In-Person Classroom
Classroom styled training by a certified expert
- Lifetime access with downloadable resources
- Get certificate on completion by our certified experts
- Get few Quizzes & Case studies to practice offline
- Application assistance and support by certified staff
$ 3149
Live Online Classroom
Start instantly and learn at your own schedule
- 100% online classes
- Flexible deadlines
- Earn a Certification upon completion by our globally recognized experts
- Avail study materials, videos, practice sets, quizzes to crack the examination with 100% results.
- Recorded lesson video for post-training learning
$ 3049
Online Self-Study
Online courses to build your skills and advance your career
- 24*7 career support
- Get Certified by our leading experts recognized globally
- Get noticed by the top hiring companies
- Exam passing tips and tricks to assist in the exam
- Industry case studies and capstone projects
$ 899
CISSP Certification Training
Companies these days depend on computers to provide services and store information’s. Just like locking the door of a house is important, so is keeping the computers safe from encroacher and unwanted threats is crucial in our technology dependent world.
Course Overview
Are you looking to learn the basics of information security management? If so, Skill Rise is the perfect place to advance your career in Information technology.
Course Agenda
What people say about CP
Training types
Accreditations and Clients
About Certification Planner
Introduction to live training
About the tutorial
Information Security Management
Security Controls
Information Security Management and Governance
Goals, Mission, and Objectives
Due Care
Security Policy
Compliance
Computer Crimes
Legal Systems
Intellectual Property (IP) Law
Privacy
General Data Protection Regulation
Security
Risk Analysis
Types of Risk Analysis
Security Control Assessment
Threat Modeling
Supply-Chain Risk Management
Third-Party Management
Business Continuity Planning
Business Continuity Planning Phases
Managing Personnel Security
Security Awareness Training
Program Effectiveness Evaluation
Information Classification
Data Classification
Data Life Cycle
Data Management
Different Roles
Data Remanence
Privacy
States of Data
Data Loss Prevention
Security Architecture
Security Models
Evaluation Criteria
System Security
CPU
Memory
Security Mode
Cloud Computing
IOT
Industrial Control System (ICS)
Cryptography
Encryption Methods
DES
Asymmetric Cryptography
Public Key Infrastructure
Cryptanalysis
Key Management
Critical Path Analysis
Site Location
Fire
HVAC
Network Architecture and Design
IP Addressing
Network Protocols
Transmission Media
Firewall
Intrusion Detection System and Intrusion Prevention System
Network Access Control (NAC)
Content Delivery Network (CDN)
Networks
Software-Defined Networking (SDN)
Remote Access
Internet Security Protocol (IPsec)
Voice over Internet Protocol (VoIP)
Phreaking
Secure Access Protocol
s
Wireless Technologies
Network Attacks
Identity Management
Biometrics
Passwords
Tokens
Memory Cards and Smart Cards
Access and Authorization Concepts
Identity Management Implementation
Kerberos
Access Control Types
Access Control Models
Access Control Tools and Techniques
Accountability
Access Control Monitoring
Identity Proofing
Markup Languages
Identity as a Service (IDaaS)
Security Assessment
Vulnerability Assessment
Penetration Testing
Audits
Log Management
Synthetic Transaction and Real Transaction
Testing
Software Testing
Interface
Key Performance Indicators (KPI)
Investigation
Forensic Investigation
Evidence
Electronic Discovery
Incident Management
Security Operations Management
Identity and Access Management
Assets
Malware
Management
Recovery and Backup
Disaster Recovery
Perimeter Security
Importance of Software Development Security
Programming Concepts
Systems Development Life Cycle
Application Program Interface
Software Security and Assurance
Database and Data Warehouse Environments
Knowledge Management
Web Application Environment
Security Threats and Attacks