
About Course
EdVast Learning offers expert-led CISSP certification training, thoroughly preparing you across all 8 domains essential for cybersecurity professionals. Perfect your skills with the best online CISSP certification training course, featuring top CISSP practice exams and comprehensive cyber security training.
- Globally recognized CISSP certification by (ISC)².
- Ideal for security professionals.
- Comprehensive 8-day course aligned with CISSP CBK.
- Flexible CISSP certification training online.
- Master cybersecurity concepts with CISSP training in India.
- Prepare with the best CISSP practice exams.
- Learn from authorized and experienced trainers.
- Success stories and testimonials from past participants.
What Will You Learn?
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
Course Content
Introduction to CISSP
CISSP® Course Introduction
Security and Risk Management
1.01 Introduction
1.02 Introduction to Security and Risk Management
1.03 Understand, Adhere to, and Promote Professional Ethics
1.04 Knowledge Check
1.05 Understand and Apply Security Concepts
1.06 Evaluate and Apply Security Governance Principles
1.07 Goals, Mission, and Objectives
1.08 Control Frameworks, Due Care, and Due Diligence
1.09 Knowledge Check
1.10 Determine Compliance and Other Requirements
1.11 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context
1.12 Types of Intellectual Properties (IP) Law
1.13 OECD Principles, GDPR, and Data Protection principles
1.14 Data Protection Principles
1.15 Understand Requirements for Investigation Types
1.16 Knowledge Check
1.17 Develop, Document, and Implement Security Policy, Standards,Procedures, and Guidelines
Asset Security
2.01 Introduction
2.02 Introduction to Asset Security
2.03 Identify and Classify Information and Assets
2.04 Information Classification Objectives
2.05 Knowledge Check
2.06 Establish Information and Asset Handling Requirements
2.07 Provision Resources Securely
2.08 Manage Data Life Cycle
2.09 Data Life Cycle: Create, Store, and Use
2.10 Data Life Cycle: Share, Archive, and Destroy
2.11 Data Remanence and Data Destruction
2.12 Knowledge Check
2.13 Ensure Appropriate Asset Retention
2.14 Data and Data Security Controls
2.15 How to Select Controls
2.16 Digital Rights Management (DRM)
2.17 Data Loss Prevention (DLP)
2.18 Quick Recap
Security Engineering
3.01 Introduction
3.02 Introduction to Security Engineering
3.03 Research, Implement, and Manage Engineering Processes Using
3.04 Trust but Verify and Zero Trust
3.05 Privacy by Design
3.06 Knowledge Check
3.07 Understand the Fundamental Concepts of Security Models
3.08_State Machine Model, Multilevel Lattice Model, Non-Interference Model, and Information Flow Model
3.09 Types of Security Models
3.10 Composition Theories, Covert Channels, and Open and Closed Systems
3.11 Knowledge Check
3.12 Select Controls Based on System Security Requirements
3.13 Security Capabilities of Information Systems
3.14 Knowledge Check
3.15 Assess and Mitigate the Vulnerabilities of Security Architectures
3.16 SCADA
3.17 Security Concerns of ICS
Communications and Network Security
4.01 Introduction
4.02 Introduction to Communications and Network Security
4.03 Assess and Implement Secure Design Principles
4.04 Physical Layer and Data Link Layer
4.05 Network Layer
4.06 Transport Layer
4.07 Session Layer and Presentation Layer
4.08 Application Layer and Protocols
4.09 Knowledge Check
4.10 IP Addressing
4.11 IPv6 and Its Address Structures
4.12 Knowledge Check
4.13 Internet Security Protocol(IPsec)
4.14 IPsec Security Protocols
4.15 Secure Access Protocols
4.16 Implementation of Multilayer Protocol, Fiber Channels, and Micro-Segmentation
4.17 SDN and Wireless Technologies
Identity and Access Management
5.01 Introduction
5.02 Introduction to Identity and Access Management (IAM)
5.03 Control Physical and Logical Access to Assets
5.04 Manage Identification and Authentication of People Devices and Services
5.05 Biometrics and Accuracy Measurement
5.06 Passwords and Its Types
5.07 Tokens, Token Devices, and Authorization
5.08 Federated Identity Management (FIM) and Credential Management System
5.09 Single Sign-On (SSO) and Just-In-Time (JIT)
5.10 Knowledge Check
5.11 Federated Identity with a Third-Party Service
5.12 Implement and Manage Authorization Mechanisms
5.13 Attribute-Based Access Control (ABAC) and Risk-Based Access Control
5.14 Knowledge Check
5.15 Manage the Identity and Access Provisioning Life Cycle
5.16 Privilege Escalation
Security Assessment and Testing
6.01 Introduction
6.02 Introduction to Security Assessment and Testing
6.03 Design and Validate Assessment, Test, and Audit Strategies
6.04 SOC Reports and Security Assessments
6.05 Internal Audit and Assessment
6.06 External Audit and Assessment
6.07 Third-Party Audit and Assessment
6.08 Knowledge Check
6.09 Vulnerability Assessment
6.10 Network Discovery Scan
6.11 Network Vulnerability Scan and Web Vulnerability Scan
6.12 Penetration Testing
6.13 Penetration Testing Process and Testing Types
6.14 Log Management and Review
6.15 Security Testing in SDLC
6.16 Code Review and Testing
6.17 Testing Methods
6.18 Interface Testing
Security Operations
7.01 Introduction
7.02 Introduction to Security Operations
7.03 Understand and Comply with Investigations
7.04 Digital Forensics
7.05 Understand the Digital Evidences
7.06 Knowledge Check
7.07 Conduct Logging and Monitoring Activities
7.08 Knowledge Check
7.09 Continuous Monitoring
7.10 Digital Forensics Tools, Tactics, Procedures, Artifacts, and UEBA
7.11 Knowledge Check
7.12 Perform Configuration Management
7.13 Apply Foundational Security Operation Concepts
7.14 Identity and Access Management with Various Types of Accounts
7.15 Apply Resource Protection
7.16 Controls for Protecting Assets
7.17 Conduct Incident Management
7.18 Understand Incident Response Life Cycle
Software Development Security
8.01 Introduction
8.02 Introduction to Software Development Security
8.03 Integrate Security in the Software Development Life Cycle
8.04 Software Development Models
8.05 Extreme Programming Model
8.06 DevOps and DevSecOps
8.07 CMM and SAMM
8.08 Change Management and Integrated Product Team (IPT)
8.09 Knowledge Check
8.10 Security Controls in Software Development Ecosystems
8.11 Other Security Controls in Software Development Ecosystems
8.12 Software Configuration Management (SCM)
8.13 Database and Data Warehousing Environments
8.14 Knowledge Check
8.15 Assess the Effectiveness of Software Security
8.16 Software Security and Assurance: Granularity of Controls and Separation of Environments
8.17 Software Security and Assurance: TOC or TOU, Prevention of Social Engineering, Backup, Software Forensics, Cryptography
Student Ratings & Reviews
No Review Yet