CyberSecurity Workshop

Search Workshops




Workshop Information

Who should do this course?

The CISSP is a globally recognized certification at professional level backed by (ISC)² to meet stringent requirements of ISO/IEC Standard 17024 for IT Security field. The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
The CISSP is ideal for the professional having or aiming the below job-role:
IT Security Consultant
IT Security Manager
IT Security Auditor
IT Security Architect
IT Security Analyst
IT Security Systems Engineer
Chief Information Security Officer
Director of IT Security
Network Architect

Why should do this course?

The CISSP (Certified Information Systems Security Professional) is the first credential in the field of information security to get certified from (ISC)² which a globally recognized, non-profitable organization dedicated to advancing the information security field.
This course is aiming to train you to enhance your knowledge and skill in the field of Information Security. This course focuses upon the training and preparation required to crack your CISSP certification in your first attempt.
The CISSP exam tests ones competence in the 8 domains of the CISSP CBK, which cover:
Security and Risk Management
Asset Security
Security Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security

Course Objective

To understand and apply the concepts of risk assessment, risk analysis, data classification
To address the policies, principles, structures, and standards used to establish criteria for the protection of information assets
To examine the principles, means, and methods of applying mathematical algorithms and data transformations to information to ensure its integrity, confidentiality, and authenticity.
To understand the structures, transmission methods, transport formats, and security measures used to provide confidentiality, integrity, and availability for transmissions over private and public communications.
To plan for technology development, including risk, evaluation techniques and identification for competitive prototyping
To protect and control information processing assets in centralized and distributed environments
To understand the Software Development Life Cycle (SDLC) and how to apply security to it.

Prerequisites

Candidates must have a minimum of 5 years cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)² CISSP CBK®. Candidates may receive a one year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list, thus requiring four years of direct full-time professional security work experience in 2 or more of the 8 domains of the CISSP CBK.

1. Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity)

  • 1.1 Confidentiality, integrity, and availability concepts
  • 1.2 Security governance principles
  • 1.3 Compliance
  • 1.4 Legal and regulatory issues
  • 1.5 Professional ethic
  • 1.6 Security policies, standards, procedures and guidelines
  • 2. Asset Security (Protecting Security of Assets)

  • 2.1 Information and asset classification
  • 2.2 Ownership (e.g. data owners, system owners)
  • 2.3 Protect privacy
  • 2.4 Appropriate retention
  • 2.5 Data security controls
  • 2.6 Handling requirements (e.g. markings, labels, storage)
  • 3. Security Engineering (Engineering and Management of Security)

  • 3.1 Engineering processes using secure design principles
  • 3.2 Security models fundamental concepts
  • 3.3 Security evaluation models
  • 3.4 Security capabilities of information systems
  • 3.5 Security architectures, designs, and solution elements vulnerabilities
  • 3.6 Web-based systems vulnerabilities
  • 3.7 Mobile systems vulnerabilities
  • 3.8 Embedded devices and cyber-physical systems vulnerabilities
  • 3.9 Cryptography
  • 3.10 Site and facility design secure principles
  • 3.11 Physical security
  • 4. Communication and Network Security (Designing and Protecting Network Security)

  • 4.1 Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
  • 4.2 Secure network components
  • 4.3 Secure communication channels
  • 4.4 Network attacks
  • 5. Identity and Access Management (Controlling Access and Managing Identity)

  • 5.1 Physical and logical assets control
  • 5.2 Identification and authentication of people and devices
  • 5.3 Identity as a service (e.g. cloud identity)
  • 5.4 Third-party identity services (e.g. on-premise)
  • 5.5 Access control attacks
  • 5.6 Identity and access provisioning lifecycle (e.g. provisioning review)
  • 6. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)

  • 6.1 Assessment and test strategies
  • 6.2 Security process data (e.g. management and operational controls)
  • 6.3 Security control testing
  • 6.4 Test outputs (e.g. automated, manual)
  • 6.5 Security architectures vulnerabilities
  • 7. Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)

  • 7.1 Investigations support and requirements
  • 7.2 Logging and monitoring activities
  • 7.3 Provisioning of resources
  • 7.4 Foundational security operations concepts
  • 7.5 Resource protection techniques
  • 7.6 Incident management
  • 7.7 Preventative measures
  • 7.8 Patch and vulnerability management
  • 7.9 Change management processes
  • 7.10 Recovery strategies
  • 7.11 Disaster recovery processes and plans
  • 7.12 Business continuity planning and exercises
  • 7.13 Physical security
  • 7.14 Personnel safety concerns
  • 8. Software Development Security (Understanding, Applying, and Enforcing Software Security)

  • 8.1 Security in the software development lifecycle
  • 8.2 Development environment security controls
  • 8.3 Software security effectiveness
  • 8.4 Acquired software security impact
  • S. No.Name Education Experience
    1Chaitanya Krishna B.Tech 3 - 6 years
    2Satinder Singh Sandhu B.Tech 3 - 6 years
    3Hemant Singh BA 6 - 9 years


    *All trademarks and logos appearing on this website are the property of their respective owners.


    Copyright ©2015 Hub4Tech.com, All Rights Reserved. Hub4Tech™ is registered trademark of Hub4tech Portal Services Pvt. Ltd.
    All trademarks and logos appearing on this website are the property of their respective owners.
    FOLLOW US