About CISSP
The CISSP (Certified Information Systems Security Professional) certification is a globally recognized credential in the field of information security. It validates an individual's expertise in designing, implementing, and managing a best-in-class cybersecurity program.
Key Points:
-
Offered by: (ISC)²
-
Focus Areas: Security and risk management, asset security, security architecture and engineering, communication and network security,
-
Eligibility: Requires at least five years of cumulative paid work experience in two or more of the eight domains.
- Benefits: Enhances career opportunities, demonstrates commitment to the field, and increases earning potential.
Curriculum
- 1.12 Security Eduation- (9:30)
- 1.12.1 Awareness resources (9:09)
- 1.12.2 Some Important Policies (7:20)
- 2.1 Identify information assets (14:19)
- 2.1.1 Assets Classification and Labeling (12:44)
- 2.1.2 Military-Commercial Classification (12:42)
- 2.1.3 Sample of Classification Tool 1 (2:49)
- 2.1.4 Sample of Classification Tool 2 (2:30)
- 2.1.5 Data Lost Prevention - DLP (3:11)
- 2.1.6 Sample of DLP Tool (3:18)
- 2.2 Information and asset ownership (3:33)
- 2.3 Protect privacy (7:49)
- 2.4 Ensure appropriate asset retention (12:07)
- 2.5 Determine data security controls (12:51)
- 2.5.1 Data Encryptian (1:46)
- 3.1 Introduction to Security Architecture and Engineering (3:50)
- 3.10 Virtualization (9:50)
- 3.11 Fault Tolerance (6:31)
- 3.12 Server Fault Tolerance Techniques (2:05)
- 3.13 New Technology (6:27)
- 3.14 Cryptography (16:30)
- 3.15 Alternative Ciphers (7:55)
- 3.16 Symmetric Encryption (12:43)
- 3.17 Asymmetric Encryption (13:51)
- 3.18 Hash (6:04)
- 3.19 Physical Security (7:38)
- 3.2 Security Engineering Lifecycle (4:13)
- 3.20 Physical Access barriers (9:41)
- 3.21 Power Issue (3:10)
- 3.22 Fire (5:28)
- 3.3 NISP SP 14-27 (11:36)
- 3.4 Trusted Computing Base _ TCB (9:21)
- 3.4.1 TCB Vulnerability (9:46)
- 3.5 Security Models (17:07)
- 3.6TCSEC (5:42)
- 3.7 ITSEC (6:06)
- 3.8 Security Architecture Questions (3:17)
- 3.9 Enterprise Security Architecture (5:05)
- 4.1 The OSI Model (17:26)
- 4.10 RAID (6:47)
- 4.11 Backup (5:49)
- 4.12 Exam Question - (1:13)
- 4.3 Network Architecture Components (17:08)
- 4.3 TCP-IP Model (2:48)
- 4.4 Firewall (10:42)
- 4.5 Network Types and Topolgies (8:36)
- 4.6 Remote Access Technology (18:33)
- 4.7 Wireless Network (7:12)
- 4.8 Network Attacks (8:53)
- 4.9 Remote Access Security Mechanisms (2:06)
- 1. Introduction (0:47)
- 1.1 CIA (11:28)
- 2. CISSP Training. (4:26)
- 3. CISSP Certification (5:56)
- 4. CISSP Exam (4:44)
- 5. Course Outline (4:14)
- 6. Course Flow. (4:17)
- 7. Course Materials (4:43)
- 8. Before You Start (2:50)
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.
Securium Academy Pvt Ltd
We are one of the world’s leading certification training providers.
We provide online training in disciplines such as Cyber Security, Cloud Computing, Project Management, Digital Marketing, and Data Science among others, where technologies and best practices are changing rapidly and demand for qualified candidates significantly exceeds supply.
Based in UAE, Delhi NCR, India, we have helped over one million professionals and companies across 150+ countries get trained, acquire certifications, and upskill their employees.
Our training courses are designed and updated by 150+ renowned industry experts. Our blended learning approach combines online classes, instructor-led live virtual classrooms, project work, and 24/7 teaching assistance. Our vibrant community of experts and certified professionals is a powerful resource pool of tips, tricks, and insightful advice. More than 40 global training organizations have recognized us as an official provider of certification training.