COURSE OBJECTIVES
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC) 2 CISSP CBK.
You will:
- Analyze components of the Security and Risk Management domain.
- Analyze components of the Asset Security domain.
- Analyze components of the Security Architecture and Engineering domain.
- Analyze components of the Communications and Network Security domain.
- Analyze components of the Identity and Access Management domain.
- Analyze components of the Security Assessment and Testing domain.
- Analyze components of the Security Operations domain.
- Analyze components of the Software Development Security domain.
COURSE OUTLINE
LESSON 1: SECURITY AND RISK MANAGEMENT
- Topic A: Security Governance Principles
- Topic B: Compliance
- Topic C: Professional Ethics
- Topic D: Security Documentation
- Topic E: Risk Management
- Topic F: Threat Modeling
- Topic G: Business Continuity Plan Fundamentals
- Topic H: Acquisition Strategy and Practice
- Topic I: Personnel Security Policies
- Topic J: Security Awareness and Training
LESSON 2: ASSET SECURITY
- Topic A: Asset Classification
- Topic B: Privacy Protection
- Topic C: Asset Retention
- Topic D: Data Security Controls
- Topic E: Secure Data Handling
LESSON 3: SECURITY ARCHITECTURE AND ENGINEERING
- Topic A: Security in the Engineering Lifecycle
- Topic B: System Component Security
- Topic C: Security Models
- Topic D: Controls and Countermeasures in Enterprise Security
- Topic E: Information System Security Capabilities
- Topic F: Design and Architecture Vulnerability Mitigation
- Topic G: Vulnerability Mitigation in Mobile, IoT, Embedded, and Web-Based Systems
- Topic H: Cryptography Concepts
- Topic I: Cryptography Techniques
- Topic J: Site and Facility Design for Physical Security
- Topic K: Physical Security Implementation in Sites and Facilities
LESSON 4: COMMUNICATION AND NETWORK SECURITY
- Topic A: Network Protocol Security
- Topic B: Network Components Security
- Topic C: Communication Channel Security
- Topic D: Network Attack Mitigation
LESSON 5: IDENTITY AND ACCESS MANAGEMENT
- Topic A: Physical and Logical Access Control
- Topic B: Identification, Authentication, and Authorization
- Topic C: Identity as a Service
- Topic D: Authorization Mechanisms
- Topic E: Access Control Attack Mitigation
LESSON 7: SECURITY OPERATIONS
- Topic A: Security Operations Concepts
- Topic B: Physical Security
- Topic C: Personnel Security
- Topic D: Logging and Monitoring
- Topic E: Preventative Measures
- Topic F: Resource Provisioning and Protection
- Topic G: Patch and Vulnerability Management
- Topic H: Change Management
- Topic I: Incident Response
- Topic J: Investigations
- Topic K: Disaster Recovery Planning
- Topic L: Disaster Recovery Strategies
- Topic M: Disaster Recovery Implementation
LESSON 8: SOFTWARE DEVELOPMENT SECURITY
- Topic A: Security Principles in the System Lifecycle
- Topic B: Security Principles in the Software Development Lifecycle
- Topic C: Database Security in Software Development
- Topic D: Security Controls in the Development Environment
- Topic E: Software Security Effectiveness Assessment
NOTE: This is only a CISSP Training, certification exam is not included.
Total Hours of Training: 40