Get in Touch

Course Outline

Domain 01 - Security and Risk Management

  • Introduction
  • Introduction to Security and Risk Management: Understanding, Adhering to, and Promoting Professional Ethics
  • Knowledge Check
  • Understanding and Applying Security Concepts
  • Evaluating and Applying Security Governance Principles: Goals, Mission, and Objectives
  • Control Frameworks, Due Care, and Due Diligence
  • Knowledge Check
  • Determining Compliance and Other Requirements
  • Understanding Legal and Regulatory Issues Pertaining to Information Security in a Holistic Context
  • Types of Intellectual Property (IP) Law
  • OECD Principles, GDPR, and Data Protection Principles
  • Understanding Requirements for Investigation Types
  • Knowledge Check
  • Developing, Documenting, and Implementing Security Policy, Standards, Procedures, and Guidelines
  • Knowledge Check
  • The Need for Business Continuity Planning (BCP): Phases and Business Impact Analysis
  • Identifying Preventive Controls
  • Knowledge Check
  • Contributing to and Enforcing Personnel Security Policies and Procedures
  • Introduction to Risk Management Concepts
  • Risk Analysis
  • Risk Analysis and Assessment, Countermeasure Selection
  • Risk Handling and Security Control Assessment (SCA)
  • Risk Monitoring and Continuous Improvement
  • Knowledge Check
  • Understanding and Applying Threat Modeling Concepts and Methodologies, Including Threat Modeling Steps
  • DREAD Rating
  • Knowledge Check
  • Applying Supply Chain Risk Management (SCRM) Concepts: Third-Party Management and Risks
  • Third-Party Risk Management Life Cycle
  • Knowledge Check
  • Establishing and Maintaining a Security Awareness, Education, and Training Program
  • Program Effectiveness: Evaluation
  • Knowledge Check
  • Quick Recap
  • Knowledge Check

Domain 02 - Asset Security

  • Introduction
  • Introduction to Asset Security
  • Identifying and Classifying Information and Assets: Information Classification Objectives
  • Knowledge Check
  • Establishing Information and Asset Handling Requirements, Provisioning Resources Securely
  • Managing the Data Life Cycle
  • Data Life Cycle: Create, Store, and Use
  • Data Life Cycle: Share, Archive, and Destroy: Data Remanence and Data Destruction
  • Knowledge Check
  • Ensuring Appropriate Asset Retention: Data and Data Security Controls, How to Select Controls
  • Digital Rights Management (DRM) and Data Loss Prevention (DLP)
  • Quick Recap
  • Knowledge Check

Domain 03 - Security Architecture and Engineering

  • Introduction
  • Introduction to Security Engineering
  • Researching, Implementing, and Managing Engineering Processes Using Trust but Verify and Zero Trust
  • Privacy by Design
  • Knowledge Check
  • Understanding the Fundamental Concepts of Security Models
  • State Machine Model, Multilevel Lattice Model, Non-Interference Model, and Information Flow Model
  • Types of Security Models
  • Composition Theories, Covert Channels, and Open and Closed Systems
  • Knowledge Check
  • Selecting Controls Based on System Security Requirements: Security Capabilities of Information Systems
  • Knowledge Check
  • Assessing and Mitigating Vulnerabilities of Security Architectures: SCADA
  • Security Concerns of ICS, Cloud Computing, Categorization of Cloud
  • Internet of Things (IoT)
  • Fog and Edge Computing
  • Knowledge Check
  • Selecting and Determining Cryptographic Solutions: Cryptosystem Elements
  • Encryption Methods
  • Data Encryption Standards
  • Output Feedback, Counter, and Triple DES, Advanced Encryption Standards, Asymmetric Cryptography
  • Public Key Infrastructure (PKI)
  • PKI Certificates and Processes, PKI Process Steps
  • Hashing, MAC, and Digital Signatures: Key Management Principles
  • Knowledge Check
  • Methods of Cryptanalytic Attacks
  • Knowledge Check
  • Applying Security Principles to Site and Facility Design: Designing Site and Facility Security Controls
  • Personnel Access Controls, Environmental Security Controls, Classes of Fires
  • Other Security Controls: HVAC, Power Supply, and Training
  • Knowledge Check
  • Quick Recap
  • Knowledge Check

Domain 04 - Communications and Network Security

  • Introduction
  • Introduction to Communications and Network Security: Assessing and Implementing Secure Design Principles (Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer, and Protocols)
  • Knowledge Check
  • IP Addressing
  • IPv6 and Its Address Structures
  • Knowledge Check
  • Internet Security Protocol (IPsec): IPsec Security Protocols
  • Secure Access Protocols
  • Implementation of Multilayer Protocol, Fiber Channels, and Micro-Segmentation: SDN and Wireless Technologies
  • Cellular Network and CDN
  • Knowledge Check
  • Understanding Network Access Control (NAC) and Endpoint Security
  • Knowledge Check
  • Implementing Secure Communication Channels: Application-Level Gateway, Circuit-Level Gateway, and Network Security Terms
  • Remote Access Technologies, VPN Protocols
  • VPN Protocols: Comparison
  • Multimedia Collaboration, Network Function Virtualization, and Network Attacks
  • Quick Recap
  • Knowledge Check

Domain 05 - Identity and Access Management (IAM)

  • Introduction
  • Introduction to Identity and Access Management (IAM): Controlling Physical and Logical Access to Assets
  • Managing Identification and Authentication of People, Devices, and Services
  • Biometrics and Accuracy Measurement, Passwords and Their Types
  • Tokens, Token Devices, and Authorization
  • Federated Identity Management (FIM) and Credential Management System
  • Single Sign-On (SSO) and Just-In-Time (JIT)
  • Knowledge Check
  • Federated Identity with a Third-Party Service: Implementing and Managing Authorization Mechanisms
  • Attribute-Based Access Control (ABAC) and Risk-Based Access Control
  • Knowledge Check
  • Managing the Identity and Access Provisioning Life Cycle, Privilege Escalation
  • Implementing Authentication Systems: Kerberos and Its Steps, RADIUS, TACACS, and TACACS Plus
  • Quick Recap
  • Knowledge Check

Domain 06 - Security Assessment and Testing

  • Introduction
  • Introduction to Security Assessment and Testing
  • Designing and Validating Assessment, Test, and Audit Strategies: SOC Reports and Security Assessments
  • Internal Audit and Assessment, External Audit and Assessment, Third-Party Audit and Assessment, Vulnerability Assessment
  • Network Discovery Scan
  • Network Vulnerability Scan and Web Vulnerability Scan, Penetration Testing
  • Penetration Testing Process and Testing Types, Log Management and Review
  • Security Testing in SDLC, Code Review and Testing, Testing Methods
  • Interface Testing
  • Knowledge Check
  • Collecting Security Process Data, KPI Process
  • Knowledge Check
  • Analyzing Test Output and Generating Reports
  • Quick Recap
  • Knowledge Check

Domain 07 - Security Operations

  • Introduction
  • Introduction to Security Operations: Understanding and Complying with Investigations, Digital Forensics
  • Understanding Digital Evidence
  • Knowledge Check
  • Conducting Logging and Monitoring Activities
  • Knowledge Check
  • Continuous Monitoring
  • Digital Forensics Tools, Tactics, Procedures, Artifacts, and UEBA
  • Knowledge Check
  • Performing Configuration Management
  • Applying Foundational Security Operation Concepts
  • Identity and Access Management with Various Types of Accounts, Applying Resource Protection
  • Controls for Protecting Assets, Conducting Incident Management
  • Understanding the Incident Response Life Cycle
  • Knowledge Check
  • Operating and Maintaining Detective and Preventive Measures
  • Understanding Anti-Malware Systems, AI, Machine Learning, and Deep Learning
  • Implementing and Supporting Patch and Vulnerability Management
  • Understanding and Participating in Change Management Processes, Implementing Recovery Strategies
  • Types of Recoveries, Operational Recovery, Recovery Pattern Strategies
  • Redundancy and Fault Tolerance
  • Knowledge Check
  • Implementing Disaster Recovery (DR) Processes
  • Knowledge Check
  • Testing Disaster Recovery Plans (DRP)
  • Knowledge Check
  • Participating in Business Continuity (BC) Planning and Exercises, Implementing and Managing Physical Security
  • Importance of Lighting in Security Management, Access Control
  • Knowledge Check
  • Addressing Personnel Safety and Security Concerns
  • Quick Recap
  • Knowledge Check

Domain 08 - Software Development Security

  • Introduction
  • Introduction to Software Development Security
  • Integrating Security in the Software Development Life Cycle
  • Software Development Models
  • Extreme Programming Model
  • DevOps and DevSecOps
  • CMM and SAMM
  • Change Management and Integrated Product Team (IPT)
  • Knowledge Check
  • Security Controls in Software Development Ecosystems
  • Other Security Controls in Software Development Ecosystems
  • Software Configuration Management (SCM)
  • Database and Data Warehousing Environments
  • Knowledge Check
  • Assessing the Effectiveness of Software Security
  • Software Security and Assurance: Granularity of Controls and Separation of Environments
  • Software Security and Assurance: TOC or TOU, Prevention of Social Engineering, Backup, Software Forensics, Cryptography
  • Software Security and Assurance: Password Protection, Mobile Mode Controls, and Sandbox
  • Software Security and Assurance: Strong Language Support, XML, and SAML
  • Assessing the Effectiveness of Software Security, Free and Open Source Software
  • Knowledge Check
  • Defining and Applying Secure Coding Guidelines and Standards
  • Web Application Environment
  • Knowledge Check
  • Quick Recap
  • Knowledge Check

Requirements

To qualify for CISSP certification, candidates must demonstrate a minimum of five years of full-time professional experience in two or more of the eight domains outlined in the CISSP (ISC)² CBK 2018. Individuals who complete the CISSP training but do not yet meet the five-year experience requirement will be awarded the (ISC)² Associate title upon passing the exam.

 35 Hours

Testimonials (3)

Upcoming Courses

Related Categories