CISSP®

4.8
6 opinions
  • The training was Simply Excellent!
    |
  • This course was thorough and engaging; the concepts were relevant and applicable to my work. The instructor was knowledgeable and kept us engaged.
    |
  • Good knowledge shared and in-depth exercises on the subject included.
    |

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

Simplilearn is the World’s Largest Certification Training Provider, with over 400,000+ professionals trained globally
Trusted by the Fortune 500 companies as their learning provider for career growth and training
2000+ certified and experienced trainers conduct trainings for various courses across the globe
All our Courses are designed and developed under a tried and tested Unique Learning Framework that is proven to deliver 98.6% pass rate in first attempt.

Questions & Answers

Ask a question and other users will answer you

Who do you want to respond to your question/enquiry?

We will only publish your name and question

Opinions

4.8
excellent
  • The training was Simply Excellent!
    |
  • This course was thorough and engaging; the concepts were relevant and applicable to my work. The instructor was knowledgeable and kept us engaged.
    |
  • Good knowledge shared and in-depth exercises on the subject included.
    |
100%
4.5
excellent

Course rating

Recommended

Centre rating

Marzook Hussain

5.0
09/05/2014
What I would highlight: The training was Simply Excellent!
What could be improved: Nothing.
Would you recommend this course?: Yes

Teresa Brumit

5.0
22/04/2014
What I would highlight: This course was thorough and engaging; the concepts were relevant and applicable to my work. The instructor was knowledgeable and kept us engaged.
What could be improved: Nothing.
Would you recommend this course?: Yes

Amit Srivastava

4.5
11/03/2014
What I would highlight: Good knowledge shared and in-depth exercises on the subject included.
What could be improved: Nothing
Would you recommend this course?: Yes

Aditya Rathor

4.5
07/03/2014
What I would highlight: It was a good training session. Trainer was interactive and approachable.
What could be improved: Nothing
Would you recommend this course?: Yes

Husam Mahmoud

4.5
04/03/2014
What I would highlight: Course was excellent, we learned a lot of new things and the trainer was very professional.
What could be improved: Nothing
Would you recommend this course?: Yes

Deepak Sudeley

5.0
27/02/2014
What I would highlight: Excellent trainer . Technically managed workshop was well. However the way he has conducted the entire workshop it was very interesting and interactive. Wonderful experience.
What could be improved: Nothing
Would you recommend this course?: Yes
Reviews gathered by Emagister & iAgora

This centre's achievements

2017
2016

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 5 years

Course programme

Course Preview
  • CISSP® - Certified Information Systems Security Professional
    • Domain 00 - Introduction
      • 1 CISSP®—Introduction
      • 10 CISSP® Certification Requirements (contd.)
      • 11 CISSP® Certification Requirements (contd.)
      • 2 Objectives
      • 3 CISSP®
      • 4 (ISC)²®
      • 5 CISSP® Domains
      • 6 Benefits of CISSP® for Professionals
      • 7 Benefits of CISSP® for Employers
      • 8 CISSP® Certification Requirements
      • 9 CISSP® Certification Requirements (contd.)
      • 12 CISSP® Examination
      • 13 CISSP® Examination (contd.)
      • 14 Conclusion
    • Domain 01 - Security and Risk Management
      • 1 Domain 01—Security and Risk Management
      • 2 Objectives
      • 3 Importance of Information Security and Risk Management
      • 4 Role and Importance of CIA in ISM
      • 5 Confidentiality
      • 6 Integrity
      • 7 Availability
      • 8 Information Security
      • 9 Information Security Management
      • 10 Information Security Governance
      • 11 IT Security and Organizational Goals, Mission, and Objectives
      • 12 Goals, Mission, and Objectives
      • 13 Aligning Security with Goals, Mission, and Objectives
      • 14 Business Scenario
      • 15 Organizational Processes
      • 16 Auditing
      • 17 Control Framework
      • 18 Due Care
      • 19 Due Diligence
      • 20 Security Controls
      • 21 Service Level Agreements
      • 22 Managing Third - Party Governance
      • 23 Offshoring—Privacy Requirements and Compliance
      • 24 Business Scenario
      • 25 Layers of Responsibility
      • 26 Security Policies
      • 27 Types of Security Policies
      • 28 Security Policy Implementation
      • 29 Policy Chart
      • 30 Standards, Guidelines, Procedures, and Baselines
      • 31 Business Scenario
      • 32 Compliance—Need for Compliance
      • 33 Regulatory Compliance
      • 34 Compliance
      • 35 Compliance (contd.)
      • 36 Compliance (contd.)
      • 37 Standards/Manuals/Guidelines for Compliance
      • 38 Computer Crimes
      • 39 Introduction to Computer Crimes
      • 40 Categories of Computer Crimes
      • 41 Business Scenario
      • 42 Major Legal Systems
      • 43 Common Law and Civil Law
      • 44 Customary Law and Religious Law
      • 45 Mixed Law
      • 46 Business Scenario
      • 47 Introduction to Intellectual Property (IP) Law
      • 48 Types of Intellectual Property (IP) Law
      • 49 Types of Intellectual Property (IP) Law (contd.)
      • 50 Types of Intellectual Property (IP) Law (contd.)
      • 51 Business Scenario
      • 52 Import or Export Controls and Trans - Border Data Flow
      • 53 Introduction to Privacy
      • 54 U.S. Privacy Laws
      • 55 U.S. Privacy Laws (contd.)
      • 56 U.S. Guidelines for Managing Privacy
      • 57 EU Council Directive (Law) on Data Protection
      • 58 The U.S.-European Union Safe Harbor
      • 59 Security Definitions
      • 60 Information Risk Management
      • 61 Business Scenario
      • 62 Introduction to Risk Analysis
      • 63 Goals of Risk Analysis
      • 64 Risk Analysis Team
      • 65 Steps for Risk Analysis
      • 66 Information and Assets Valuation
      • 67 Risk Analysis Types
      • 68 Quantitative Risk Analysis—Steps
      • 69 Quantitative Risk Analysis—Problem
      • 70 Qualitative Risk Analysis
      • 71 Delphi Technique
      • 72 Quantitative vs.Qualitative
      • 73 Hybrid Analysis
      • 74 Countermeasure Selection—Problem
      • 75 Countermeasure Selection—Other Factors
      • 76 Handling Risk
      • 77 Business Scenario
      • 78 Threat Modeling
      • 79 Need for Business Continuity Planning
      • 80 Basic Concepts—Disruptive Events
      • 81 Basic Concepts—Business Continuity Planning
      • 82 Importance of Business Continuity Planning
      • 83 Business Continuity Planning Phases
      • 84 BCP/DRP Phase 1—Project Initiation and Scoping
      • 85 BCP/DRP Phase 2—Business Impact Analysis (BIA)
      • 86 BIA—Goals
      • 87 BIA—Steps
      • 88 BIA Steps—Business Unit Level
      • 89 Maximum Tolerable Downtime (MTD)
      • 90 Failure and Recovery Metrics
      • 91 Failure and Recovery Metrics (contd.)
      • 92 Stages of Failure and Recovery
      • 93 BCP/DRP Phase 3—Identify Preventive Controls
      • 94 Importance of Managing Personnel Security
      • 95 Managing Personnel Security—Hiring Practices
      • 96 Managing Personnel Security—Employee Termination
      • 97 Vendor, Contractors, and Consultant Controls
      • 98 Best Work Practices
      • 99 Business Scenario
      • 100 Importance of Security Awareness Training
      • 101 Security Awareness Training: Awareness, Training, and Education
      • 102 Implementation of Security Awareness Training Program
      • 103 Importance of Content Updates
      • 104 Importance of Managing Security Function
      • 105 Best Practices—Budget and Establish Security Metrics
      • 106 Best Practices—Resources and Develop and Implement Strategies
      • 107 Best Practices—Completeness and Effectiveness of the Program
      • 108 Business Scenario
      • 109 (ISC)² Code of Ethics
      • 110 Quiz
      • 111 Summary
      • 112 Conclusion

Additional information

  • What is this course about?

    CISSP training from Simplilearn, aligned to (ISC) ² CBK 2015, ensures you are re-equipped on the best practices in the industry and enables you to ace the exam in the first attempt. The certification helps you develop the expertise in defining the architecture, design, build, and maintain a secure business environment for your organization using the globally approved Information Security standards.

  • What are the Course Objectives?

    By the end of this training you will:
    • Be able to define the architecture, design and manage the security of your organization.
    • Acquire the relevant knowledge and skills required to clear the CISSP certification exam
    • Earn the requisite 30 CPEs/PDUs required to take up the CISSP certification exam
    • Develop a working knowledge of the 8 domains areas as prescribed by CISSP – Common Book of Knowledge 2015.

  • Who should do this course?

    CISSP certification is a globally recognized professional requirement in the IT Security domain. This certification is most suited for:
    • Security Consultant/Manager
    • IT Director/Manager
    • Security Auditor/Architect
    • Security Systems Engineer
    • Chief Information Security Officer
    • Network Architect

CISSP®

Price on request