Course Outline
Domain 01 - Security and Risk Management
- Introduction
- Introduction to Security and Risk Management: Understand, Adhere to, and Promote Professional Ethics for Government
- Knowledge Check
- Understand and Apply Security Concepts
- Evaluate and Apply Security Governance Principles: Goals, Mission, and Objectives
- Control Frameworks, Due Care, and Due Diligence
- Knowledge Check
- Determine Compliance and Other Requirements for Government
- Understand Legal and Regulatory Issues Pertaining to Information Security in a Holistic Context
- Types of Intellectual Property (IP) Law
- OECD Principles, GDPR, and Data Protection Principles
- Understand Requirements for Investigation Types
- Knowledge Check
- Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines
- Knowledge Check
- Need for Business Continuity Planning (BCP): Phases of Business Continuity Planning, Business Impact Analysis
- Identify Preventive Controls
- Knowledge Check
- Contribute to and Enforce Personnel Security Policies and Procedures
- Introduction to Risk Management Concepts
- Risk Analysis
- Risk Analysis and Assessment: Countermeasure Selection
- Risk Handling and Security Control Assessment (SCA)
- Risk Monitoring and Continuous Improvement
- Knowledge Check
- Understand and Apply Threat Modeling Concepts and Methodologies: Threat Modeling Steps
- DREAD Rating
- Knowledge Check
- Apply Supply Chain Risk Management (SCRM) Concepts: Third-Party Management and Risks, Third-Party Risk Management Life Cycle
- Knowledge Check
- Establish and Maintain a Security Awareness, Education, and Training Program for Government
- Evaluate Program Effectiveness
- Knowledge Check
- Quick Recap
- Knowledge Check
Domain 02 - Asset Security
- Introduction
- Introduction to Asset Security
- Identify and Classify Information and Assets: Information Classification Objectives
- Knowledge Check
- Establish Information and Asset Handling Requirements: Provision Resources Securely, Manage Data Life Cycle
- Data Life Cycle: Create, Store, and Use
- Data Life Cycle: Share, Archive, and Destroy; Data Remanence and Data Destruction
- Knowledge Check
- Ensure Appropriate Asset Retention: Data and Data Security Controls, How to Select Controls
- Digital Rights Management (DRM), Data Loss Prevention (DLP)
- Quick Recap
- Knowledge Check
Domain 03 - Security Architecture and Engineering
- Introduction
- Introduction to Security Engineering
- Research, Implement, and Manage Engineering Processes Using Trust but Verify and Zero Trust Principles for Government
- Privacy by Design
- Knowledge Check
- Understand the Fundamental Concepts of Security Models: State Machine Model, Multilevel Lattice Model, Non-Interference Model, Information Flow Model
- Types of Security Models: Composition Theories, Covert Channels, Open and Closed Systems
- Knowledge Check
- Select Controls Based on System Security Requirements: Security Capabilities of Information Systems
- Knowledge Check
- Assess and Mitigate the Vulnerabilities of Security Architectures: SCADA, Security Concerns of ICS, Cloud Computing Categorization, Internet of Things (IoT), Fog and Edge Computing
- Knowledge Check
- Select and Determine Cryptographic Solutions: Cryptosystem Elements, Encryption Methods, Data Encryption Standards, Output Feedback, Counter, Triple DES, Advanced Encryption Standards, Asymmetric Cryptography, Public Key Infrastructure (PKI)
- PKI Certificate and Processes: PKI Process Steps
- Hashing, MAC, Digital Signatures, Key Management Principles
- Knowledge Check
- Methods of Cryptanalytic Attacks
- Knowledge Check
- Apply Security Principles to Site and Facility Design: Design Site and Facility Security Controls, Personnel Access Controls, Environmental Security Controls, Classes of Fires, Other Security Controls, HVAC, Power Supply, Training
- Knowledge Check
- Quick Recap
- Knowledge Check
Domain 04 - Communications and Network Security
- Introduction
- Introduction to Communications and Network Security: Assess and Implement Secure Design Principles, Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer and Protocols
- Knowledge Check
- IP Addressing: IPv6 and Its Address Structures
- Knowledge Check
- Internet Security Protocol (IPsec): IPsec Security Protocols, Secure Access Protocols, Implementation of Multilayer Protocol, Fiber Channels, Micro-Segmentation, SDN, Wireless Technologies, Cellular Network, CDN
- Knowledge Check
- Understand Network Access Control (NAC) and Endpoint Security
- Knowledge Check
- Implement Secure Communication Channels: Application-Level Gateway, Circuit-Level Gateway, Network Security Terms, Remote Access Technologies, VPN Protocols, Comparison of VPN Protocols, Multimedia Collaboration, Network Function Virtualization, Network Attacks
- Quick Recap
- Knowledge Check
Domain 05 - Identity and Access Management (IAM)
- Introduction
- Introduction to Identity and Access Management (IAM): Control Physical and Logical Access to Assets, Manage Identification and Authentication of People, Devices, and Services, Biometrics and Accuracy Measurement, Passwords and Their Types, Tokens, Token Devices, Authorization, Federated Identity Management (FIM), Credential Management System, Single Sign-On (SSO), Just-In-Time (JIT)
- Knowledge Check
- Federated Identity with a Third-Party Service: Implement and Manage Authorization Mechanisms, Attribute-Based Access Control (ABAC), Risk-Based Access Control
- Knowledge Check
- Manage the Identity and Access Provisioning Life Cycle: Privilege Escalation, Implement Authentication Systems, Kerberos and Its Steps, RADIUS, TACACS, TACACS Plus
- Quick Recap
- Knowledge Check
Domain 06 - Security Assessment and Testing
- Introduction
- Introduction to Security Assessment and Testing: Design and Validate Assessment, Test, and Audit Strategies, SOC Reports, Security Assessments, Internal Audit and Assessment, External Audit and Assessment, Third-Party Audit and Assessment, Vulnerability Assessment, Network Discovery Scan, Network Vulnerability Scan, Web Vulnerability Scan, Penetration Testing, Penetration Testing Process and Types, Log Management and Review, Security Testing in SDLC, Code Review and Testing, Testing Methods, Interface Testing
- Knowledge Check
- Collect Security Process Data: KPI Process
- Knowledge Check
- Analyze Test Output and Generate Report
- Quick Recap
- Knowledge Check
Domain 07 - Security Operations
- Introduction
- Introduction to Security Operations: Understand and Comply with Investigations, Digital Forensics, Understanding Digital Evidences
- Knowledge Check
- Conduct Logging and Monitoring Activities
- Knowledge Check
- Continuous Monitoring
- Digital Forensics Tools, Tactics, Procedures, Artifacts, UEBA
- Knowledge Check
- Perform Configuration Management: Apply Foundational Security Operation Concepts, Identity and Access Management with Various Types of Accounts, Apply Resource Protection, Controls for Protecting Assets, Conduct Incident Management, Understand Incident Response Life Cycle
- Knowledge Check
- Operate and Maintain Detective and Preventive Measures: Understand Anti-Malware Systems, AI, Machine Learning, Deep Learning, Implement and Support Patch and Vulnerability Management, Understand and Participate in Change Management Processes, Implement Recovery Strategies, Types of Recoveries, Operational Recovery, Recovery Pattern Strategies, Redundancy, Fault Tolerance
- Knowledge Check
- Implement Disaster Recovery (DR) Processes: Knowledge Check, Test Disaster Recovery Plans (DRP)
- Knowledge Check
- Participate in Business Continuity (BC) Planning and Exercises: Implement and Manage Physical Security, Importance of Lighting in Security Management, Access Control
- Knowledge Check
- Address Personnel Safety and Security Concerns
- Quick Recap
- Knowledge Check
Domain 08 - Software Development Security
- Introduction
- Introduction to Software Development Security: Integrate Security in the Software Development Life Cycle, Software Development Models, Extreme Programming Model, DevOps and DevSecOps, CMM and SAMM, Change Management, Integrated Product Team (IPT)
- Knowledge Check
- Security Controls in Software Development Ecosystems: Other Security Controls in Software Development Ecosystems, Software Configuration Management (SCM), Database and Data Warehousing Environments
- Knowledge Check
- Assess the Effectiveness of Software Security: Software Security and Assurance, Granularity of Controls, Separation of Environments, TOC or TOU, Prevention of Social Engineering, Backup, Software Forensics, Cryptography, Password Protection, Mobile Mode Controls, Sandbox, Strong Language Support, XML, SAML
- Assessing the Effectiveness of Software Security: Free and Open Source Software
- Knowledge Check
- Define and Apply Secure Coding Guidelines and Standards: Web Application Environment
- Knowledge Check
- Quick Recap
- Knowledge Check
Requirements
To obtain a CISSP certification, individuals must have a minimum of five years of full-time professional experience in at least two of the eight domains outlined in the (ISC)² CBK 2018. For government professionals enrolled in CISSP training who do not yet meet the five-year requirement, an (ISC)² associate title will be awarded.
Testimonials (5)
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
Course - Secure Developer Java (Inc OWASP)
Module3 Applications Attacks and Exploits, XSS, SQL injection Module4 Servers Attacks and Exploits, DOS, BOF
Tshifhiwa - Vodacom
Course - How to Write Secure Code
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
Course - Secure Developer .NET (Inc OWASP)
Nothing it was perfect.