Course Outline
Domain 01 - Security and Risk Management
- Introduction
- Introduction to Security and Risk Management: Understanding, Adhering to, and Promoting Professional Ethics
- Knowledge Check
- Understanding and Applying Security Concepts
- Evaluating and Applying Security Governance Principles: Goals, Mission, and Objectives
- Control Frameworks, Due Care, and Due Diligence
- Knowledge Check
- Determining Compliance and Other Requirements
- Understanding Legal and Regulatory Issues Pertaining to Information Security in a Holistic Context
- Types of Intellectual Property (IP) Law
- OECD Principles, GDPR, and Data Protection Principles
- Understanding Requirements for Investigation Types
- Knowledge Check
- Developing, Documenting, and Implementing Security Policy, Standards, Procedures, and Guidelines
- Knowledge Check
- The Need for Business Continuity Planning (BCP): Phases and Business Impact Analysis
- Identifying Preventive Controls
- Knowledge Check
- Contributing to and Enforcing Personnel Security Policies and Procedures
- Introduction to Risk Management Concepts
- Risk Analysis
- Risk Analysis and Assessment, Countermeasure Selection
- Risk Handling and Security Control Assessment (SCA)
- Risk Monitoring and Continuous Improvement
- Knowledge Check
- Understanding and Applying Threat Modeling Concepts and Methodologies, Including Threat Modeling Steps
- DREAD Rating
- Knowledge Check
- Applying Supply Chain Risk Management (SCRM) Concepts: Third-Party Management and Risks
- Third-Party Risk Management Life Cycle
- Knowledge Check
- Establishing and Maintaining a Security Awareness, Education, and Training Program
- Program Effectiveness: Evaluation
- Knowledge Check
- Quick Recap
- Knowledge Check
Domain 02 - Asset Security
- Introduction
- Introduction to Asset Security
- Identifying and Classifying Information and Assets: Information Classification Objectives
- Knowledge Check
- Establishing Information and Asset Handling Requirements, Provisioning Resources Securely
- Managing the Data Life Cycle
- Data Life Cycle: Create, Store, and Use
- Data Life Cycle: Share, Archive, and Destroy: Data Remanence and Data Destruction
- Knowledge Check
- Ensuring Appropriate Asset Retention: Data and Data Security Controls, How to Select Controls
- Digital Rights Management (DRM) and Data Loss Prevention (DLP)
- Quick Recap
- Knowledge Check
Domain 03 - Security Architecture and Engineering
- Introduction
- Introduction to Security Engineering
- Researching, Implementing, and Managing Engineering Processes Using Trust but Verify and Zero Trust
- Privacy by Design
- Knowledge Check
- Understanding the Fundamental Concepts of Security Models
- State Machine Model, Multilevel Lattice Model, Non-Interference Model, and Information Flow Model
- Types of Security Models
- Composition Theories, Covert Channels, and Open and Closed Systems
- Knowledge Check
- Selecting Controls Based on System Security Requirements: Security Capabilities of Information Systems
- Knowledge Check
- Assessing and Mitigating Vulnerabilities of Security Architectures: SCADA
- Security Concerns of ICS, Cloud Computing, Categorization of Cloud
- Internet of Things (IoT)
- Fog and Edge Computing
- Knowledge Check
- Selecting and Determining Cryptographic Solutions: Cryptosystem Elements
- Encryption Methods
- Data Encryption Standards
- Output Feedback, Counter, and Triple DES, Advanced Encryption Standards, Asymmetric Cryptography
- Public Key Infrastructure (PKI)
- PKI Certificates and Processes, PKI Process Steps
- Hashing, MAC, and Digital Signatures: Key Management Principles
- Knowledge Check
- Methods of Cryptanalytic Attacks
- Knowledge Check
- Applying Security Principles to Site and Facility Design: Designing Site and Facility Security Controls
- Personnel Access Controls, Environmental Security Controls, Classes of Fires
- Other Security Controls: HVAC, Power Supply, and Training
- Knowledge Check
- Quick Recap
- Knowledge Check
Domain 04 - Communications and Network Security
- Introduction
- Introduction to Communications and Network Security: Assessing and Implementing Secure Design Principles (Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer, and Protocols)
- Knowledge Check
- IP Addressing
- IPv6 and Its Address Structures
- Knowledge Check
- Internet Security Protocol (IPsec): IPsec Security Protocols
- Secure Access Protocols
- Implementation of Multilayer Protocol, Fiber Channels, and Micro-Segmentation: SDN and Wireless Technologies
- Cellular Network and CDN
- Knowledge Check
- Understanding Network Access Control (NAC) and Endpoint Security
- Knowledge Check
- Implementing Secure Communication Channels: Application-Level Gateway, Circuit-Level Gateway, and Network Security Terms
- Remote Access Technologies, VPN Protocols
- VPN Protocols: Comparison
- Multimedia Collaboration, Network Function Virtualization, and Network Attacks
- Quick Recap
- Knowledge Check
Domain 05 - Identity and Access Management (IAM)
- Introduction
- Introduction to Identity and Access Management (IAM): Controlling Physical and Logical Access to Assets
- Managing Identification and Authentication of People, Devices, and Services
- Biometrics and Accuracy Measurement, Passwords and Their Types
- Tokens, Token Devices, and Authorization
- Federated Identity Management (FIM) and Credential Management System
- Single Sign-On (SSO) and Just-In-Time (JIT)
- Knowledge Check
- Federated Identity with a Third-Party Service: Implementing and Managing Authorization Mechanisms
- Attribute-Based Access Control (ABAC) and Risk-Based Access Control
- Knowledge Check
- Managing the Identity and Access Provisioning Life Cycle, Privilege Escalation
- Implementing Authentication Systems: Kerberos and Its Steps, RADIUS, TACACS, and TACACS Plus
- Quick Recap
- Knowledge Check
Domain 06 - Security Assessment and Testing
- Introduction
- Introduction to Security Assessment and Testing
- Designing and Validating Assessment, Test, and Audit Strategies: SOC Reports and Security Assessments
- Internal Audit and Assessment, External Audit and Assessment, Third-Party Audit and Assessment, Vulnerability Assessment
- Network Discovery Scan
- Network Vulnerability Scan and Web Vulnerability Scan, Penetration Testing
- Penetration Testing Process and Testing Types, Log Management and Review
- Security Testing in SDLC, Code Review and Testing, Testing Methods
- Interface Testing
- Knowledge Check
- Collecting Security Process Data, KPI Process
- Knowledge Check
- Analyzing Test Output and Generating Reports
- Quick Recap
- Knowledge Check
Domain 07 - Security Operations
- Introduction
- Introduction to Security Operations: Understanding and Complying with Investigations, Digital Forensics
- Understanding Digital Evidence
- Knowledge Check
- Conducting Logging and Monitoring Activities
- Knowledge Check
- Continuous Monitoring
- Digital Forensics Tools, Tactics, Procedures, Artifacts, and UEBA
- Knowledge Check
- Performing Configuration Management
- Applying Foundational Security Operation Concepts
- Identity and Access Management with Various Types of Accounts, Applying Resource Protection
- Controls for Protecting Assets, Conducting Incident Management
- Understanding the Incident Response Life Cycle
- Knowledge Check
- Operating and Maintaining Detective and Preventive Measures
- Understanding Anti-Malware Systems, AI, Machine Learning, and Deep Learning
- Implementing and Supporting Patch and Vulnerability Management
- Understanding and Participating in Change Management Processes, Implementing Recovery Strategies
- Types of Recoveries, Operational Recovery, Recovery Pattern Strategies
- Redundancy and Fault Tolerance
- Knowledge Check
- Implementing Disaster Recovery (DR) Processes
- Knowledge Check
- Testing Disaster Recovery Plans (DRP)
- Knowledge Check
- Participating in Business Continuity (BC) Planning and Exercises, Implementing and Managing Physical Security
- Importance of Lighting in Security Management, Access Control
- Knowledge Check
- Addressing Personnel Safety and Security Concerns
- Quick Recap
- Knowledge Check
Domain 08 - Software Development Security
- Introduction
- Introduction to Software Development Security
- Integrating Security in the Software Development Life Cycle
- Software Development Models
- Extreme Programming Model
- DevOps and DevSecOps
- CMM and SAMM
- Change Management and Integrated Product Team (IPT)
- Knowledge Check
- Security Controls in Software Development Ecosystems
- Other Security Controls in Software Development Ecosystems
- Software Configuration Management (SCM)
- Database and Data Warehousing Environments
- Knowledge Check
- Assessing the Effectiveness of Software Security
- Software Security and Assurance: Granularity of Controls and Separation of Environments
- Software Security and Assurance: TOC or TOU, Prevention of Social Engineering, Backup, Software Forensics, Cryptography
- Software Security and Assurance: Password Protection, Mobile Mode Controls, and Sandbox
- Software Security and Assurance: Strong Language Support, XML, and SAML
- Assessing the Effectiveness of Software Security, Free and Open Source Software
- Knowledge Check
- Defining and Applying Secure Coding Guidelines and Standards
- Web Application Environment
- Knowledge Check
- Quick Recap
- Knowledge Check
Requirements
To qualify for CISSP certification, candidates must demonstrate a minimum of five years of full-time professional experience in two or more of the eight domains outlined in the CISSP (ISC)² CBK 2018. Individuals who complete the CISSP training but do not yet meet the five-year experience requirement will be awarded the (ISC)² Associate title upon passing the exam.
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
Very good to understand how a hacker would potentially analyse sites for weakness and tools they might employ .