In-Person Classroom

Classroom styled training by a certified expert

  • Lifetime access with downloadable resources
  • Get certificate on completion by our certified experts
  • Get few Quizzes & Case studies to practice offline
  • Application assistance and support by certified staff

$ 3149

Live Online Classroom

Start instantly and learn at your own schedule

  • 100% online classes
  • Flexible deadlines
  • Earn a Certification upon completion by our globally recognized experts
  • Avail study materials, videos, practice sets, quizzes to crack the examination with 100% results.
  • Recorded lesson video for post-training learning

$ 3049

Online Self-Study

Online courses to build your skills and advance your career

  • 24*7 career support
  • Get Certified by our leading experts recognized globally
  • Get noticed by the top hiring companies
  • Exam passing tips and tricks to assist in the exam
  • Industry case studies and capstone projects

$ 899

CISSP Certification Training

Companies these days depend on computers to provide services and store information’s. Just like locking the door of a house is important, so is keeping the computers safe from encroacher and unwanted threats is crucial in our technology dependent world.

Course Overview

Are you looking to learn the basics of information security management? If so, Skill Rise is the perfect place to advance your career in Information technology.

Course Agenda

  • What people say about CP

  • Training types

  • Accreditations and Clients

  • About Certification Planner

  • Introduction to live training

  • About the tutorial

  • Information Security Management

  • Security Controls

  • Information Security Management and Governance

  • Goals, Mission, and Objectives

  • Due Care

  • Security Policy

  • Compliance

  • Computer Crimes

  • Legal Systems

  • Intellectual Property (IP) Law

  • Privacy

  • General Data Protection Regulation

  • Security

  • Risk Analysis

  • Types of Risk Analysis

  • Security Control Assessment

  • Threat Modeling

  • Supply-Chain Risk Management

  • Third-Party Management

  • Business Continuity Planning

  • Business Continuity Planning Phases

  • Managing Personnel Security

  • Security Awareness Training

  • Program Effectiveness Evaluation

  • Information Classification

  • Data Classification

  • Data Life Cycle

  • Data Management

  • Different Roles

  • Data Remanence

  • Privacy

  • States of Data

  • Data Loss Prevention

  • Security Architecture

  • Security Models

  • Evaluation Criteria

  • System Security

  • CPU

  • Memory

  • Security Mode

  • Cloud Computing

  • IOT

  • Industrial Control System (ICS)

  • Cryptography

  • Encryption Methods

  • DES

  • Asymmetric Cryptography

  • Public Key Infrastructure

  • Cryptanalysis

  • Key Management

  • Critical Path Analysis

  • Site Location

  • Fire

  • HVAC

  • Network Architecture and Design

  • IP Addressing

  • Network Protocols

  • Transmission Media

  • Firewall

  • Intrusion Detection System and Intrusion Prevention System

  • Network Access Control (NAC)

  • Content Delivery Network (CDN)

  • Networks

  • Software-Defined Networking (SDN)

  • Remote Access

  • Internet Security Protocol (IPsec)

  • Voice over Internet Protocol (VoIP)

  • Phreaking

  • Secure Access Protocol

  • s
  • Wireless Technologies

  • Network Attacks

  • Identity Management

  • Biometrics

  • Passwords

  • Tokens

  • Memory Cards and Smart Cards

  • Access and Authorization Concepts

  • Identity Management Implementation

  • Kerberos

  • Access Control Types

  • Access Control Models

  • Access Control Tools and Techniques

  • Accountability

  • Access Control Monitoring

  • Identity Proofing

  • Markup Languages

  • Identity as a Service (IDaaS)

  • Security Assessment

  • Vulnerability Assessment

  • Penetration Testing

  • Audits

  • Log Management

  • Synthetic Transaction and Real Transaction

  • Testing

  • Software Testing

  • Interface

  • Key Performance Indicators (KPI)

  • Investigation

  • Forensic Investigation

  • Evidence

  • Electronic Discovery

  • Incident Management

  • Security Operations Management

  • Identity and Access Management

  • Assets

  • Malware

  • Management

  • Recovery and Backup

  • Disaster Recovery

  • Perimeter Security

  • Importance of Software Development Security

  • Programming Concepts

  • Systems Development Life Cycle

  • Application Program Interface

  • Software Security and Assurance

  • Database and Data Warehouse Environments

  • Knowledge Management

  • Web Application Environment

  • Security Threats and Attacks