• $495

Certified Information Systems Security Professional

CISSP, a vendor-neutral cybersecurity credential, shows you have the knowledge to design, implement and manage a best-in-class cybersecurity program in any environment. Vendor-neutral credentials are sought by organizations to avoid the limitations and expense of vendor lock-in.

Eligibility Criteria

To apply for the CISSP® course certification, you need to:

  • Have a minimum 5 years of cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)² CISSP® Common Body of Knowledge (CBK)

  • One-year experience waiver can be earned with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list

Target Audience

The CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions:

  • Chief Information Security Officer

  • Chief Information Officer

  • Director of Security

  • IT Director/Manager

  • Security Systems Engineer

  • Security Analyst

  • Security Manager

  • Security Auditor

  • Security Architect

  • Security Consultant

  • Network Architect

Course Features

✅ Live Instructor Led Coaching Sessions : Via Zoom or Face to Face at Specific Locations.

✅ Lifetime E Learning Access: Enjoy unlimited access to all course Videos, including future updates, Along with Live Instructor Guided Workshops.

✅ Comprehensive Curriculum: From beginner to advanced topics, master every aspect .

✅ Community Engagement: Join a network of learners and professionals to share insights and collaborate.

Program Outcomes

By the end of this program, participants will be capable of:

  • Master core concepts of risk management, security governance, and compliance.

  • Learn to classify information and assets, ensuring appropriate protection.

  • Gain insights into secure design principles, engineering processes, and security models.

  • Manage secure network architecture and components.

  • Implement comprehensive IAM solutions, including access control, identity management, and authentication mechanisms.

  • Analyze and interpret test data to enhance security measures.

Certification Details

Exam Details:

  • Exam Format: Computer-based, with 100-150 multiple-choice and advanced innovative questions. 

  • Exam Duration: 3 hours. 

  • Passing Score: 700 out of 1000. 

Certification Process:

  • Pass the CISSP Exam: Achieve a score of 700 or higher. 

  • Endorsement: Have your experience verified by a CISSP-certified professional. 

  • Annual Maintenance Fee: Pay an annual maintenance fee. 

  • CPE Credits: Earn 40 CPE credits per year to maintain your certification. 

Mr.Dinesh R M - Microsoft Certified AI & Data Scientist

Program Mentor - Team Academy

Certified Microsoft Trainer

Specialized in Applying AI, Tech & Power BI For Enterprise Project & Portfolio Management, Enterprise Risk Management - ISO 31000, Enterprise Financial Modelling & Aviation Commercial Reporting

Authorized Training Partner Instructor - PMI

Microsoft Certified Trainer - PL 300 & Azure Open AI Services

CompTIA CTT+ Certified Trainer

Technical Certifications : PL-300, IBM - Gen AI, AI - 900, Design Thinking Practitioner

Leadership Accolades : MBA, PMP, ITIL,

Contents

Module 1 - Security and Risk Management

Understand, adhere to, and promote professional ethics
    Understand and apply security concepts
      Evaluate and apply security governance principles
        Understand legal, regulatory, and compliance issues that pertain to information security in a holistic context
          Identify, analyze, assess, prioritize, and implement Business Continuity (BC) requirements
            Contribute to and enforce personnel security policies and procedures
              Understand and apply risk management concepts
                Understand and apply threat modeling concepts and methodologies
                  Apply Supply Chain Risk Management (SCRM) concepts
                    Establish and maintain a security awareness, education, and training program

                      Course Contents

                      Domain 1: Security and Risk Management
                        Domain 2: Asset Security
                          Domain 3: Security Architecture and Engineering
                            Domain 4: Communication and Network Security
                              Domain 5: Identity and Access Management (IAM)
                                Domain 6: Security Assessment and Testing
                                  Domain 7: Security Operations
                                    Domain 8: Software Development Security

                                      Module 2 - Assess Security

                                      Identify and classify information and assets
                                        Establish information and asset handling requirements
                                          Provision information and assets securely
                                            Manage data lifecycle
                                              Ensure appropriate asset retention (e.g., End of Life (EOL), End of Support)
                                                Determine data security controls and compliance requirements

                                                  Module 3 - Security Architecture and Engineering

                                                  Research, implement and manage engineering processes using secure design principles
                                                    Understand the fundamental concepts of security models
                                                      Select controls based upon systems security requirements
                                                        Understand security capabilities of Information Systems (IS)
                                                          Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
                                                            Select and determine cryptographic solutions.
                                                              Understand methods of cryptanalytic attacks
                                                                Apply security principles to site and facility design
                                                                  Design site and facility security controls
                                                                    Manage the information system lifecycle

                                                                      Module 4 - Communication and Network Security

                                                                      Apply secure design principles in network architectures
                                                                        Secure network components
                                                                          Implement secure communication channels according to design
                                                                            Implement secure communication channels according to design

                                                                              Module 5 - Identity and Access Management

                                                                              Control physical and logical access to assets
                                                                                Design identification and authentication strategy
                                                                                  Federated identity with a third-party service
                                                                                    Implement and manage authorization mechanisms
                                                                                      Manage the identity and access provisioning lifecycle
                                                                                        Manage the identity and access provisioning lifecycle
                                                                                          Implement authentication systems

                                                                                            Module 6 - Security Assessment and Testing

                                                                                            Design and validate assessment, test, and audit strategies
                                                                                              Conduct security control testing
                                                                                                Collect security process data
                                                                                                  Analyze test output and generate report
                                                                                                    Conduct or facilitate security audits

                                                                                                      Module 7 - Security Operations

                                                                                                      Understand and comply with investigations
                                                                                                        Conduct logging and monitoring activities
                                                                                                          Apply foundational security operations concepts
                                                                                                            Apply resource protection
                                                                                                              Operate and maintain detection and preventative measures
                                                                                                                Implement and support patch and vulnerability management
                                                                                                                  Understand and participate in change management processes
                                                                                                                    Implement recovery strategies
                                                                                                                      Implement Disaster Recovery (DR) processes
                                                                                                                        Test Disaster Recovery Plans (DRP)
                                                                                                                          Participate in Business Continuity (BC) planning and exercises
                                                                                                                            Implement and manage physical security
                                                                                                                              Address personnel safety and security concerns

                                                                                                                                Module 8 - Software Development Security

                                                                                                                                Understand and integrate security in the Software Development Life Cycle (SDLC)
                                                                                                                                  Identify and apply security controls in software development ecosystems
                                                                                                                                    Assess security impact of acquired software
                                                                                                                                      Define and apply secure coding guidelines and standards

                                                                                                                                        FAQs

                                                                                                                                        What is CISSP certification?

                                                                                                                                        The Certified Information Systems Security Professional (CISSP) certification is a globally recognized credential in the field of information security. It is designed for IT professionals who wish to demonstrate their expertise in designing, implementing, and managing a best-in-class cybersecurity program. The certification is offered by (ISC)², the International Information System Security Certification Consortium.

                                                                                                                                        What are the prerequisites for CISSP certification?

                                                                                                                                        To apply for the CISSP® course certification, you need to:

                                                                                                                                        • Have a minimum of 5 years of cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)² CISSP® Common Body of Knowledge (CBK).

                                                                                                                                        • A one-year experience waiver can be earned with a 4-year college degree, regional equivalent, or additional credential from the (ISC)² approved list.

                                                                                                                                        How many attempts do I have to pass the CISSP exam?

                                                                                                                                        (ISC)² does not limit the number of times you can attempt the CISSP exam, but there are waiting periods between attempts. Typically, you must wait 30 days after your first failed attempt and 90 days after subsequent failed attempts, up to a maximum of three times within a 12-month period.

                                                                                                                                        What are CPEs?

                                                                                                                                        Continuing Professional Education (CPE) credits are required to maintain your CISSP certification. CISSP holders must earn and report a minimum of 40 CPE credits per year and a total of 120 CPE credits over the three-year certification cycle.

                                                                                                                                        Is the CISSP exam difficult to pass?

                                                                                                                                        The CISSP exam is widely recognized for its rigorous assessment of a candidate's understanding across the broad spectrum of information security topics, demanding a deep and comprehensive knowledge of its eight domains. While it poses a significant challenge, dedicated and well-prepared candidates can navigate its complexities successfully with the right approach to training and preparation.