Course OverviewÂ
CISSP® is the most renowned certification in the information security domain. Our CISSP® certification training program aims to equip participants with in-demand technical and administrative competence to design, architect, and manage an organization’s security posture by applying internationally accepted information security standards.Â
(ISC)² is a globally recognized, nonprofit organization dedicated to advancing the information security field. The CISSP® was the first credential in information security to meet the stringent requirements of ISO/IEC Standard 17024. It is looked upon as an objective measure of excellence and a highly reputed standard of achievement.Â
Target AudienceÂ
- Chief Information Security OfficerÂ
- Chief Information OfficerÂ
- Director of SecurityÂ
- IT Director/ManagerÂ
- Security Systems EngineerÂ
- Security AnalystÂ
- Security ManagerÂ
- Security AuditorÂ
- Security ArchitectÂ
- Security ConsultantÂ
- Network ArchitectÂ
Pre-RequisitesÂ
To apply for the CISSP® course certification, you need to:Â
- Have a minimum 5 years of cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)² CISSP® Common Body of Knowledge (CBK)Â
- One-year experience waiver can be earned with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved listÂ
Course Duration : 5 DaysÂ
Exam InformationÂ
- Duration : 4 HoursÂ
- Number of questions: 175Â
- Question format: Multiple ChoiceÂ
- Passing marks: 700 out of 1000Â
- Exam language: English, French, German, Brazilian, Portuguese, Spanish, Japanese, Simplified Chinese, Korean, Visually ImpairedÂ
- Delivery Method: CATÂ
CISSP Course ContentÂ
The CISSP® Training consists of the following eight domains:
The weight given to each of the domains have changed. As per new version, they are represented as follows.Â
DOMAINÂ |
% on 2018 CBK® |
% on 2021 CBK® |
Security and Risk Management |
15%Â |
15%Â |
Asset Security |
10%Â |
10%Â |
Security Architecture and Engineering |
13%Â |
13%Â |
Communications and Network Security |
14%Â |
13%Â |
Identity and Access Management (IAM)Â |
14%Â |
14%Â |
Security Assessment and Testing |
12%Â |
12%Â |
Security Operations |
13%Â |
13%Â |
Software Development Security |
10%Â |
11%Â |
Course ObjectivesÂ
The broad spectrum of topics included in the CISSP Common Body of Knowledge (CBK) ensure its relevancy across all disciplines in the field of information security. Successful candidates are competent in the following 8 domains:Â
- Security and Risk ManagementÂ
- Asset SecurityÂ
- Security Architecture and EngineeringÂ
- Communication and Network SecurityÂ
- Identity and Access Management (IAM)Â
- Security Assessment and TestingÂ
- Security OperationsÂ
- Software Development SecurityÂ
Course SyllabusÂ
Domain 1: Security and Risk ManagementÂ
- Understand and apply concepts of confidentiality, integrity and availabilityÂ
- Evaluate and apply security governance principlesÂ
- Determine compliance requirementsÂ
- Understand legal and regulatory issues that pertain to information security in a global contextÂ
- Understand, adhere to, and promote professional ethicsÂ
- Develop, document, and implement security policy, standards, procedures, and guidelinesÂ
- Identify, analyze, and prioritize Business Continuity (BC) requirementsÂ
- Contribute to and enforce personnel security policies and proceduresÂ
- Understand and apply risk management conceptsÂ
- Understand and apply threat modeling concepts and methodologiesÂ
- Apply risk-based management concepts to the supply chainÂ
- Establish and maintain a security awareness, education, and training programÂ
Domain 2: Asset SecurityÂ
- Identify and classify information and assetsÂ
- Determine and maintain information and asset ownershipÂ
- Protect privacyÂ
- Ensure appropriate asset retentionÂ
- Determine data security controlsÂ
- Establish information and asset handling requirementsÂ
Domain 3: Security Architecture and EngineeringÂ
- Implement and manage engineering processes using secure design principlesÂ
- Understand the fundamental concepts of security modelsÂ
- Select controls based upon systems security requirementsÂ
- Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)Â
- Assess and mitigate the vulnerabilities of security architectures, designs, and solution elementsÂ
- Assess and mitigate vulnerabilities in web-based systemsÂ
- Assess and mitigate vulnerabilities in mobile systemsÂ
- Assess and mitigate vulnerabilities in embedded devicesÂ
- Apply cryptographyÂ
- Apply security principles to site and facility designÂ
- Implement site and facility security controlsÂ
Domain 4:Communication and Network SecurityÂ
- Implement secure design principles in network architecturesÂ
- Secure network componentsÂ
- Implement secure communication channels according to designÂ
Domain 5: Identity and Access Management (IAM)Â
- Control physical and logical access to assetsÂ
- Manage identification and authentication of people, devices, and servicesÂ
- Integrate identity as a third-party serviceÂ
- Implement and manage authorization mechanismsÂ
- Manage the identity and access provisioning lifecycleÂ
Domain 6: Security Assessment and TestingÂ
- Design and validate assessment, test, and audit strategiesÂ
- Conduct security control testingÂ
- Collect security process data (e.g., technical and administrative)Â
- Analyze test output and generate reportÂ
- Conduct or facilitate security auditsÂ
Domain 7:Security OperationsÂ
- Understand and support investigationsÂ
- Understand requirements for investigation typesÂ
- Conduct logging and monitoring activitiesÂ
- Securely provisioning resourcesÂ
- Understand and apply foundational security operations conceptsÂ
- Apply resource protection techniquesÂ
- Conduct incident managementÂ
- Operate and maintain detective and preventative measuresÂ
- Implement and support patch and vulnerability managementÂ
- Understand and participate in change management processesÂ
- Implement recovery strategiesÂ
- Implement Disaster Recovery (DR) processesÂ
- Test Disaster Recovery Plans (DRP)Â
- Participate in Business Continuity (BC) planning and exercisesÂ
- Implement and manage physical securityÂ
- Address personnel safety and security concernsÂ
Domain 8: Software Development SecurityÂ
- Understand and integrate security in the Software Development Life Cycle (SDLC)Â
- Identify and apply security controls in development environmentsÂ
- Assess the effectiveness of software securityÂ
- Assess security impact of acquired softwareÂ
- Define and apply secure coding guidelines and standardsÂ
Â