- CISSP Course Introduction
- Home
- Simplilearn
- Courses
- Certified Information Systems Security Professional Certification Training
CISSP Certification
Enrol in the CISSP Certification training course to master the core competencies of the information system security industry and become a cybersecurity expert.
Online
₹ 168,525
Quick facts
particular | details | ||
---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study, Virtual Classroom
|
Mode of Delivery
Video and Text Based
|
Frequency of Classes
Weekdays, Weekends
|
Course overview
The CISSP Certification (Certified Information Systems Security Professional Certification) course is aligned with (ISC)2 CBK 2018 – a collection of lessons useful to the cybersecurity professionals. A globally recognised credential, the CISSP Certification equips candidates with essential skills to become a competent information security professional.
The CISSP Certification training course covers the core competencies of the information industry and offers in-depth information about areas such as – how to define, design, and maintain an IT architecture for a secure business environment. Also, the CISSP Certification training course prepares candidates for the CISSP Certification exam held by the International Information System Security Certification Consortium (ISC)2
Moreover, the primary coursework will cover core topics such as security management, risk analysis, network security, software development for security management, and more for in-depth learning. Once candidates complete the CISSP Certification by Simplilearn successfully, they can find lucrative offers in companies such as IBM, Cisco, Vodafone, etc. and work as a Security Administrator or IT Security Operation Specialist.
The highlights
- 67 hours of in-depth learning
- 30 CPEs essential for the CISSP examination
- 5 simulation test papers
- Lifetime access to top-quality self-paced e-learning content
- 24x7 learner assistance and support
Program offerings
- Self paced learning
- Blended learning
- Corporate training
- Live lectures
Course and certificate fees
Fees information
CISSP Certification Fee Structure
Training Options | Fee in INR | GST | Total fee in INR |
Self-Paced Learning | Rs.168,525 | Rs.30,334.50 | Rs.198,859.50 |
Online Bootcamp | Rs.174,195 | Rs.31,335.10 | Rs.205,550.10 |
Corporate Training | NA | NA | NA |
certificate availability
certificate providing authority
Eligibility criteria
Work experience
Candidates need to have at least five years of minimum work experience in any of the two or more of the 8 domains of the CISSP- (ISC)2 CBK 2018 to enrol in the CISSP Certification course by Simplilearn.
Certification Qualifying Detail
In order to qualify for the certificate, one must pass the CISSP exam which is held in computer-based mode administered at Pearson VUE testing centres around the world.
What you will learn
Upon CISSP Certification course by Simplilearn completion, candidates will have an in-depth knowledge of the following skill sets:
- Be thorough with the IT security discipline, framework, and solutions for managing digital identities
- Ensure appropriate access to IT resources
- Proficiency in managing risks
- Identifying, analysing, and dealing with threats to valuable assets
- Ability to secure computer networks using both hardware and software technologies
- Ability to analyse and scrutinize any possible vulnerabilities, risks, or threats in the security
- Eliminate the deficiencies in systems early on
- Ability to convert plain text into an unintelligible text to make secure communication
- Assess and design secure computer systems using logical hardware, operating systems, and software security components
- Configure and verify IP addresses as well as probe static vs dynamic addresses and private vs public addresses.
- Implement secure programming and practices during the development process of software.
Who it is for
The CISSP certification course is a perfect option for professionals such as –
- Security consultants and Security Managers.
- Leaders in the IT domain like IT Directors and IT Managers.
- People responsible for checking System Security like Security Auditors and Architects.
- IT professionals like Security System Engineers and Network Architects.
- CIO for ensuring system security throughout the organisation.
Admission details
Filling the form
Application process for the CISSP Certification course by Simplilearn is simple. To start with:
Step 1 - Visit official website - simplilearn.com/cyber-security/cissp-certification-training#how-do-i-apply-for-cissp-re-examination
Step 2 - Click on the Enroll Now button
Step 3 - A new page will be opened on your screen
Step 4 - If you have a coupon, you can apply the code; else click on ‘Proceed’ button
Step 5 - Provide your details including name, email and contact number in the form and click on ‘Proceed’ button
Step 6 - Make the payment and save the transaction receipt for future reference
The syllabus
Lesson 01 - Course Introduction
Lesson 02 - Domain One: Security and Risk Management
- Introduction
- Introduction to Security and Risk Management
- Understand, Adhere to, and Promote Professional Ethics
- Knowledge Check
- Understand and Apply Security Concepts
- Evaluate and Apply Security Governance Principles
- Goals, Mission, and Objectives
- Control Frameworks, Due Care, and Due Diligence
- Knowledge Check
- Determine Compliance and Other Requirements
- Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context
- Types of Intellectual Properties (IP) Law
- OECD Principles, GDPR, and Data Protection principles
- Data Protection Principles
- Understand Requirements for Investigation Types
- Knowledge Check
- Develop, Document, and Implement Security Policy, Standards,Procedures, and Guidelines
- Knowledge Check
- Need for Business Continuity Planning (BCP)
- Business Continuity Planning Phases
- Business Impact Analysis
- Identify Preventive Controls
- Knowledge Check
- Contribute and Enforce Personnel Security Policies and Procedures
- Introduction to Risk Management Concepts
- Risk Analysis
- Risk Analysis and Assessment
- Countermeasure Selection
- Risk Handling and Security Control Assessment
- Security Control Assessment (SCA)
- Risk Monitoring and Continuous Improvement
- Knowledge Check
- Understand and Apply Threat Modeling Concepts and Methodologies
- Threat Modeling Steps
- DREAD Rating
- Knowledge Check
- Apply Supply Chain Risk Management (SCRM) Concepts
- Third-Party Management and Risks
- Third-Party Risk Management Life Cycle
- Knowledge Check
- Establish and Maintain a Security Awareness, Education, and Training Program
- Program Effectiveness: Evaluation
- Knowledge Check
- Quick Recap
- Knowledge Check
Lesson 03 - Domain Two: Asset Security
- Introduction
- Introduction to Asset Security
- Identify and Classify Information and Assets
- Information Classification Objectives
- Knowledge Check
- Establish Information and Asset Handling Requirements
- Provision Resources Securely
- Manage Data Life Cycle
- Data Life Cycle: Create, Store, and Use
- Data Life Cycle: Share, Archive, and Destroy
- Data Remanence and Data Destruction
- Knowledge Check
- Ensure Appropriate Asset Retention
- Data and Data Security Controls
- How to Select Controls
- Digital Rights Management (DRM)
- Data Loss Prevention (DLP)
- Quick Recap
- Knowledge Check
Lesson 04 - Domain Three: Security Architecture and Engineering
- Introduction
- Introduction to Security Engineering
- Research, Implement, and Manage Engineering Processes Using
- Trust but Verify and Zero Trust
- Privacy by Design
- Knowledge Check
- Understand the Fundamental Concepts of Security Models
- State Machine Model, Multilevel Lattice Model, Non-Interference Model, and Information Flow Model
- Types of Security Models
- Composition Theories, Covert Channels, and Open and Closed Systems
- Knowledge Check
- Select Controls Based on System Security Requirements
- Security Capabilities of Information Systems
- Knowledge Check
- Assess and Mitigate the Vulnerabilities of Security Architectures
- SCADA
- Security Concerns of ICS
- Cloud Computing
- Categorization of Cloud
- Internet of Things
- Fog and Edge Computing
- Knowledge Check
- Select and Determine Cryptographic Solutions
- Cryptosystem Elements
- Encryption Methods
- Data Encryption Standards
- Output Feedback, Counter, and Triple DES
- Advanced Encryption Standards
- Asymmetric Cryptography
- Public Key Infrastructure
- PKI Certificate and Processes
- PKI Process: Steps
- Hashing, MAC, and Digital Signatures
- Key Management Principles
- Knowledge Check
- Methods of Cryptanalytic Attacks
- Knowledge Check
- Apply Security Principles to Site and Facility Design
- Design Site and Facility Security Controls
- Personnel Access Controls
- Environmental Security Controls
- Classes of Fires
- Other Security Controls
- HVAC, Power Supply, and Training
- Knowledge Check
- Quick Recap
- Knowledge Check
Lesson 05 - Domain Four: Communication and Network Security
- Introduction
- Introduction to Communications and Network Security
- Assess and Implement Secure Design Principles
- Physical Layer and Data Link Layer
- Network Layer
- Transport Layer
- Session Layer and Presentation Layer
- Application Layer and Protocols
- Knowledge Check
- IP Addressing
- IPv6 and Its Address Structures
- Knowledge Check
- Internet Security Protocol(IPsec)
- IPsec Security Protocols
- Secure Access Protocols
- Implementation of Multilayer Protocol, Fiber Channels, and Micro-Segmentation
- SDN and Wireless Technologies
- Cellular Network and CDN
- Knowledge Check
- Secure Network Components
- Understand Network Access Control (NAC) and Endpoint Security
- Knowledge Check
- Implement Secure Communication Channels
- Application-Level Gateway, Circuit-Level Gateway, and Network Security Terms
- Remote Access Technologies
- VPN Protocols
- VPN Protocols: Comparison
- Multimedia Collaboration, Network Function Virtualization, and Network Attacks
- Quick Recap
- Knowledge Check
Lesson 06 - Spotlight Video One
- CISSP Spotlight One
Lesson 07 - Domain Five: Identity and Access Management (IAM)
- Introduction
- Introduction to Identity and Access Management (IAM)
- Control Physical and Logical Access to Assets
- Manage Identification and Authentication of People Devices and Services
- Biometrics and Accuracy Measurement
- Passwords and Its Types
- Tokens, Token Devices, and Authorization
- Federated Identity Management (FIM) and Credential Management System
- Single Sign-On (SSO) and Just-In-Time (JIT)
- Knowledge Check
- Federated Identity with a Third-Party Service
- Implement and Manage Authorization Mechanisms
- Attribute-Based Access Control (ABAC) and Risk-Based Access Control
- Knowledge Check
- Manage the Identity and Access Provisioning Life Cycle
- Privilege Escalation
- Implement Authentication Systems
- Kerberos and Its Steps, RADIUS, TACACS, and TACACS Plus
- Quick Recap
- Knowledge Check
Lesson 08 - Domain Six: Security Assessment and Testing
- Introduction
- Introduction to Security Assessment and Testing
- Design and Validate Assessment, Test, and Audit Strategies
- SOC Reports and Security Assessments
- Internal Audit and Assessment
- External Audit and Assessment
- Third-Party Audit and Assessment
- Knowledge Check
- Vulnerability Assessment
- Network Discovery Scan
- Network Vulnerability Scan and Web Vulnerability Scan
- Penetration Testing
- Penetration Testing Process and Testing Types
- Log Management and Review
- Security Testing in SDLC
- Code Review and Testing
- Testing Methods
- Interface Testing
- Knowledge Check
- Collect Security Process Data
- KPI Process
- Knowledge Check
- Analyze Test Output and Generate Report
- Quick Recap
- Knowledge Check
Lesson 09 - Domain Seven: Security Operations
- Introduction
- Introduction to Security Operations
- Understand and Comply with Investigations
- Digital Forensics
- Understand the Digital Evidences
- Knowledge Check
- Conduct Logging and Monitoring Activities
- Knowledge Check
- Continuous Monitoring
- Digital Forensics Tools, Tactics, Procedures, Artifacts, and UEBA
- Knowledge Check
- Perform Configuration Management
- Apply Foundational Security Operation Concepts
- Identity and Access Management with Various Types of Accounts
- Apply Resource Protection
- Controls for Protecting Assets
- Conduct Incident Management
- Understand Incident Response Life Cycle
- Knowledge Check
- Operate and Maintain Detective and Preventive Measures
- Understand Anti-Malware Systems, AI, Machine Learning, and Deep Learning
- Implement and Support Patch and Vulnerability Management
- Understand and Participate in Change Management Processes
- Implement Recovery Strategies
- Types of Recoveries
- Operational Recovery
- Recovery Partner Strategies
- Redundancy and Fault Tolerance
- Knowledge Check
- Implement Disaster Recovery (DR) Processes
- Knowledge Check
- Test Disaster Recovery Plans (DRP)
- Knowledge Check
- Participate in Business Continuity (BC) Planning and Exercises
- Implement and Manage Physical Security
- Importance of Lighting in Security Management
- Access Control
- Knowledge Check
- Address Personnel Safety and Security Concerns
- Quick Recap
- Knowledge Check
Lesson 10 - Domain Eight: Software Development Security
- Introduction
- Introduction to Software Development Security
- Integrate Security in the Software Development Life Cycle
- Software Development Models
- Extreme Programming Model
- DevOps and DevSecOps
- CMM and SAMM
- Change Management and Integrated Product Team (IPT)
- Knowledge Check
- Security Controls in Software Development Ecosystems
- Other Security Controls in Software Development Ecosystems
- Software Configuration Management (SCM)
- Database and Data Warehousing Environments
- Knowledge Check
- Assess the Effectiveness of Software Security
- Software Security and Assurance: Granularity of Controls and Separation of Environments
- Software Security and Assurance: TOC or TOU, Prevention of Social Engineering, Backup, Software Forensics, Cryptography
- Software Security and Assurance: Password Protection, Mobile Mode Controls, and Sandbox
- Software Security and Assurance: Strong Language Support, XML, and SAML
- Assessing the Effectiveness of Software Security
- Knowledge Check
- Assess Security Impact of Acquired Software
- Free and Open Source Software
- Knowledge Check
- Define and Apply Secure Coding Guidelines and Standards
- Web Application Environment
- Knowledge Check
- Quick Recap
- Knowledge Check
Lesson 11 - Spotlight Video Two
- Spotlight Two
Evaluation process
To receive the CISSP Certification, candidates need to pass the CISSP Certification exam, a Computer Based Test or CBT, which is administered by Pearson VUE centres across the world. It contains 100-150 MCQ based questions.
How it helps
The CISSP Certification formalises and validates your IT security skills and makes you an ideal candidate for the booming cybersecurity job market. Upon course completion, you can work as an IT Security Engineer, IT Security Operation Specialist, Security Administrator, and Security Systems Administrator – and earn an annual salary between ₹3.98 lakhs and ₹17.73 lakhs
Instructors
Mr Dean Pompilio
Trainer
Freelancer
FAQs
Candidates must secure a score of 700 in order to pass for the CISSP Certification
The Certification is valid for 3 years.
The Certificate is emailed within 4-6 weeks once the CISSP Certification exam result is declared.
Candidates will be asked a total of 100-150 MCQ-based questions in the CISSP Certification exam. The exam duration is 3 hours.