC2 associate title which will be replaced with the CISSP certificate after you gain and submit proof of your experience.

  • What do I need to do to unlock my Simplilearn certificate?

    Online Classroom:

    • Attend one complete batch.
    • Complete one simulation test with a minimum score of 60%.

    Online Self learning:

    • Complete 85% of the course.
    • Complete one simulation test with a minimum score of 60%.

  • What is the passing score for CISSP Certification exam?

    The passing score for the CISSP Certification exam is 700.

  • How do I fill out and submit the CISSP application form online?

    • Review exam availability by credential.
    • Visit the Pearson VUE website, create an account, and review the Pearson VUE NDA.
    • Select the most convenient test center location.
    • Select an appointment time.
    • Pay for your exam.

  • Do you provide assistance for the exam application process?

    Yes, we do provide assistance for the exam application process. Please contact Help and Support for more information. 

  • How many attempts do I have to pass the CISSP exam?

    You will have one attempt to pass the exam.  

  • How long does it take to receive the CISSP Certification exam results?

    It will take 2-4 weeks to get the results.

  • If I fail in the CISSP Exam, can I apply for re-evaluation?

    If you fail, you won’t be able to apply for re-evaluation.

  • How long is the CISSP Certification valid for?

    CISSP Certification is valid for three years.

  • How do I apply for CISSP re-examination?

    If you don’t pass the exam the first time, you can retest after 30 days.

  • I have passed the CISSP Certification examination. When and how do I receive my certificate?

    You will receive your certification via email 4-6 weeks after you receive your exam results email.
     

  • Are the training and course material effective in preparing me for the CISSP exam?

    Our certification training is designed for you to pass the exams on your first attempt. With a hands-on learning approach and Global Learning Framework, the training not only gives you the confidence to pass the exam, but also helps you retain knowledge beyond the exam.

  • What if I miss a class?

    Simplilearn provides recordings of each class so you can review them as needed before the next session. With Flexi-pass, Simplilearn gives you access to as many as 15 sessions for 90 days.

Course Advisor

Dean Pompilio
Dean Pompilio Technical Trainer, Owner- Steppingstonesolutions Inc

Mr.Pompilio has been an IT Professional since 1989. He has worn many hats along the way and holds over 20 IT certifications which include EC-Council CEI, CEH, CHFI, CISSP, CISA, CISM. His passion is to help IT professionals achieve their training goals and career growth.

    FAQs

    • Who are the instructors for the live classroom training?

      All our highly-qualified trainers are CISSP certified with more than 16 years of experience working in the domain.

    • Is this live training, or will I watch pre-recorded videos?

      All of the classes are conducted live online. They are interactive sessions that enable you to ask questions and participate in discussions during class time. We do, however, provide recordings of each session you attend for your future reference.

    • What tools do I need to attend the training sessions?

      The tools you’ll need to attend training are:

      • Windows: Windows XP SP3 or higher
      • Mac: OSX 10.6 or higher
      • Internet speed: Preferably 512 Kbps or higher
      • Headset, speakers, and microphone: You’ll need headphones or speakers to hear instruction clearly, as well as a microphone to talk to others. You can use a headset with a built-in microphone, or separate speakers and microphone.

    • Can I cancel my enrollment? Will I get a refund?

      Yes, you can cancel your enrollment. We provide you a refund after deducting the administration fee. To know more, please go through our Refund Policy.

    • I’d like to learn more about this training program. Whom should I contact?

      Contact us using the form on the right side of any page on the Simplilearn website, or select the Live Chat link. Our customer service representatives can provide you with more details.

    • What is Global Teaching Assistance?

      Our teaching assistants are a dedicated team of subject matter experts here to help you get certified on your first attempt. They engage students proactively to ensure the course path is being followed and help you enrich your learning experience from class onboarding to project mentoring and job assistance. Teaching Assistance is available during business hours.

    • What is covered under the 24/7 Support promise?

      We offer 24/7 support through email, chat, and calls. We also have a dedicated team that provides on demand assistance through our community forum. What’s more, you will have lifetime access to the community forum, even after completion of your course with us.

    • Disclaimer
    • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.