cissp certification
Post on 03-Jun-2018
216 Views
Preview:
TRANSCRIPT
-
8/12/2019 CISSP Certification
1/11
CISSP Certification
www.oueducation.in
-
8/12/2019 CISSP Certification
2/11
- WHAT IS CISSP ?
CISSP certification is a globally acceptedstandard of certification that confirms that an
individual consists a rigrous knowledge ininformation security field. Professionals whoachieve the CISSP Certification usually decide thedesign, architecture, controls and managementthat assures the security of any specificenvironment. In the field of information securityis the first certification program to meet therequirements of ISO/IEC Standard 17024.
-
8/12/2019 CISSP Certification
3/11
- DOMAINS WHICH CISSP COVERS :Exam of CISSP mainly covers 10 domains, these are the criticaltopics which are the core of Information Security. To become CISSPCertified a candidate must possess a 5 Years Full Time Paid WorkExperience in at least two or more than two domains mentioned.
Access Control Cryptography Operations Security Security Architecture and Design Information Security Governance and Risk Management Software Development Security Legal, Regulations, Investigations and Compliance Business Continuity and Disaster Recovery Planning Physical (Environmental) Security Telecommunications and Network Security
-
8/12/2019 CISSP Certification
4/11
- JOB FUNCTIONAL AREAS COVERED BY CISSPPROFESSIONAL :Once a professional is CISSP Certified, he/she may work inany one designation
1. Security Consultant2. Security Manager3. IT Director/Manager4. Security Auditor5. Security Architect
6. Security Analyst7. Security Systems Engineer8. Chief Information Security Officer9. Director of Security10. Network Architect
-
8/12/2019 CISSP Certification
5/11
- CISSP COURSE DESCRIPTION :
CISSP Exam was created by (ISC). Thesepeople also provide a seminar called as (ISC)Official CBK Training Seminar for the CISSPwhich can make any individual excel in CISSPexam.
This course is designed for the professionalswho elect to take this training course to
sharpen their knowledge and skill set relatedto Information Systems Security and/or toprepare for the final CISSP exam.
This program comprises of 10 domains andits duration is 5 days. This 5-day program is
comprised of a total of 10 domains.
-
8/12/2019 CISSP Certification
6/11
- COURSE OUTLINE :Domain 1: Access Control :Module 1: Introduction to Access ControlModule 2: Access Control Key Concepts, Methodologies,and TechniquesModule 3: System Logging and MonitoringModule 4: Access Control Attacks and ThreatsModule 5: Access Control Effectiveness
Module 6: Identify and Access Provisioning LifecycleDomain 2: Telecommunications and Network Security :Module 1: Introduction to Telecommunications andNetwork SecurityModule 2: Network Models and System ArchitectureModule 3: The Network and IT SecurityModule 4: Understanding the Attack
Module 5: Tools and Tasks in Network SecurityModule 6: Layer 1: Physical LayerModule 7: Layer 2: Data-link LayerModule 8: Layer 3: Network LayerModule 9: Layer 4: Transport LayerModule 10: Layer 5: Session Layer
Module 11: Layer 6: Presentation LayerModule 12: Layer 7: Application Layer
-
8/12/2019 CISSP Certification
7/11
Domain 3: Information Security Governance andRisk Management :Module 1: Introduction to Information SecurityGovernance and Risk ManagementModule 2: Information Security GovernanceModule 3: The Risk Management Process
Module 4: Ethical Considerations in InformationSecurityDomain 4: Software development Security :Module 1: System Life Cycle SecurityModule 2: Systems Development MethodologiesModule 3: Security Issues with ProgrammingLanguages
Module 4: Assessing the Effectiveness of SoftwareSecurityModule 5: Security ControlsModule 6: Database SecurityModule 7: Application and Database SecurityIssues
-
8/12/2019 CISSP Certification
8/11
Domain 5: Cryptography :Module 1: Key Concepts and Common Terminology Used inCryptographyModule 2: Historical Aspect of CryptographyModule 3: Uses of CryptographyModule 4: The Cryptographic Life CycleModule 5: Methods of Cryptography
Module 6: The Different Encryption SystemsModule 7: Algorithm ConceptsModule 8: Methods of Cryptanalytic AttacksModule 9: Maintaining Network SecurityModule 10: Maintaining Application SecurityModule 11: Information Hiding Alternatives
Domain 6: Security Architecture and Design :Module 1: Key Concepts and DefinitionsModule 2: Types of Security ModelsModule 3: Components of an ArchitectureModule 4: Basic Principles of System DesignModule 5: Evaluation Models of Information Systems
Module 6: Common Security FrameworksModule 7: Vulnerabilities and Threats
-
8/12/2019 CISSP Certification
9/11
Domain 7: Security Operations :Module 1: Security Concepts and ActivitiesModule 2: Protection of ResourcesModule 3: Preventive MeasuresModule 4: Change Management and
Configuration ManagementModule 5: System Resilience and FaultTolerance Requirements
Domain 8: Business Continuity and DisasterRecovery Planning :Module 1: Processes Required for Planning theProjectModule 2: Defining the OrganizationModule 3: Plan Implementation
-
8/12/2019 CISSP Certification
10/11
Domain 9: Legal, regulations, Investigations, and Compliance:Module 1: The Major Legal Systems in Information SecurityModule 2: International Law in Information SecurityModule 3: Supporting the InvestigationModule 4: The Forensic InvestigationModule 5: Hardware/Embedded Device Analysis
Module 6: Compliance Processes and ProceduresModule 7: Ensure Security in Contractual Agreements andProcurement Processes
Domain 10: Physical (Environmental) Security :Module 1: Definitions and Key Concepts
Module 2: Site and Facility Design ConsiderationsModule 3: Implementation and Operation of PerimeterSecurityModule 4: Implementation and Operation of Internal SecurityModule 5: Implementation and Operation of FacilitiesSecurityModule 6: Equipment Protection
Module 7: Personnel Privacy and Safety
-
8/12/2019 CISSP Certification
11/11
- BENIFITS FOR PROFESSIONALS AFTER PASSING THISEXAM :
1. Proves that the professional has a proper and deepknowledge of information security.2. Offers a glorious career which stand apart from others.3. Fullfills all the requirements by any organization orgovernment body for information security mandates.
*This information was updated on 4th
June 2014, howeverviewers are requested to re-check the information on subject toany changes.
Feel free to mail us regarding your views or queries at :mail@oureducation.com
top related