This training program for the CISSP Certification, a pinnacle journey for cybersecurity professionals aiming to validate their expertise and ascend in their careers. Over six days, encompassing 66 hours of immersive instruction, this program demystifies the CISSP certification, ensuring participants are exam-ready with a deep understanding of all eight domains of cybersecurity. From security and risk management principles to intricate details of security engineering and software development security, you will gain insights into asset security, dive into the complexities of security engineering, and explore the nuances of communication and network security. The program also emphasizes the importance of identity and access management, security assessment and testing, security operations, and much more. The LDR414 program employs various training methodologies including lectures and simulation tests for professional certifications exams, ensuring a dynamic and engaging learning experience. By the end of this program, you will be prepared to take significant leadership roles in cybersecurity, developing a holistic understanding of information security best practices, frameworks, and strategies to protect organizations from cyber threats. Join us in shaping the future of cybersecurity leadership.
At the end of the training program, the participant should be able to:
1 Introductory Material
Overview of the exam
Focus of 2024 exam updates
What is required to become a CISSP®?
Maintaining a CISSP®
Exam overview
Test-taking tips and tricks.
2 Overview of the 8 Domains
Domain 1: Security and Risk Management
Domain 2: Asset Security
Domain 3: Security Engineering
Domain 4: Communication and Network Security
Domain 5: Identity and Access Management (IAM)
Domain 6: Security Assessment and Testing
Domain 7: Security Operations
Domain 8: Software Development Security
3 Domain 1: Security and Risk Management
Confidentiality, integrity, availability, authenticity, and non-repudiation
Security governance principles
Compliance
Supply Chain Risk Management (SCRM) concepts.
Legal and regulatory Issues
General Data Protection Regulation (GDPR)
California Consumer Privacy Act
Software Bill of Materials (SBOM)
Ethics
Policies, standards, procedures, and guidelines
Risk management concepts.
Product tampering and counterfeits
Threat modeling
Security champions
Gamification
Security Operations Center (SOC) reports
Education, training, and awareness
1 Domain 2: Asset Security
Data and asset classification
Tangible and intangible assets
Data owners
System owners
Business/Mission owners
Privacy
Data processors
Data remanence
Limitation on collection of sensitive data
Digital Rights Management (DRM)
Data retention
Data destruction
Data Loss Prevention (DLP)
Cloud Access Security Broker (CASB)
Baselines
Scoping and Tailoring
2 omain 3: Security Engineering (Part 1)
Secure design principles
Security models
Controls and countermeasures
Virtualization
Microservices
Containerization
Serverless
Trusted Platform Module (TPM)
Industrial Control Systems (ICS)
Embedded systems
Database security
Cloud computing
Secure Access Service Edge (SASE)
Supervisory Control and Data Acquisition (SCADA)
eXtensible Markup Language (XML)
OWASP
he Internet of Things
1 Domain 3: Security Engineering (Part 2)
Cryptography
Symmetric
Asymmetric
Hash
Quantum cryptography
Public Key Infrastructure (PKI)
Digital signatures
Non-repudiation
Salts
Rainbow tables
Pass the hash.
Cryptanalysis
Fault injection
Implementation attacks
2 Facility design considerations
3 Physical security
Safety
Data center security
Handling evidence
HVAC
Fire prevention and suppression.
4 Domain 4: Communication and Network Security
Network architecture.
OSI model
TCP/IP
Multilayer protocols
Network Attached Storage (NAS)
Fibre Channel over Ethernet (FCoE)
iSCSI
Infiniband
Compute Express Link (CXL)
5 Voiceover IP
6 Wireless
802.11
WPA2 and WPA3
Zigbee
7 Network devices.
Switches
Routers
Firewalls
Distributed Firewalls
Proxies
8 Content distribution networks
9 Virtual routing and forwarding
10 Virtual domain
11 Network Functions Virtualization (NFV)
12 Remote meeting technology
13 Telecommuting
14 Remote access and VPN
SSH
VPN
IPsec
SSL/TLS
15 Port isolation
16 VLANs
17 Software-defined networks
18 Micro-segmentation
19 Virtual eXtensible Local Area Network (VXLAN)
20 Software-Defined Wide Area Network (SD-WAN)
1 Domain 5: Identity and Access Management (IAM)
Physical and logical access
Credential management systems
Just-In-Time (JIT)
SSO
LDAP
Multi-factor authentication
Password-less authentication
Biometrics
Accountability
Session management
SAML
Credential management
2 Third-party identity services
3 On-premises, cloud, and hybrid identity
4 Authorization mechanisms
MAC
DAC
Rule-based
RBAC
ABAC
5 Provisioning
1 Domain 6: Security Assessment
Assessment and test strategies
Security control testing
Vulnerability assessment
Penetration testing
Log reviews
Synthetic transactions and benchmarks
Misuse case testing
Test coverage analysis
Responsible disclosure
2 Security testing strategies
Interface testing
Breach attack simulations
Red, blue, and purple team exercises
3 Security process
Account management
Management review
Training and awareness
Disaster recovery and business continuity
Exception handling
4 Internal and third-party audits
5 Domain 7: Security Operations
Investigations
Evidence collection and handling
Reporting and documenting
Forensics
6 Operational, criminal, civil, and regulatory investigations
7 eDiscovery
8 Logging and monitoring
Intrusion detection and prevention
SIEM
Continuous monitoring
Egress monitoring
User and Entity Behavior Analytics (UEBA)
Tools based on machine learning and Artificial Intelligence (AI)
9 Provisioning
Asset inventory
Configuration management
Physical, virtual, and cloud assets
Software as a Service (SaaS)
10 Security operations
Need-to-know and least privilege
Service-level agreements
System resilience
Quality of Service (QoS)
Threat feeds
Threat hunting
11 Incident management
12 Firewalls
13 IDS and IPS
14 Honeypots and honeynets
15 Vulnerability management
16 Change management processes.
17 Recovery strategies
18 Disaster recovery processes
19 Disaster recovery plans
1 Domain 8: Software Development Security
Software development lifecycle
Software development methodologies
Waterfall
Spiral
Agile
Integrated Product Team (IPT)
2 Software capability maturity models
Capability Maturity Model Integration (CMMi)
Software Assurance Maturity Model (SAMM)
3 Change management
4 DevOps
5 DevSecOps
6 Scaled Agile Framework (SAFe)
7 Software Component/Composition Analysis (SCA)
8 Interactive Application Security Test (IAST)
9 Continuous Integration/Continuous Delivery (CI/CD)
10 Security Orchestration, Automation, and Response (SOAR)
11 Security vulnerabilities
Bounds checking
Input/output validation
Buffer overflow
Privilege escalation
12 Secure coding
13 Code repositories
14 Programming interfaces
15 Software-defined security
16 Assessing software security
Black box testing
White box testing
Fuzzing
17 Security of Application Programming Interfaces (APIs)
Not Available
Names of the training programs that are integrated (enriched) with the training program:
Names of the training programs that after the training program:
the Escal Institute of Advanced Technologies, Inc. /dba SANS Institute
Add Comment