Certified Information Systems Security Professional Certification Training

BY
GreyCampus

Lavel

Intermediate

Mode

Online

Fees

₹ 26640 29600

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study, Virtual Classroom
Mode of Delivery Video and Text Based

Course and certificate fees

Fees information
₹ 26,640  ₹29,600
certificate availability

Yes

certificate providing authority

GreyCampus

The syllabus

1. Course Introduction

• Introduction to the course

The CISSP Exam

  • Introduction
  • CISSP Certification Goals
  • Security Professional Certification Value
  • Exam Common Body of Knowledge
  • Becoming a CISSP

Cryptography

  • Introduction
  • Cryptography Concepts Part1
  • Cryptography Concepts Part2
  • History of Cryptography
  • Cryptosystem Features
  • Encryption Systems Part1
  • Encryption Systems Part2
  • Substitution Ciphers
  • Symmetric Algorithms Part1
  • Symmetric Algorithms Part2
  • Asymmetric Algorithms
  • Message Integrity
  • Digital Signatures
  • Public Key Infrastructure Part1
  • Public Key Infrastructure Part2
  • Trusted Platform Module
  • Encryption Communication Levels
  • E-Mail Security
  • Internet Security
  • Cryptography Attacks

Physical (Environmental) Security

  • Introduction
  • Threat Mitigation Techniques
  • Geographical-Man Made and Political Threats
  • Site and Facility Design
  • Perimeter Security
  • Building and Internal Security
  • Secure Data Centers and Fire Detection Systems
  • Types of Power Issues
  • HVAC Guidelines
  • Equipment Security and Personal Security

Security Architecture and Design

  • Introduction
  • Security Model Concepts
  • System Architecture
  • Computing Platforms
  • Virtual Computing and Security Services
  • System Components
  • Memory Concepts
  • Enforcing Process Security and Multitasking
  • System Security Architecture
  • Security Models and Modes Part1
  • Security Models and Modes Part2
  • System Evaluation and Ass...
  • Certification and Accreditation
  • Security Architecture Threats
  • Database Security and Distributed Systems Security

Access Control

  • Introduction
  • Access Control Concepts
  • Identification and Authentication
  • Password Types and Management
  • Ownership-Character-Physiological-Behavioral Factors
  • Biometric Considerations
  • Authorization Concepts Part1
  • Authorization Concepts Part2
  • User Accountability
  • Vulnerability Assessment
  • Penetration Testing and Threat Modeling
  • Access Control Categories-Types-Models and Administration
  • Provisioning Life Cycle and Access Control Monitoring
  • Access Control Threats

Software Development Security

  • Introduction
  • System Development Life Cycle
  • Software Testing and Validation
  • Software Development Security Best Practices
  • Software Development Methods
  • Programming Languages
  • Database Architecture and Models
  • Database Interface Languages
  • Data Warehouse-Mining and Threats
  • Database and Application Access Control
  • Monitoring for Problems
  • Software Threats and Security

Information Security Governance and Risk Management

  • Introduction
  • Principles and Terms
  • Security Frameworks & Methodologies Part1
  • Security Frameworks & Methodologies Part2
  • Risk Assessment
  • Asset Values-Vulnerabilities and Threats
  • Quantitative Risk Analysis
  • Safeguard Selection
  • Risk Management
  • Security Governance Components
  • Security Policies
  • Classification Life Cycle
  • Responsibilities and Roles
  • Personnel Security
  • Security Awareness Training

Telecommunications and Network Security

  • Introduction
  • OSI and TCIP Models Part1
  • OSI and TCIP Models Part2
  • IP Addressing
  • Transmission Methods
  • Types of Cabling
  • Network Topologies
  • Network Protocols and Services
  • Network Routing and Devices
  • Network Connection Types Part1
  • Network Connection Types Part2
  • Network Authentication
  • Wireless Technologies
  • WLAN Security Methods
  • Network Threats and Cabling Behaviors

Operation Security

  • Introduction
  • Operation Security Concepts
  • Protecting Tangible and Intangible Assets
  • Asset and Media Management
  • Storage Options
  • Network and Resource Management
  • Incident Response and Change Management
  • Patch Management-Audit and Review
  • Threats and Preventative Measures
  • Trusted Paths-Trusted Recovery and System Hardening
  • Monitoring and Reporting

Business Continuity and Disaster Recovery

  • Introduction
  • Business Continuity and Disaster Recovery Concepts Part1
  • Business Continuity and Disaster Recovery Concepts Part2
  • BIA Development
  • Business Continuity Planning
  • Preventive Controls
  • Recovery Strategies Part1
  • Recovery Strategies Part2
  • Data Backup Types
  • Data Recovery Terms
  • Critical Teams and Duties
  • BCP Testing

Legal, Regulations and Investigations and Compliance

  • Introduction
  • Digital Crime
  • Computer Crime Concepts
  • Major Legal Systems
  • Intellectual Property Law
  • Privacy Part1
  • Privacy Part2
  • Liability
  • Incident Response
  • Forensic and Digital Investigations Part1
  • Forensic and Digital Investigations Part2
  • Evidence Part1
  • Evidence Part2
  • Security Professional Ethics
  • Course Outro

Similar Courses

Information Security Design and Development

Coventry University, Coventry via Futurelearn

10 Weeks Online
Intermediate

Cyber Security Foundations Start Building Your Car...

EC-Council via Futurelearn

15 Weeks Online
Intermediate

Certificate in Cyber Security at Quality Licence S...

OHSC

200 Hours Online
Intermediate
£10 £99

Manage the Cyber Threat for Finance Professionals

ACCA via Edx

4 Weeks Online
Intermediate
Free

Asymmetric Cryptography and Key Management

CU Boulder via Coursera

3 Weeks Online
Intermediate

Check Point Jump Start Maestro Hyperscale Network ...

Check Point Software Technologies Limited via Coursera

3 Weeks Online
Intermediate

Cyber-Physical Systems Modeling and Simulation

UC Santa Cruz via Coursera

3 Weeks Online
Intermediate

Information Security Advanced topics

NYU via Edx

5 Weeks Online
Intermediate
Free

Network Security Advanced Topics

NYU via Edx

5 Weeks Online
Intermediate
Free

Jump Start Cloud Security

Check Point Software Technologies Limited via Edx

1 Week Online
Intermediate
Free

Courses of your Interest

Salesforce Administrator and App Builder

Salesforce Administrator and App Builder

SkillUp Online via Simplilearn

16 Hours Online
Intermediate
Free
Introduction to Medical Software

Introduction to Medical Software

Yale University, New Haven via Coursera

3 Weeks Online
Intermediate
Free

Google Cloud Architect Program

Google Cloud via SkillUp Online

11 Weeks Online
Intermediate
₹ 54,999

Google Cloud Architect Program

Google via SkillUp Online

11 Weeks Online
Intermediate
₹ 54,999
Ethics Laws and Implementing an AI Solution on Mic...

Ethics Laws and Implementing an AI Solution on Mic...

CloudSwyft Global Systems, Inc via Futurelearn

14 Weeks Online
Intermediate
Network Security and Defence

Network Security and Defence

Coventry University, Coventry via Futurelearn

10 Weeks Online
Intermediate
Applied Data Analysis

Applied Data Analysis

CloudSwyft Global Systems, Inc via Futurelearn

14 Weeks Online
Intermediate
₹ 900
Advanced and Applied Artificial Intelligence on Mi...

Advanced and Applied Artificial Intelligence on Mi...

CloudSwyft Global Systems, Inc via Futurelearn

15 Weeks Online
Intermediate

Artificial Intelligence with Python

Great Learning

Online
Intermediate
Free

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books