CISSP®
-
The training was Simply Excellent!
← | →
-
This course was thorough and engaging; the concepts were relevant and applicable to my work. The instructor was knowledgeable and kept us engaged.
← | →
-
Good knowledge shared and in-depth exercises on the subject included.
← | →
Course
Online

Description
-
Type
Course
-
Methodology
Online
Simplilearn is the World’s Largest Certification Training Provider, with over 400,000+ professionals trained globally
Trusted by the Fortune 500 companies as their learning provider for career growth and training
2000+ certified and experienced trainers conduct trainings for various courses across the globe
All our Courses are designed and developed under a tried and tested Unique Learning Framework that is proven to deliver 98.6% pass rate in first attempt.
Reviews
-
The training was Simply Excellent!
← | →
-
This course was thorough and engaging; the concepts were relevant and applicable to my work. The instructor was knowledgeable and kept us engaged.
← | →
-
Good knowledge shared and in-depth exercises on the subject included.
← | →
Course rating
Recommended
Centre rating
Marzook Hussain
Teresa Brumit
Amit Srivastava
Aditya Rathor
Husam Mahmoud
Deepak Sudeley
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 7 years
Course programme
- CISSP® - Certified Information Systems Security Professional
- Domain 00 - Introduction
- 1 CISSP®—Introduction
- 10 CISSP® Certification Requirements (contd.)
- 11 CISSP® Certification Requirements (contd.)
- 2 Objectives
- 3 CISSP®
- 4 (ISC)²®
- 5 CISSP® Domains
- 6 Benefits of CISSP® for Professionals
- 7 Benefits of CISSP® for Employers
- 8 CISSP® Certification Requirements
- 9 CISSP® Certification Requirements (contd.)
- 12 CISSP® Examination
- 13 CISSP® Examination (contd.)
- 14 Conclusion
- Domain 01 - Security and Risk Management
- 1 Domain 01—Security and Risk Management
- 2 Objectives
- 3 Importance of Information Security and Risk Management
- 4 Role and Importance of CIA in ISM
- 5 Confidentiality
- 6 Integrity
- 7 Availability
- 8 Information Security
- 9 Information Security Management
- 10 Information Security Governance
- 11 IT Security and Organizational Goals, Mission, and Objectives
- 12 Goals, Mission, and Objectives
- 13 Aligning Security with Goals, Mission, and Objectives
- 14 Business Scenario
- 15 Organizational Processes
- 16 Auditing
- 17 Control Framework
- 18 Due Care
- 19 Due Diligence
- 20 Security Controls
- 21 Service Level Agreements
- 22 Managing Third - Party Governance
- 23 Offshoring—Privacy Requirements and Compliance
- 24 Business Scenario
- 25 Layers of Responsibility
- 26 Security Policies
- 27 Types of Security Policies
- 28 Security Policy Implementation
- 29 Policy Chart
- 30 Standards, Guidelines, Procedures, and Baselines
- 31 Business Scenario
- 32 Compliance—Need for Compliance
- 33 Regulatory Compliance
- 34 Compliance
- 35 Compliance (contd.)
- 36 Compliance (contd.)
- 37 Standards/Manuals/Guidelines for Compliance
- 38 Computer Crimes
- 39 Introduction to Computer Crimes
- 40 Categories of Computer Crimes
- 41 Business Scenario
- 42 Major Legal Systems
- 43 Common Law and Civil Law
- 44 Customary Law and Religious Law
- 45 Mixed Law
- 46 Business Scenario
- 47 Introduction to Intellectual Property (IP) Law
- 48 Types of Intellectual Property (IP) Law
- 49 Types of Intellectual Property (IP) Law (contd.)
- 50 Types of Intellectual Property (IP) Law (contd.)
- 51 Business Scenario
- 52 Import or Export Controls and Trans - Border Data Flow
- 53 Introduction to Privacy
- 54 U.S. Privacy Laws
- 55 U.S. Privacy Laws (contd.)
- 56 U.S. Guidelines for Managing Privacy
- 57 EU Council Directive (Law) on Data Protection
- 58 The U.S.-European Union Safe Harbor
- 59 Security Definitions
- 60 Information Risk Management
- 61 Business Scenario
- 62 Introduction to Risk Analysis
- 63 Goals of Risk Analysis
- 64 Risk Analysis Team
- 65 Steps for Risk Analysis
- 66 Information and Assets Valuation
- 67 Risk Analysis Types
- 68 Quantitative Risk Analysis—Steps
- 69 Quantitative Risk Analysis—Problem
- 70 Qualitative Risk Analysis
- 71 Delphi Technique
- 72 Quantitative vs.Qualitative
- 73 Hybrid Analysis
- 74 Countermeasure Selection—Problem
- 75 Countermeasure Selection—Other Factors
- 76 Handling Risk
- 77 Business Scenario
- 78 Threat Modeling
- 79 Need for Business Continuity Planning
- 80 Basic Concepts—Disruptive Events
- 81 Basic Concepts—Business Continuity Planning
- 82 Importance of Business Continuity Planning
- 83 Business Continuity Planning Phases
- 84 BCP/DRP Phase 1—Project Initiation and Scoping
- 85 BCP/DRP Phase 2—Business Impact Analysis (BIA)
- 86 BIA—Goals
- 87 BIA—Steps
- 88 BIA Steps—Business Unit Level
- 89 Maximum Tolerable Downtime (MTD)
- 90 Failure and Recovery Metrics
- 91 Failure and Recovery Metrics (contd.)
- 92 Stages of Failure and Recovery
- 93 BCP/DRP Phase 3—Identify Preventive Controls
- 94 Importance of Managing Personnel Security
- 95 Managing Personnel Security—Hiring Practices
- 96 Managing Personnel Security—Employee Termination
- 97 Vendor, Contractors, and Consultant Controls
- 98 Best Work Practices
- 99 Business Scenario
- 100 Importance of Security Awareness Training
- 101 Security Awareness Training: Awareness, Training, and Education
- 102 Implementation of Security Awareness Training Program
- 103 Importance of Content Updates
- 104 Importance of Managing Security Function
- 105 Best Practices—Budget and Establish Security Metrics
- 106 Best Practices—Resources and Develop and Implement Strategies
- 107 Best Practices—Completeness and Effectiveness of the Program
- 108 Business Scenario
- 109 (ISC)² Code of Ethics
- 110 Quiz
- 111 Summary
- 112 Conclusion
- Domain 00 - Introduction
Additional information
What is this course about?
CISSP training from Simplilearn, aligned to (ISC) ² CBK 2015, ensures you are re-equipped on the best practices in the industry and enables you to ace the exam in the first attempt. The certification helps you develop the expertise in defining the architecture, design, build, and maintain a secure business environment for your organization using the globally approved Information Security standards.What are the Course Objectives?
By the end of this training you will:- Be able to define the architecture, design and manage the security of your organization.
- Acquire the relevant knowledge and skills required to clear the CISSP certification exam
- Earn the requisite 30 CPEs/PDUs required to take up the CISSP certification exam
- Develop a working knowledge of the 8 domains areas as prescribed by CISSP – Common Book of Knowledge 2015.
Who should do this course?
CISSP certification is a globally recognized professional requirement in the IT Security domain. This certification is most suited for:- Security Consultant/Manager
- IT Director/Manager
- Security Auditor/Architect
- Security Systems Engineer
- Chief Information Security Officer
- Network Architect
CISSP®
Price on request
We finance your learning in easy installments
You can pay the full amount
- Spread your payment over 3, 6 or 12 months
- All you need is your ID, mobile number and card
Add similar courses
and compare them to help you choose.
Training by subject