The CISSP is ideal for information security professionals seeking to prove their understanding of cybersecurity strategy and hands-on implementation. It shows you have the advanced knowledge and technical skills to design, develop and manage an organization’s overall security posture.


No Prerequisites


Duration 1 Month
ELIGIBILITY: No Prerequisites
Enquire Now

    • Confidentiality, integrity, and availability concepts
    • Security governance principles
    • Compliance
    • Legal and regulatory issues
    • Professional ethic
    • Security policies, standards, procedures and guidelines

    • Engineering processes using secure design principles
    • Security models fundamental concepts
    • Security evaluation models
    • Security capabilities of information systems
    • Security architectures, designs, and solution elements vulnerabilities
    • Web-based systems vulnerabilities
    • Mobile systems vulnerabilities
    • Embedded devices and cyber-physical systems vulnerabilities
    • Cryptography
    • Site and facility design secure principles
    • Physical security

    • Information and asset classification
    • Ownership (e.g. data owners, system owners)
    • Protect privacy
    • Appropriate retention
    • Data security controls
    • Handling requirements (e.g. markings, labels, storage)

    • Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
    • Secure network components
    • Secure communication channels
    • Network attacks
  • Cloud Concepts, Architecture and Design

    • Understand Cloud Computing Concepts
    • Describe Cloud Reference Architecture
    • Understand Security Concepts Relevant to Cloud Computing
    • Understand Design Principles of Secure Cloud Computing
    • Evaluate Cloud Service Providers
  • Cloud Data Security

    • Comprehend Cloud Infrastructure Components
    • Design a Secure Data Center
    • Analyze Risks Associated with Cloud Infrastructure
    • Design and Plan Security Controls
    • Plan Disaster Recovery (DR) and Business Continuity (BC
  • Cloud Application Security

    • Advocate Training and Awareness for Application Security
    • Describe the Secure Software Development Life Cycle (SDLC) Process
    • Apply the Secure Software Development Life Cycle (SDLC)
    • Apply Cloud Software Assurance and Validation
    • Use Verified Secure Software
    • Comprehend the Specifics of Cloud Application Architecture
    • Design Appropriate Identity and Access Management (IAM) Solutions
  • Cloud Security Operations

    • Implement and Build Physical and Logical Infrastructure for Cloud Environment
    • Operate Physical and Logical Infrastructure for Cloud Environment
    • Manage Physical and Logical Infrastructure for Cloud Environment
    • Implement Operational Controls and Standards (e.g., Information Technology Infrastructure Library (ITIL), International Organization for Standardization/International Electrotechnical
    • Commission (ISO/IEC) 20000-1)
    • Support Digital Forensics
    • Manage Communication with Relevant Parties
    • Manage Security Operations
  • Legal, Risk and Compliance

    • Articulate Legal Requirements and Unique Risks within the Cloud Environment
    • Understand Privacy Issues
    • Understand Audit Process, Methodologies, and Required Adaptations for a Cloud Environment
    • Understand Implications of Cloud to Enterprise Risk Management
    • Understand Outsourcing and Cloud Contract Design

Found your courseGet Started Now