Course Outline

Domain 01 - Security and Risk Management

  • Introduction
  • Introduction to Security and Risk Management: Understand, Adhere to, and Promote Professional Ethics for government operations.
  • Knowledge Check
  • Understand and Apply Security Concepts for government systems.
  • Evaluate and Apply Security Governance Principles: Goals, Mission, and Objectives for government agencies.
  • Control Frameworks, Due Care, and Due Diligence for government compliance.
  • Knowledge Check
  • Determine Compliance and Other Requirements for government entities.
  • Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context for government operations.
  • Types of Intellectual Property (IP) Law relevant to government agencies.
  • OECD Principles, GDPR, and Data Protection Principles: Key Concepts for government data protection.
  • Understand Requirements for Investigation Types for government forensic processes.
  • Knowledge Check
  • Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines for government use.
  • Knowledge Check
  • Need for Business Continuity Planning (BCP) in Government: Phases of BCP and Business Impact Analysis for government resilience.
  • Identify Preventive Controls for government systems.
  • Knowledge Check
  • Contribute to and Enforce Personnel Security Policies and Procedures for government staff.
  • Introduction to Risk Management Concepts for government operations.
  • Risk Analysis for government assets.
  • Risk Analysis and Assessment: Countermeasure Selection for government systems.
  • Risk Handling and Security Control Assessment (SCA) for government compliance.
  • Risk Monitoring and Continuous Improvement for government security programs.
  • Knowledge Check
  • Understand and Apply Threat Modeling Concepts and Methodologies for government networks.
  • Threat Modeling Steps for government systems.
  • DREAD Rating Knowledge Check
  • Apply Supply Chain Risk Management (SCRM) Concepts: Third-Party Management and Risks for government procurement.
  • Third-Party Risk Management Life Cycle for government contractors.
  • Knowledge Check
  • Establish and Maintain a Security Awareness, Education, and Training Program for government employees.
  • Program Effectiveness: Evaluation for government training initiatives.
  • Knowledge Check
  • Quick Recap
  • Knowledge Check

Domain 02 - Asset Security

  • Introduction
  • Introduction to Asset Security for government assets.
  • Identify and Classify Information and Assets: Information Classification Objectives for government data.
  • Knowledge Check
  • Establish Information and Asset Handling Requirements: Provision Resources Securely for government operations.
  • Manage Data Life Cycle: Create, Store, and Use for government records.
  • Data Life Cycle: Share, Archive, and Destroy; Data Remanence and Data Destruction for government documents.
  • Knowledge Check
  • Ensure Appropriate Asset Retention: Data and Data Security Controls for government archives.
  • How to Select Controls for government systems.
  • Digital Rights Management (DRM) and Data Loss Prevention (DLP) for government data protection.
  • Quick Recap
  • Knowledge Check

Domain 03 - Security Architecture and Engineering

  • Introduction
  • Introduction to Security Engineering for government systems.
  • Research, Implement, and Manage Engineering Processes Using Trust but Verify and Zero Trust for government networks.
  • Privacy by Design for government applications.
  • Knowledge Check
  • Understand the Fundamental Concepts of Security Models: State Machine Model, Multilevel Lattice Model, Non-Interference Model, and Information Flow Model for government systems.
  • Types of Security Models: Composition Theories, Covert Channels, and Open and Closed Systems for government operations.
  • Knowledge Check
  • Select Controls Based on System Security Requirements: Security Capabilities of Information Systems for government use.
  • Knowledge Check
  • Assess and Mitigate the Vulnerabilities of Security Architectures: SCADA, ICS, Cloud Computing, Internet of Things (IoT), Fog and Edge Computing for government infrastructure.
  • Select and Determine Cryptographic Solutions: Cryptosystem Elements, Encryption Methods, Data Encryption Standards, Output Feedback, Counter, and Triple DES; Advanced Encryption Standards, Asymmetric Cryptography, Public Key Infrastructure (PKI), PKI Certificate and Processes, Hashing, MAC, and Digital Signatures; Key Management Principles for government security.
  • Knowledge Check
  • Methods of Cryptanalytic Attacks for government systems.
  • Knowledge Check
  • Apply Security Principles to Site and Facility Design: Design Site and Facility Security Controls, Personnel Access Controls, Environmental Security Controls, Classes of Fires, HVAC, Power Supply, and Training for government facilities.
  • Knowledge Check
  • Quick Recap
  • Knowledge Check

Domain 04 - Communications and Network Security

  • Introduction
  • Introduction to Communications and Network Security for government networks.
  • Assess and Implement Secure Design Principles: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer, and Protocols for government communications.
  • Knowledge Check
  • IP Addressing for government systems.
  • IPv6 and Its Address Structures for government networks.
  • Knowledge Check
  • Internet Security Protocol (IPsec): IPsec Security Protocols, Secure Access Protocols, Implementation of Multilayer Protocol, Fiber Channels, Micro-Segmentation, SDN, Wireless Technologies, Cellular Network, and CDN for government connectivity.
  • Knowledge Check
  • Understand Network Access Control (NAC) and Endpoint Security for government devices.
  • Knowledge Check
  • Implement Secure Communication Channels: Application-Level Gateway, Circuit-Level Gateway, Network Security Terms, Remote Access Technologies, VPN Protocols, Comparison of VPN Protocols, Multimedia Collaboration, Network Function Virtualization, and Network Attacks for government communications.
  • Quick Recap
  • Knowledge Check

Domain 05 - Identity and Access Management (IAM)

  • Introduction
  • Introduction to Identity and Access Management (IAM) for government operations.
  • Control Physical and Logical Access to Assets for government facilities.
  • Manage Identification and Authentication of People, Devices, and Services for government systems.
  • Biometrics and Accuracy Measurement for government security.
  • Passwords and Its Types for government accounts.
  • Tokens, Token Devices, and Authorization for government access.
  • Federated Identity Management (FIM) and Credential Management System for government identity management.
  • Single Sign-On (SSO) and Just-In-Time (JIT) for government users.
  • Knowledge Check
  • Federated Identity with a Third-Party Service for government partnerships.
  • Implement and Manage Authorization Mechanisms: Attribute-Based Access Control (ABAC) and Risk-Based Access Control for government systems.
  • Knowledge Check
  • Manage the Identity and Access Provisioning Life Cycle: Privilege Escalation for government accounts.
  • Implement Authentication Systems: Kerberos, RADIUS, TACACS, and TACACS Plus for government networks.
  • Quick Recap
  • Knowledge Check

Domain 06 - Security Assessment and Testing

  • Introduction
  • Introduction to Security Assessment and Testing for government systems.
  • Design and Validate Assessment, Test, and Audit Strategies: SOC Reports and Security Assessments for government compliance.
  • Internal Audit and Assessment, External Audit and Assessment, Third-Party Audit and Assessment, Vulnerability Assessment, Network Discovery Scan, Network Vulnerability Scan, Web Vulnerability Scan, Penetration Testing, Penetration Testing Process, Testing Types, Log Management, and Review for government security.
  • Security Testing in SDLC: Code Review and Testing, Testing Methods, Interface Testing for government applications.
  • Knowledge Check
  • Collect Security Process Data: KPI Process for government metrics.
  • Knowledge Check
  • Analyze Test Output and Generate Report for government evaluations.
  • Quick Recap
  • Knowledge Check

Domain 07 - Security Operations

  • Introduction
  • Introduction to Security Operations for government agencies.
  • Understand and Comply with Investigations: Digital Forensics for government cases.
  • Understand the Digital Evidences for government forensics.
  • Knowledge Check
  • Conduct Logging and Monitoring Activities for government systems.
  • Knowledge Check
  • Continuous Monitoring for government networks.
  • Digital Forensics Tools, Tactics, Procedures, Artifacts, and UEBA for government investigations.
  • Knowledge Check
  • Perform Configuration Management for government IT.
  • Apply Foundational Security Operation Concepts for government operations.
  • Identity and Access Management with Various Types of Accounts for government access.
  • Apply Resource Protection Controls for government assets.
  • Conduct Incident Management: Understand Incident Response Life Cycle for government incidents.
  • Knowledge Check
  • Operate and Maintain Detective and Preventive Measures for government security.
  • Understand Anti-Malware Systems, AI, Machine Learning, and Deep Learning for government defense.
  • Implement and Support Patch and Vulnerability Management for government systems.
  • Understand and Participate in Change Management Processes for government IT.
  • Implement Recovery Strategies: Types of Recoveries, Operational Recovery, Recovery Pattern Strategies, Redundancy, and Fault Tolerance for government resilience.
  • Knowledge Check
  • Implement Disaster Recovery (DR) Processes for government continuity.
  • Knowledge Check
  • Test Disaster Recovery Plans (DRP) for government preparedness.
  • Knowledge Check
  • Participate in Business Continuity (BC) Planning and Exercises for government operations.
  • Implement and Manage Physical Security: Importance of Lighting in Security Management, Access Control for government facilities.
  • Knowledge Check
  • Address Personnel Safety and Security Concerns for government staff.
  • Quick Recap
  • Knowledge Check

Domain 08 - Software Development Security

  • Introduction
  • Introduction to Software Development Security for government software.
  • Integrate Security in the Software Development Life Cycle (SDLC) for government applications.
  • Software Development Models: Extreme Programming Model, DevOps and DevSecOps, CMM and SAMM, Change Management, and Integrated Product Team (IPT) for government development.
  • Knowledge Check
  • Security Controls in Software Development Ecosystems for government software.
  • Other Security Controls in Software Development Ecosystems: Software Configuration Management (SCM), Database and Data Warehousing Environments for government systems.
  • Knowledge Check
  • Assess the Effectiveness of Software Security for government applications.
  • Software Security and Assurance: Granularity of Controls, Separation of Environments, TOC or TOU, Prevention of Social Engineering, Backup, Software Forensics, Cryptography, Password Protection, Mobile Mode Controls, Sandbox Software Security, Strong Language Support, XML, SAML for government software.
  • Assessing the Effectiveness of Software Security: Free and Open Source Software for government use.
  • Knowledge Check
  • Define and Apply Secure Coding Guidelines and Standards for government developers.
  • Web Application Environment for government web applications.
  • Knowledge Check
  • Quick Recap
  • Knowledge Check

Requirements

To obtain a CISSP certification, individuals must have at least five years of full-time professional experience in two or more of the eight domains of the CISSP – (ISC)² CBK 2018. For those enrolled in CISSP training with less than the required five years of experience, an (ISC)² associate title will be conferred. This certification process ensures that professionals meet rigorous standards for government and other sectors, enhancing cybersecurity governance and accountability.
 35 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories