(ISC)² CISSP Certification

LogicCircles.com proudly presents dedicated 6-day training to candidates interested in obtaining CISSP certification. Our talented instructors will cover eight domains of (ISC)² CISSP in six days and make you ready for the exam only in a week. We offer official courseware, practice labs, practice tests, and self-study resources to speed up your learning process.

CISSP Certification is developed by (ISC)², the Globally-Recognized cyber-security membership association. If you acquire this certification, you become competitive in the global market. Professionals with this certification can land Senior-level jobs overnight.

 This course will help you learn all fundamentals and expert concepts about enterprise security program implementation and management.

Course Outline For (ISC)² CISSP Exam

Module 1: Risk and Security Management 

1.1 Confidentiality, integrity and availability Concept Understanding and Application

1.2 Security governance principles Application and Evaluation

1.3 Understand compliance requirements

1.4 Understand World-Wide legal and regulatory issues Related to Information Security

1.5 Professional Ethics Promotion, Adherence and Understanding

1.6 Security policy, procedures, standards, procedures, guidelines Development, Implementation, and Documentation

1.7 Identification, Prioritization, and analysis of Business Continuity (BC) requirements

1.8 Personnel security policies and procedures Contribution and Enforcement

1.9 Risk Management Concept Understanding and Application

1.10 Threat Modeling concepts and methodologies Understanding and Application

1.11 Risk-based management concepts to the supply chain Application

1.12 Security education, awareness, and training program Establishment and Maintenance

Module 2: Secure Asset

2.1 Information and assets Identification and Classification

2.2 Information and asset ownership Understanding and Maintenance

2.3 Privacy Protection

2.4 Appropriate asset retention 

2.5 Understand data security controls

2.6 Understand information and asset handling requirements

Module 3: Architecture and Engineering Security

3.1 Engineering processes Implementation and Management

3.2 Understand Security models Core Concept 

3.3 Control Selection upon systems security requirements

3.4 Security capabilities of information systems Concepts

3.5 Identification and Mitigation of Designs, security architectures, and solution elements’ Vulnerabilities 

3.6 Vulnerabilities Mitigation and Assessment in mobile devices, a web-based system, and embedded devices

3.7 Cryptography Application

3.8 Site and facility design’s Security Principles Application

3.9 Site and facility security controls Implementation

 Module 4: Secure Communication and Network 

4.1 Secure design principles Implementation in Network architectures

4.2 Network components Security

4.3 Secure communication channels Implementation as per Design

Module 5: Identity and Access Management (IAM)

5.1 Asset physical and logical access Control

5.2 People, devices, and services identification and authentication

5.3 Identity Integration as a Third-Party

5.4 Authorization mechanisms Management and Implementation

5.5 Identity and access provisioning lifecycle Management

Module 6: Security Test and Assessment 

6.1 Assessment, test, and audit strategies Validation and Design

6.2 Perform security control testing

6.3 Security process data Collection

6.4 Test output Analysis and Report Building

6.5 Conducting and Facilitating security audits 

Module 7: Operations Related to Security 

7.1 Investigation Introduction and Support

7.2 Investigation Types Requirement concept

7.3 Performing logging and monitoring activities

7.4 Secure Resources Provision

7.5 Foundational security operations concepts and Application

7.6 Resource protection techniques Application

7.7 Handing incident management

7.8 Detective and preventive measures Operation and Maintenance 

7.9 Recovery Strategies, DR Process, Change Management Process Implementation

7.10 patch and vulnerability management Support and Implementation

7.11 DRP Testing

7.12 Business Continuity (BC) planning and exercises Participation

7.13 Physical Security Implementation and Management

7.14 Handling personnel safety and security concerns

Module 8: Secure Software Development  

8.1 SDLC Security Integration and Understanding

8.2 security controls in development environments Identification and Application

8.3 Assessing software security Effectiveness

8.4 Acquired software Security Impact Assessment 

8.5 Secure coding guidelines and standards Definition and Application

(ISC)² CISSP Exam Guide

The English exam duration of Certified Information Systems Security Professional is 180 minutes. You need to attempt 100-150 questions. Exam format comprises Multiple-Choice questions and some innovative questions. You must acquire 700 out of 1000 marks to pass this exam to cover the following eight domains of CISSP Common Body of Knowledge (CBK).

Domain 1: Risk and Security Management 15%

Domain 2: Secure Asset 10%

Domain 3: Architecture and Engineering Security 13%

Domain 4: Secure Communication and Network 14%

Domain 5: IAM Management 13%

Domain 6: Security Test and Assessment 12%

Domain 7: Operation Related to Security 13%

Domain 8: Secure Software Development 10%

Important Note: The same exam is available in alternative languages such as Korean, Japanese, Spanish, French, German, Portuguese, Simplified Chinese, and Brazilian. The exam format will remain the same, but the duration will be six hours. Candidates will attempt 250 questions.