IEVISION is best training institute and delivering ISO, IT, AI, Cyber Security, Agile Project Management, Cloud Computing, GRC Training and Certifications across the world. IEVISON is partnered with EXCELCERT, EXIN, APMG, TUV-SUD, ISTQB & PECB Certification partners.
| Date | Time | Course Type | Price | Option |
|---|---|---|---|---|
The CISSP course is designed to prepare IT professionals to manage and design the information security framework of an organisation. The course module consists of 8 domains, covering the necessary topics.
Domain 1: Security and Risk Management
Domain 1: Security and Risk Management
Domain 1 of the CISSP certificate course teaches you the importance of security and risk management in an organisation by incorporating legal and regulatory aspects.
ISC2 Code of Professional Ethics
Organizational code of ethics
Confidentiality, integrity, and availability, authenticity, and nonrepudiation (5 Pillars of Information Security)
Alignment of the security function to business strategy, goals, mission, and objectives
Organizational processes (e.g., acquisitions, divestitures, governance committees)
Organizational roles and responsibilities
Security control frameworks (e.g., International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST), Control Objectives for Information and Related Technology (COBIT), Sherwood Applied Business Security Architecture (SABSA), Payment Card Industry (PCI), Federal Risk and Authorization Management Program (FedRAMP))
Due care/due diligence
Cybercrimes and data breaches
Licensing and Intellectual Property requirements
Import/export controls
Transborder data flow
Issues related to privacy (e.g., General Data Protection Regulation (GDPR), California Consumer Privacy Act, Personal Information Protection Law, Protection of Personal Information Act)
Contractual, legal, industry standards, and regulatory requirements
Business impact analysis (BIA)
External dependencies
Candidate screening and hiring
Employment agreements and policy-driven requirements
Onboarding, transfers, and termination processes
Vendor, consultant, and contractor agreements and controls
Threat and vulnerability identification
Risk analysis, assessment, and scope
Risk response and treatment (e.g., cybersecurity insurance)
Applicable types of controls (e.g., preventive, detection, corrective)
Control assessments (e.g., security and privacy)
Continuous monitoring and measurement
Reporting (e.g., internal, external)
Continuous improvement (e.g., risk maturity modeling)
Risk frameworks (e.g., International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST), Control Objectives for Information and Related Technology (COBIT), Sherwood Applied Business Security Architecture (SABSA), Payment Card Industry (PCI)
Risks associated with the acquisition of products and services from suppliers and providers (e.g., product tampering, counterfeits, implants)
Risk mitigations (e.g., third-party assessment and monitoring, minimum security requirements, service level requirements, silicon root of trust, physically unclonable function, software bill of materials)
Methods and techniques to increase awareness and training (e.g., social engineering, phishing, security champions, gamification)
Periodic content reviews to include emerging technologies and trends (e.g., cryptocurrency, artificial intelligence (AI), blockchain)
Program effectiveness evaluation
In domain 2 of the CISSP course, you learn how to identify information and assets in an enterprise. You also learn to establish proper asset handling requirements.
Data classification
Asset Classification
Information and asset ownership
Asset inventory (e.g., tangible, intangible)
Asset management
Data roles (i.e., owners, controllers, custodians, processors, users/subjects)
Data collection
Data location
Data maintenance
Data retention
Data remanence
Data destruction
Data states (e.g., in use, in transit, at rest)
Scoping and tailoring
Standards selection
Data protection methods (e.g., Digital Rights Management (DRM), Data Loss Prevention (DLP), Cloud Access Security Broker (CASB)
Domain 3 of the CISSP course will cover the usage of secure design principles to manage and implement engineering processes, fundamental concepts of security models, and much more.
Threat modeling
Least privilege
Defense in depth
Secure defaults
Fail securely
Segregation of Duties (SoD)
Keep it simple and small
Zero trust or trust but verify
Privacy by design
Shared responsibility
Secure Access Service Edge
Client-based systems
Server-based systems
Database systems
Cryptographic systems
Industrial Control Systems (ICS)
Cloud-based systems (e.g., Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS))
Distributed systems
Internet of Things (IoT)
Microservices (e.g., application programming interface (API))
Containerization
Serverless
Embedded systems
High-Performance Computing Systems
Edge computing systems
Virtualized systems
Exam Language
IEVISION - CISSP training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers. The training seminar is ideal for those working in positions such as, but not limited to:
You need Computer with good Internet connection to attend the virtual classroom program.
No, Exam fees not included in the training price. CISSP certification exam fees is 699$, charged by ISC2.
You need Computer with good Internet connection to attend the virtual classroom program.
Yes. You can 100% Cancel the booking. Please follow the cancellation policy
Yes. This is a ISC2 Accredited Training and Certification Program.
The CISSP credential is valid for three years; most holders renew by submitting Continuing Professional Education (CPE) credits.
This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers.
Passing rate for CISSP certification is 9/10
Candidates must have a minimum of 5 years cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)² CISSP CBK®. Candidates may receive a one year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list, thus requiring four years of direct full-time professional security work experience in 2 or more of the 8 domains of the CISSP CBK.
hrnisha Jadhav HR at Barclays
Nilesh Shahane at
Vikas Bhatia IT Security Analyst at Deutsche Bank
Umesh Bhosale Information Technology and Services Professional at STCI Finace Ltd
Shrinivas Chinni Netwrok Security Consultant at HCL