Quality Seal Emagister EMAGISTER CUM LAUDE

CISSP®

simplilearn
Online

Price on request
You can also call the Study Centre
81510... More
Compare this course with other similar courses
See all

Important information

  • Course
  • Online
Description

Simplilearn is the World’s Largest Certification Training Provider, with over 400,000+ professionals trained globally
Trusted by the Fortune 500 companies as their learning provider for career growth and training
2000+ certified and experienced trainers conduct trainings for various courses across the globe
All our Courses are designed and developed under a tried and tested Unique Learning Framework that is proven to deliver 98.6% pass rate in first attempt.

Important information

Opinions

M

09/05/2014
What I would highlight The training was Simply Excellent!

What could be improved Nothing.

Would you recommend this course? Yes.
T

22/04/2014
What I would highlight This course was thorough and engaging; the concepts were relevant and applicable to my work. The instructor was knowledgeable and kept us engaged.

What could be improved Nothing.

Would you recommend this course? Yes.
A

11/03/2014
What I would highlight Good knowledge shared and in-depth exercises on the subject included.

What could be improved Nothing

Would you recommend this course? Yes.
A

07/03/2014
What I would highlight It was a good training session. Trainer was interactive and approachable.

What could be improved Nothing

Would you recommend this course? Yes.
H

04/03/2014
What I would highlight Course was excellent, we learned a lot of new things and the trainer was very professional.

What could be improved Nothing

Would you recommend this course? Yes.
D

27/02/2014
What I would highlight Excellent trainer . Technically managed workshop was well. However the way he has conducted the entire workshop it was very interesting and interactive. Wonderful experience.

What could be improved Nothing

Would you recommend this course? Yes.

Course programme

Course Preview
  • CISSP® - Certified Information Systems Security Professional
    • Domain 00 - Introduction
      • 1 CISSP®—Introduction
      • 10 CISSP® Certification Requirements (contd.)
      • 11 CISSP® Certification Requirements (contd.)
      • 2 Objectives
      • 3 CISSP®
      • 4 (ISC)²®
      • 5 CISSP® Domains
      • 6 Benefits of CISSP® for Professionals
      • 7 Benefits of CISSP® for Employers
      • 8 CISSP® Certification Requirements
      • 9 CISSP® Certification Requirements (contd.)
      • 12 CISSP® Examination
      • 13 CISSP® Examination (contd.)
      • 14 Conclusion
    • Domain 01 - Security and Risk Management
      • 1 Domain 01—Security and Risk Management
      • 2 Objectives
      • 3 Importance of Information Security and Risk Management
      • 4 Role and Importance of CIA in ISM
      • 5 Confidentiality
      • 6 Integrity
      • 7 Availability
      • 8 Information Security
      • 9 Information Security Management
      • 10 Information Security Governance
      • 11 IT Security and Organizational Goals, Mission, and Objectives
      • 12 Goals, Mission, and Objectives
      • 13 Aligning Security with Goals, Mission, and Objectives
      • 14 Business Scenario
      • 15 Organizational Processes
      • 16 Auditing
      • 17 Control Framework
      • 18 Due Care
      • 19 Due Diligence
      • 20 Security Controls
      • 21 Service Level Agreements
      • 22 Managing Third - Party Governance
      • 23 Offshoring—Privacy Requirements and Compliance
      • 24 Business Scenario
      • 25 Layers of Responsibility
      • 26 Security Policies
      • 27 Types of Security Policies
      • 28 Security Policy Implementation
      • 29 Policy Chart
      • 30 Standards, Guidelines, Procedures, and Baselines
      • 31 Business Scenario
      • 32 Compliance—Need for Compliance
      • 33 Regulatory Compliance
      • 34 Compliance
      • 35 Compliance (contd.)
      • 36 Compliance (contd.)
      • 37 Standards/Manuals/Guidelines for Compliance
      • 38 Computer Crimes
      • 39 Introduction to Computer Crimes
      • 40 Categories of Computer Crimes
      • 41 Business Scenario
      • 42 Major Legal Systems
      • 43 Common Law and Civil Law
      • 44 Customary Law and Religious Law
      • 45 Mixed Law
      • 46 Business Scenario
      • 47 Introduction to Intellectual Property (IP) Law
      • 48 Types of Intellectual Property (IP) Law
      • 49 Types of Intellectual Property (IP) Law (contd.)
      • 50 Types of Intellectual Property (IP) Law (contd.)
      • 51 Business Scenario
      • 52 Import or Export Controls and Trans - Border Data Flow
      • 53 Introduction to Privacy
      • 54 U.S. Privacy Laws
      • 55 U.S. Privacy Laws (contd.)
      • 56 U.S. Guidelines for Managing Privacy
      • 57 EU Council Directive (Law) on Data Protection
      • 58 The U.S.-European Union Safe Harbor
      • 59 Security Definitions
      • 60 Information Risk Management
      • 61 Business Scenario
      • 62 Introduction to Risk Analysis
      • 63 Goals of Risk Analysis
      • 64 Risk Analysis Team
      • 65 Steps for Risk Analysis
      • 66 Information and Assets Valuation
      • 67 Risk Analysis Types
      • 68 Quantitative Risk Analysis—Steps
      • 69 Quantitative Risk Analysis—Problem
      • 70 Qualitative Risk Analysis
      • 71 Delphi Technique
      • 72 Quantitative vs.Qualitative
      • 73 Hybrid Analysis
      • 74 Countermeasure Selection—Problem
      • 75 Countermeasure Selection—Other Factors
      • 76 Handling Risk
      • 77 Business Scenario
      • 78 Threat Modeling
      • 79 Need for Business Continuity Planning
      • 80 Basic Concepts—Disruptive Events
      • 81 Basic Concepts—Business Continuity Planning
      • 82 Importance of Business Continuity Planning
      • 83 Business Continuity Planning Phases
      • 84 BCP/DRP Phase 1—Project Initiation and Scoping
      • 85 BCP/DRP Phase 2—Business Impact Analysis (BIA)
      • 86 BIA—Goals
      • 87 BIA—Steps
      • 88 BIA Steps—Business Unit Level
      • 89 Maximum Tolerable Downtime (MTD)
      • 90 Failure and Recovery Metrics
      • 91 Failure and Recovery Metrics (contd.)
      • 92 Stages of Failure and Recovery
      • 93 BCP/DRP Phase 3—Identify Preventive Controls
      • 94 Importance of Managing Personnel Security
      • 95 Managing Personnel Security—Hiring Practices
      • 96 Managing Personnel Security—Employee Termination
      • 97 Vendor, Contractors, and Consultant Controls
      • 98 Best Work Practices
      • 99 Business Scenario
      • 100 Importance of Security Awareness Training
      • 101 Security Awareness Training: Awareness, Training, and Education
      • 102 Implementation of Security Awareness Training Program
      • 103 Importance of Content Updates
      • 104 Importance of Managing Security Function
      • 105 Best Practices—Budget and Establish Security Metrics
      • 106 Best Practices—Resources and Develop and Implement Strategies
      • 107 Best Practices—Completeness and Effectiveness of the Program
      • 108 Business Scenario
      • 109 (ISC)² Code of Ethics
      • 110 Quiz
      • 111 Summary
      • 112 Conclusion

Additional information

  • What is this course about?

    CISSP training from Simplilearn, aligned to (ISC) ² CBK 2015, ensures you are re-equipped on the best practices in the industry and enables you to ace the exam in the first attempt. The certification helps you develop the expertise in defining the architecture, design, build, and maintain a secure business environment for your organization using the globally approved Information Security standards.

  • What are the Course Objectives?

    By the end of this training you will:
    • Be able to define the architecture, design and manage the security of your organization.
    • Acquire the relevant knowledge and skills required to clear the CISSP certification exam
    • Earn the requisite 30 CPEs/PDUs required to take up the CISSP certification exam
    • Develop a working knowledge of the 8 domains areas as prescribed by CISSP – Common Book of Knowledge 2015.

  • Who should do this course?

    CISSP certification is a globally recognized professional requirement in the IT Security domain. This certification is most suited for:
    • Security Consultant/Manager
    • IT Director/Manager
    • Security Auditor/Architect
    • Security Systems Engineer
    • Chief Information Security Officer
    • Network Architect


Compare this course with other similar courses
See all