WHY IEVISION?

IEVISION is best training institute and delivering ISO, IT, AI, Cyber Security, Agile Project Management, Cloud Computing, GRC Training and Certifications across the world. IEVISON is partnered with EXCELCERT, EXIN, APMG, TUV-SUD, ISTQB & PECB Certification partners.

CONTACT INFO
IEVISION IT services Pvt Ltd,
7, Bilvakunja Apartment,
Bhandarkar Road, Pune - 411004
+9196046441000, +919604664000 info@ievision.org



CISSP Certificate Training Program in Pune

  |  
  • Highest Passing rate
  • Globally recognized trainer & consultants
  • Access to latest question bank
  • Exclusive courseware
  • 6 Month cccess to recorded session
  • Exclusive Session on how to pass CISSP in 1st attempt
  • 45 PDU/CPE Certificate
  • Career Mentoring
CLASSROOM TRAINING VIEW DATES

LIVE VIRTUAL VIEW DATES

GROUP/CORPORATE BOOK SESSION

UPCOMING BATCHE(S) IN "PUNE" (change city)

Date Time Course Type Price Option
04th Apr 26 - 12th Apr 26 10.00 AM - 06.00 PM VIRTUAL CLASSROOM INR

The CISSP course is designed to prepare IT professionals to manage and design the information security framework of an organisation. The course module consists of 8 domains, covering the necessary topics.


Domain 1: Security and Risk Management


Domain 1: Security and Risk Management

Domain 1 of the CISSP certificate course teaches you the importance of security and risk management in an organisation by incorporating legal and regulatory aspects.

1.1 - Understand, adhere to, and promote professional ethics

  • ISC2 Code of Professional Ethics

  • Organizational code of ethics

1.2 - Understand and apply security concepts

  • Confidentiality, integrity, and availability, authenticity, and nonrepudiation (5 Pillars of Information Security)

1.3 - Evaluate and apply security governance principles

  • Alignment of the security function to business strategy, goals, mission, and objectives

  • Organizational processes (e.g., acquisitions, divestitures, governance committees)

  • Organizational roles and responsibilities

  • Security control frameworks (e.g., International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST), Control Objectives for Information and Related Technology (COBIT), Sherwood Applied Business Security Architecture (SABSA), Payment Card Industry (PCI), Federal Risk and Authorization Management Program (FedRAMP))

  • Due care/due diligence

1.4 - Understand legal, regulatory, and compliance issues that pertain to information security in a holistic context

  • Cybercrimes and data breaches

  • Licensing and Intellectual Property requirements

  • Import/export controls

  • Transborder data flow

  • Issues related to privacy (e.g., General Data Protection Regulation (GDPR), California Consumer Privacy Act, Personal Information Protection Law, Protection of Personal Information Act)

  • Contractual, legal, industry standards, and regulatory requirements

1.5 - Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)

1.6 - Develop, document, and implement security policy, standards, procedures, and guidelines

1.7 - Identify, analyze, assess, prioritize, and implement Business Continuity (BC) requirements

  • Business impact analysis (BIA)

  • External dependencies

1.8 - Contribute to and enforce personnel security policies and procedures

  • Candidate screening and hiring

  • Employment agreements and policy-driven requirements

  • Onboarding, transfers, and termination processes

  • Vendor, consultant, and contractor agreements and controls

1.9 - Understand and apply risk management concepts

  • Threat and vulnerability identification

  • Risk analysis, assessment, and scope

  • Risk response and treatment (e.g., cybersecurity insurance)

  • Applicable types of controls (e.g., preventive, detection, corrective)

  • Control assessments (e.g., security and privacy)

  • Continuous monitoring and measurement

  • Reporting (e.g., internal, external)

  • Continuous improvement (e.g., risk maturity modeling)

  • Risk frameworks (e.g., International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST), Control Objectives for Information and Related Technology (COBIT), Sherwood Applied Business Security Architecture (SABSA), Payment Card Industry (PCI)

1.10 - Understand and apply threat modeling concepts and methodologies

1.11 - Apply Supply Chain Risk Management (SCRM) concepts

  • Risks associated with the acquisition of products and services from suppliers and providers (e.g., product tampering, counterfeits, implants)

  • Risk mitigations (e.g., third-party assessment and monitoring, minimum security requirements, service level requirements, silicon root of trust, physically unclonable function, software bill of materials)

1.12 - Establish and maintain a security awareness, education, and training program

  • Methods and techniques to increase awareness and training (e.g., social engineering, phishing, security champions, gamification)

  • Periodic content reviews to include emerging technologies and trends (e.g., cryptocurrency, artificial intelligence (AI), blockchain)

  • Program effectiveness evaluation

Domain 2: Asset Security

In domain 2 of the CISSP course, you learn how to identify information and assets in an enterprise. You also learn to establish proper asset handling requirements.

2.1 - Identify and classify information and assets

  • Data classification

  • Asset Classification

2.2 - Establish information and asset handling requirements

2.3 - Provision information and assets securely

  • Information and asset ownership

  • Asset inventory (e.g., tangible, intangible)

  • Asset management

2.4 - Manage data lifecycle

  • Data roles (i.e., owners, controllers, custodians, processors, users/subjects)

  • Data collection

  • Data location

  • Data maintenance

  • Data retention

  • Data remanence

  • Data destruction

2.5 - Ensure appropriate asset retention (e.g., End of Life (EOL), End of Support)

2.6 - Determine data security controls and compliance requirements

  • Data states (e.g., in use, in transit, at rest)

  • Scoping and tailoring

  • Standards selection

  • Data protection methods (e.g., Digital Rights Management (DRM), Data Loss Prevention (DLP), Cloud Access Security Broker (CASB)

Domain 3: Security Architecture and Engineering

Domain 3 of the CISSP course will cover the usage of secure design principles to manage and implement engineering processes, fundamental concepts of security models, and much more.

3.1 - Research, implement, and manage engineering processes using secure design principles

  • Threat modeling

  • Least privilege

  • Defense in depth

  • Secure defaults

  • Fail securely

  • Segregation of Duties (SoD)

  • Keep it simple and small

  • Zero trust or trust but verify

  • Privacy by design

  • Shared responsibility

  • Secure Access Service Edge

3.2 - Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula)

3.3 - Select controls based upon system security requirements

3.4 - Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)

3.5 - Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements

  • Client-based systems

  • Server-based systems

  • Database systems

  • Cryptographic systems

  • Industrial Control Systems (ICS)

  • Cloud-based systems (e.g., Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS))

  • Distributed systems

  • Internet of Things (IoT)

  • Microservices (e.g., application programming interface (API))

  • Containerization

  • Serverless

  • Embedded systems

  • High-Performance Computing Systems

  • Edge computing systems

  • Virtualized systems

Certified Information Systems Security Professional (CISSP) is an independent information security certification and examination conducted by the International Information System Security Certification Consortium, Inc, also known as ISC2.


The CISSP certificate involves a rigorous examination process that covers eight security domains, preparing professionals to protect information systems, corporations, and national infrastructures. With CISSP course training, you come to understand that information security is an enterprise-wide issue. It falls in the hands of the human workers to coordinate and maintain a secure information system.


The CISSP certificate is widely recognised as a vendor-neutral certification course for IT security professionals in global level. The certificate is considered to be an ideal credential for those with proven deep technical and managerial competence, skills, and experience in information technology and security domains. The certification ensures that you are capable of protecting organizations from increasingly sophisticated attacks.


Learning Objectives
Understand and apply the concepts of IT risk assessment, risk analysis, data classification, and security awareness, and implement risk management infrastructure and the principles used to support it (Risk avoidance, Risk acceptance, Risk mitigation, Risk transference)  
With a CISSP certificate, you understand the structures, transmission methods, transport formats, and security measures used to provide confidentiality, integrity, and availability for transmissions over private and public communications networks and media. Also, learn to identify risks that can be quantitatively and qualitatively measured to support the building of a business and prevent security issues in the enterprise.
Offer greater visibility into determining who or what may have altered data or system information, potentially affecting the integrity of those assets. Also, learn to identify the person or computer system responsible for the security issue.  While going through the CISSP certification training course, you’ll also learn to identify the actions that the person or computer system takes against valuable assets, allowing organizations to have a better understanding of the state of their security infrastructure.
Plan for technology development, including risk, and evaluate the system design against mission requirements. A CISSP certificate will also enable you to identify where competitive prototyping and other evaluation techniques fit in the process.
Protect and control information processing assets in centralized and distributed environments and execute the daily tasks required to keep security services operating reliably and efficiently.
During the CISSP certification training course, you will understand the Software Development Life Cycle (SDLC) and how to apply security to it, identify which security control(s) are appropriate for the development environment, and assess the effectiveness of software security.

  •         Industry Recognition: Demonstrates a working knowledge of information security 
  •         Difficulty Level: Confirms passing a rigorous examination
  •         Dedication: Confirms commitment to profession
  •         Career differentiator, with enhanced credibility and marketability
  •         Get exclusive benefits: As an (ISC)² member, including valuable resources such as peer networking and idea exchange
  •         Earning Potential: According to the Global Information Security Workforce Study CISSPs earn a worldwide average of 25% more than their non-certified counterparts.
  •         Universally Recognized: Fulfills government and organization requirements for information security certification mandates

Exam Format

The CISSP exam uses Computerized Adaptive Testing (CAT) for all English exams.
CISSP exams in all other languages are administered as linear, fixed-form exams.  

  • Length of exam 3 hours
  • Number of questions 100 – 150
  • Question format Multiple choice and advanced innovative questions
  • Passing grade 700 out of 1000 points
  • Exam language availability English
  • Testing center (ISC)2 Authorized PPC and PVTC Select Pearson VUE Testing Centers

CISSP CAT Examination Weights

Domains & Average Weight

1. Security and Risk Management 15%
2. Asset Security 10%
3. Security Architecture and Engineering 13%
4. Communication and Network Security 14%
5. Identity and Access Management (IAM) 13%
6. Security Assessment and Testing 12%
7. Security Operations 13%
8. Software Development Security 10%

Exam Language

  • Brazilian
  • Portuguese
  • Chinese (Mandarin)
  • Czech
  • Danish
  • Dutch
  • English
  • French
  • German
  • Italian
  • Norwegian
  • Polish
  • Spanish
  • Swedish
  • Romanian
  • japanese
  • Korean

IEVISION - CISSP training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers. The training seminar is ideal for those working in positions such as, but not limited to:

  • Security Consultant
  • Security Manager
  • IT Director/Manager
  • Security Auditor
  • Security Architect
  • Security Analyst
  • Network Security Professional 
  • Application Security Professional
  • Security Systems Engineer
  • Chief Information Security Officer
  • Director of Security
  • 9/10 Passing Rate (highest in industry)
  • 65% Lower fees as compare to industry rates
  • International CISSP Trainer and Consultant
  • Trained over 2000+ CISSP candidates
  • Hard & soft copy CISSP latest courseware
  • Customized pre-courseware 
  • 3000+ latest CISSP question bank
  • Personalized follow-up for 180 days
  • Professionals trained from Banking, Financials, Telecom, IT, Government, Educational institute, And Healthcare-IT etc… in India and International
  • 5 Days classroom training program with 9 mock tests
  • Exclusive CISSP participation certificate
  • 45 PDU/CPE certificate (PMP, CISA, CISM Certified Professionals)
  • An exclusive session on “How to pass CISSP in 1st attempt”
  • A great networking opportunity
  • Excellent Training Facility with delicious refreshments
  • Dedicated & well trained support staff 
  • Professional Service Approach

REVIEWS



hrnisha Jadhav HR at Barclays

I have gone through CISSP training with IEVISION. It was very interactive session, excellent trainer with good training facility. Thank you TEAM IEVISION

Nilesh Shahane at

IEVISION CISSP  Trainer Mr. Sujay has very good knowledge in Cyber and Information security. He cleared all concepts nicely with very good examples. I must recommend for CISSP.

Vikas Bhatia IT Security Analyst at Deutsche Bank

I have attended CISSP training with IEVISION. Trainer was one of the best faculty I met. Real time information security examples, interactive session and excellent support from IEVISION. I have cleared my CISSP examination. Looking forward to do more courses with IEVISION.  Thank You

Umesh Bhosale Information Technology and Services Professional at STCI Finace Ltd

Amlesh has in-depth knowledge and experience in all CISSP domains. The training arrangement was also great. 

Shrinivas Chinni Netwrok Security Consultant at HCL

IEVISION has excellent trainers and I have lot of confidence after completed my training. Before I have lot of confusion which institute is best for CISSP training and I spoke with many training institutes but they are thinking only business point of view. Finally I spoke with IEVISION. Archana is one of the best person in IEVISION and her follow up is ultimate. And finally  Mahesh, he is the best motivator for CISSP training. I am planning to study 2 more courses from this Institute. All the best IEVISION.
  • CISSP Certificate Training Program
  • CISSP Certificate Training Program
  • CISSP Certificate Training Program

FREQUENTLY ASKED QUESTIONS

You need Computer with good Internet connection to attend the virtual classroom program.   

No, Exam fees not included in the training price. CISSP certification exam fees is 699$, charged by ISC2.

Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the International Information System Security Certification Consortium.
One of the top rated and high in demand information security certification in the world.

Virtual Classroom: Certified & Industry Specialist Trainer, Pre-courseware, Soft & Hard Copy Courseware, Participation Certificate, PDU Certificate Copy, Each session & domain, followed by a mock test, 5th Day 125 Question Set Test for overall applicability & discussion 3 Month follow-up by relationship manager on preparation, Domain and Topic wise online simulation tests having 5000 + Questions.

Classroom: Certified & Industry Specialist Trainer, Pre-courseware, Soft & hard Copy Courseware, Participation Certificate, PDU Certificate Copy, 5 Days Delicious food & refreshments, Each session & domain, followed by a mock test, 5th Day 125 Question Set Test for overall applicability & discussion 3 Month follow-up by relationship manager on preparation, Domain and Topic wise online simulation tests having 5000 + Questions.

You need Computer with good Internet connection to attend the virtual classroom program.   

Registration process is fairly simple and we call it as “one page checkout”. There are various options to make the payment i.e. debit/credit card that includes Visa Card, MasterCard; American express.

Payment through PayPal: Use invoices@ievision.org to make the payment and send the transaction number and screenshot for Payment confirmation. 

Yes. You can 100% Cancel the booking. Please follow the cancellation policy 

Yes. This is a ISC2 Accredited Training and Certification Program.

The CISSP credential is valid for three years; most holders renew by submitting Continuing Professional Education (CPE) credits.

  • CISSP is an online Exam with 250 MCQ type questions and you have 6 hours to finish the exam. 
  • To pass your CISSP Exam, you need to score 700 on the scale of 1000. 

The training seminar is ideal for those working in positions such as, but not limited to:
• Security Consultant
• Security Manager
• IT Director/Manager
• Security Auditor
• Security Architect
• Security Analyst
• Security Systems Engineer
• Chief Information Security Officer
• Director of Security
• Network Architect

  • Classroom 
  • Virtual Classroom 

This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers.

  • Length of exam: 6 hours
  • Number of questions: 250
  • Question format: Multiple choice and advanced innovative questions
  • Passing grade: 700 out of 1000 points
  • Exam availability: English, French, German, Brazilian Portuguese, Spanish, Japanese, Simplified Chines, Korean, Visually impaired

IEVISION Empaneled Trainer is Information Technology Consultant with over 16 years of IT experience. His consulting domains include Information Security Management and Enterprise Project Management. Trainer is also actively involved in content development for many information security related courses like CISSP, Etical hacking, Information Security and others. He regularly delivers trainings on CISSP and CEH to the employees from some of the reputed organizations like Symentec, Cognizant Technology Services, IBM, HP, Infosys,
Tech Mahindra, Accenture, Capgemini, Avaya, Allscripts, Sunguard, Alshaya,
Accenture, TCS, HSBC Bank, HDFC Bank, Standard Chartered, ISRC, Mphasis, Wipro,
Barklays, Reliance, United Healthcare, CSC, DEITY, Efkon, John Deere, Infinity Tech,
Cnergyis Infotech, ISRC, Eastern Produce Kenya, Kenya Medical Research Institute
(KEMRI), Posta Kenya, Higher Colleges of Technology (HCT) Dubai, Central Bank of UAE,
Abu Dhabi, DEGA- Dubai and others.

Passing rate for CISSP certification is 9/10 

Candidates must have a minimum of 5 years cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)² CISSP CBK®. Candidates may receive a one year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list, thus requiring four years of direct full-time professional security work experience in 2 or more of the 8 domains of the CISSP CBK.

The CISSP is a security certification. IT is very broad and probably is
geared more towards the manager in security, CISO, etc. It has become a
very widely used standard in job requirements for security positions.
The CISA is strictly an auditing certification is only needed if you are going to
be an IS Auditor. No one else looks for this or requires it.
BOTH certification require a certain number of years either in IS security
or as an auditor before you can receive the designation. To get the CISA
you have to have been doing auditing for a minimum of 3 years (education can
then make up the other 2 years of the 5 required). This one actually
requires a sign off from your current or past employers to prove that you
have been auditing. The CISSP requires that your cert app (after exam) be
signed off by another CISSP who can verify your experience.

  • Trainers are 15 + year experienced professionals with significant exposure on IT Security implementation and auditing. 
  • Trainers possess various Information Security certifications like CISA, CISSP, CISM, CGEIT, COBIT, ISO 27001 LA, ISO 27001 LI.  

  • 3-5 Member 5%
  • 6-8 Member 10%
  • 9+ Member 15%

INQUIRY


11000 +

Professionals Trained

About Pune

Pune is a sprawling city in the western Indian state of Maharashtra, India. It was once the base of the Peshwas (prime ministers) of the Maratha Empire, which lasted from 1674 to 1818. IEVISION Offering Virtual Classroom, Classroom, E-Learning and 200+ Examinations to test from your own place. Delivering IT Management & Technical Trainings like CISSP,CISA, ITIL, PMP, PRINCE2, ISO 27001, 20000, 22301 and many more.