CISSP – Certified Information Systems Security Professional

Overview

Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification Consortium, (ISC)2.

CISSP certified professionals are considered authorities on key security issues including mobile security, risk management, application development security, cloud computing, among others.

CISSP certification is not only an objective measure of excellence, but a globally recognized standard of achievement for security training. Sapphire Global Consulting services provides comprehensive CISSP training for participants who wish to gain expertise in defining the design, architecture, management and controls leading to a secure business environment. Individuals possessing this vendor neutral credential are high in demand by corporations all over the world who want to protect their organizations from a growing spurt of sophisticated cyber attacks.

Training Options

INSTRUCTOR LEAD LIVE
TRAINING

  • Live Instructor Online training by Certified & industry expert Trainers
  • 24/7 One Demand Dedicated Server for Hands on Practice.
  • Flexibility to attend the class at your convenient time.
  • Earn a Skill Certificate
  • Professional Resume Preparation end of the trading period. 
  • Plus 45 Days of flexible access e- learning.
Make me an Expert

CORPORATE TRAINING

  • Customized Learning delivery model.
  • Our training practice are perfectly blended with options for effective live instructor lead hands on training.
  • Training need analysis.
  • Our Corporate training services are easy accessibility of LMS ( learning Management System ) online or offline – anytime, anywhere, on any of your devices.
  • 24/7 learner assistance and Support

Course Curriculum

Learning Objects
  • Understand the basics of telecommunication and network security concepts, required components for minimizing security risks, securing channels of communication, and techniques for preventing and detecting network-based attacks.
  • Identify the key terms and processes of security operations and how to protect and control information processing assets in a centralized or distributed environment in this CISSP training.
  • Define and apply information security governance and Risk Management Framework including the policies, concepts, principles, structures and standards that are established for the protection of information assets and how to assess the effectiveness of that protection
  • Gain the required skills to design the architecture and manage IT security in an enterprise environment through this authorized CISSP course
1. Security and Risk Management

1.1 Understand and apply concepts of confidentiality, integrity and availability

1.2 Evaluate and apply security governance principles

1.3 Determine compliance requirements

1.4 Understand legal and regulatory issues that pertain to information security in a global context

1.5 Understand, adhere to, and promote professional ethics

1.6 Develop, document, and implement security policy, standards, procedures, and guidelines

1.7 Identify, analyze, and prioritize Business Continuity (BC) requirements

1.8 Contribute to and enforce personnel security policies and procedures

1.9 Understand and apply risk management concepts

1.10 Understand and apply threat modeling concepts and methodologies

1.11 Apply risk-based management concepts to the supply chain

1.12 Establish and maintain a security awareness, education, and training program

2. Asset Security

2.1 Identify and classify information and assets

2.2 Determine and maintain information and asset ownership

2.3 Protect privacy

2.4 Ensure appropriate asset retention

2.5 Determine data security controls

2.6 Establish information and asset handling requirements

3. Security Architecture and Engineering

3.1 Implement and manage engineering processes using secure design principles

3.2 Understand the fundamental concepts of security models

3.3 Select controls based upon systems security requirements

3.4 Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)

3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements

3.6 Assess and mitigate vulnerabilities in web-based systems

3.7 Assess and mitigate vulnerabilities in mobile systems

3.8 Assess and mitigate vulnerabilities in embedded devices

3.9 Apply cryptography

3.10 Apply security principles to site and facility design

3.11 Implement site and facility security controls

4. Communication and Network Security

4.1 Implement secure design principles in network architectures

4.2 Secure network components

4.3 Implement secure communication channels according to design

5. Identity and Access Management ( IAM )

5.1 Control physical and logical access to assets

5.2 Manage identification and authentication of people, devices, and services

5.3 Integrate identity as a third-party service

5.4 Implement and manage authorization mechanisms

5.5 Manage the identity and access provisioning lifecycle

6. Security Assessment and Testing

6.1 Design and validate assessment, test, and audit strategies

6.2 Conduct security control testing

6.3 Collect security process data (e.g., technical and administrative)

6.4 Analyze test output and generate report

6.5 Conduct or facilitate security audits

7. Security Operations Security Operations

7.1 Understand and support investigations

7.2 Understand requirements for investigation types

Conduct logging and monitoring activities

Securely provisioning resources

Understand and apply foundational security operations concepts

Apply resource protection techniques

Conduct incident management

Operate and maintain detective and preventative measures

Implement and support patch and vulnerability management

Understand and participate in change management processes

Implement recovery strategies

Implement Disaster Recovery (DR) processes

Test Disaster Recovery Plans (DRP)

Participate in Business Continuity (BC) planning and exercises

Implement and manage physical security

Address personnel safety and security concerns

8. Software Development Security

Understand and integrate security in the Software Development Life Cycle (SDLC)

Identify and apply security controls in development environments

Assess the effectiveness of software security

Assess security impact of acquired software

Define and apply secure coding guidelines and standards

Course Advisor

Course Advisor

R. Sreenatha Reddy

SAP FICO / FSCM / TRM / FM / S4HANA Functional Consultant

Professional Experience:

15+ years of Industry experience as Accountant, Consultant, Module Lead, worked on various IT Organizations like IBM/TCS/ITC infotech/SAP Labs across the globe.

Specialized in SAP

  • SAP FICO – Financial Accounting.
  • SAP FSCM – Accounts Receivable
  • SAP TRM – Treasury Management
  • SAP BCS – Budget Control System
  • SAP EC CS – Enterprise Controlling Consolidation System
  • BOBJE – Dashboard Enhancement for MIS

Reviews

There are no reviews yet.

Be the first to review “CISSP – Certified Information Systems Security Professional”

Your email address will not be published. Required fields are marked *

3 × one =