null
NextTech
  • All Courses
  • Applications
    • Adobe
    • Microsoft 365
    • Microsoft Apps for Business
    • Windows 10
  • Information Technology
    • AI & Machine Learning
    • Apps, Infrastructure, & Networking
    • Big Data
    • Business Applications
    • Cloud Computing
    • Data Centre
    • DevOps
    • SAP
    • Security
    • Software Development
  • Process Management
    • Agile
    • APMG
    • Business Analysis
    • IT Services
    • MSP
    • PRINCE2
    • Project Management
    • Quality
    • RESILIA
    • Software Testing
  • Professional Development
    • Business Communication
    • Sales
    • Business Skills
    • Customer Service
    • Digital Marketing
    • Learning and Development
    • Management and Leadership
    • Performance Enhancement
  • Contact Us
    • Online Evaluations
    • Training Guide
    • Google Review
  • Blog
  • Request a Quote
  • Sign in
  • Register
  • Australian Dollars
  • Request a Quote
Vertical Categories
NextTech
0
NextTech
  • Hello, sign in My Account
    • Sign in
    • Register
  • My Cart

    0 items $0
All Courses
  • Applications
    • Adobe
    • Microsoft 365
    • Microsoft Apps for Business
    • Windows 10
  • Information Technology
    • AI & Machine Learning
    • Apps, Infrastructure, & Networking
    • Big Data
    • Business Applications
    • Cloud Computing
    • Data Centre
    • DevOps
    • SAP
    • Security
    • Software Development
  • Process Management
    • Agile
    • APMG
    • Business Analysis
    • IT Services
    • MSP
    • PRINCE2
    • Project Management
    • Quality
    • RESILIA
    • Software Testing
  • Professional Development
    • Business Communication
    • Sales
    • Business Skills
    • Customer Service
    • Digital Marketing
    • Learning and Development
    • Management and Leadership
    • Performance Enhancement
  • Home
  • Contact Us
    • Online Evaluations
    • Training Guide
    • Google Review
  • Blog
  • Request a Quote

CISSP Certification Training Course

The Certified Information Systems Security Professional (CISSP) is a globally recognized certification for information technology security professionals. Aligned with the latest (ISC) version launched on May 2021, our CISSP training covers all...
MSRP:
Was:
Now: $4,124
(You save )
Brand
NextTech eLearning
SKU:
CISSP
Duration:
3 Months
Delivery:
eLearning
Course Date :

Adding to cart… The item has been added
Request a Quote
Share this course
  • Facebook
  • Email
  • Print
  • Twitter
  • Linkedin
  • Pinterest
  • Home
  • All Courses
  • CISSP Certification Training Course

CISSP Certification Training Course

The Certified Information Systems Security Professional (CISSP) is a globally recognized certification for information technology security professionals. Aligned with the latest (ISC) version launched on May 1, 2021, our CISSP training covers all areas of IT security so you can become a strong information security professional.

  • Course Overview
  • Course Content
  • Exam & Certification
  • FAQs

About the course

The CISSP certification training develops your expertise in defining the IT architecture and in designing, building, and maintaining a secure business environment using globally approved information security standards. The CISSP training covers industry best practices and prepares you for the CISSP certification exam held by (ISC).

A CISSP certification validates your skills in IT security. Cybersecurity Ventures predicts a total of 3.5 million Cyber Security jobs by 2021. The global Cyber Security market is expected to reach USD $282.3 Billion by 2024, growing at a rate of 11.1-percent annually.

Eligibility

The CISSP course is the most globally recognized professional requirement in the IT Security domain. This CISSP training is best suited for those at the intermediate level of their career including; security consultants/managers, IT directors/managers, security auditors/architects, security system engineers, CIOs, and network architects.

Pre-requisites

To obtain your CISSP (certified information systems security professional) certification, you must have a minimum of five years of full-time professional work experience in two or more of the 8 domains of the CISSP - (ISC) CBK 2021. A qualified individual with less than five years of experience will receive the (ISC) associate title.

Skills Covered

  • Security and risk management
  • Asset security Security architecture and design
  • Cryptography OSI and TCPIP models
  • IP addresses
  • Network security
  • Identity and access management
  • Security assessment and testing
  • Software development security

Course Content

CISSP® - Certified Information Systems Security Professional

  • Lesson 00 - Course Introduction
    • 0.01 CISSP Course Introduction
  • Lesson 01: Security and Risk Management
    • 1.01 Introduction
    • 1.02 Introduction to Security and Risk Management
    • 1.03 Understand, Adhere to, and Promote Professional Ethics
    • 1.04 Knowledge Check
    • 1.05 Understand and Apply Security Concepts
    • 1.06 Evaluate and Apply Security Governance Principles
    • 1.07 Goals, Mission, and Objectives
    • 1.08 Control Frameworks, Due Care, and Due Diligence
    • 1.09 Knowledge Check
    • 1.10 Determine Compliance and Other Requirements
    • 1.11 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context
    • 1.12 Types of Intellectual Properties (IP) Law
    • 1.13 OECD Principles, GDPR, and Data Protection principles
    • 1.14 Data Protection Principles
    • 1.15 Understand Requirements for Investigation Types
    • 1.16 Knowledge Check
    • 1.17 Develop, Document, and Implement Security Policy, Standards,Procedures, and Guidelines
    • 1.18 Knowledge Check
    • 1.19 Need for Business Continuity Planning (BCP)
    • 1.20 Business Continuity Planning Phases
    • 1.21 Business Impact Analysis
    • 1.22 Identify Preventive Controls
    • 1.23 Knowledge Check
    • 1.24 Contribute and Enforce Personnel Security Policies and Procedures
    • 1.25 Introduction to Risk Management Concepts
    • 1.26 Risk Analysis
    • 1.27 Risk Analysis and Assessment
    • 1.28 Countermeasure Selection
    • 1.29 Risk Handling and Security Control Assessment
    • 1.30 Security Control Assessment (SCA)
    • 1.31 Risk Monitoring and Continuous Improvement
    • 1.32 Knowledge Check
    • 1.33 Understand and Apply Threat Modeling Concepts and Methodologies
    • 1.34 Threat Modeling Steps
    • 1.35 DREAD Rating
    • 1.36 Knowledge Check
    • 1.37 Apply Supply Chain Risk Management (SCRM) Concepts
    • 1.38 Third-Party Management and Risks
    • 1.39 Third-Party Risk Management Life Cycle
    • 1.40 Knowledge Check
    • 1.41 Establish and Maintain a Security Awareness, Education, and Training Program
    • 1.42 Program Effectiveness: Evaluation
    • 1.43 Knowledge Check
    • 1.44 Quick Recap
    • 1.45 Knowledge Check
  • Lesson 02: Asset Security
    • 2.01 Introduction
    • 2.02 Introduction to Asset Security
    • 2.03 Identify and Classify Information and Assets
    • 2.04 Information Classification Objectives
    • 2.05 Knowledge Check
    • 2.06 Establish Information and Asset Handling Requirements
    • 2.07 Provision Resources Securely
    • 2.08 Manage Data Life Cycle
    • 2.09 Data Life Cycle: Create, Store, and Use
    • 2.10 Data Life Cycle: Share, Archive, and Destroy
    • 2.11 Data Remanence and Data Destruction
    • 2.12 Knowledge Check
    • 2.13 Ensure Appropriate Asset Retention
    • 2.14 Data and Data Security Controls
    • 2.15 How to Select Controls
    • 2.16 Digital Rights Management (DRM)
    • 2.17 Data Loss Prevention (DLP)
    • 2.18 Quick Recap
    • 2.19 Knowledge Check
  • Lesson 03: Security Architecture and Engineering
    • 3.01 Introduction
    • 3.02 Introduction to Security Engineering
    • 3.03 Research, Implement, and Manage Engineering Processes Using
    • 3.04 Trust but Verify and Zero Trust
    • 3.05 Privacy by Design
    • 3.06 Knowledge Check
    • 3.07 Understand the Fundamental Concepts of Security Models
    • 3.08_State Machine Model, Multilevel Lattice Model, Non-Interference Model, and Information Flow Model
    • 3.09 Types of Security Models
    • 3.10 Composition Theories, Covert Channels, and Open and Closed Systems
    • 3.11 Knowledge Check
    • 3.12 Select Controls Based on System Security Requirements
    • 3.13 Security Capabilities of Information Systems
    • 3.14 Knowledge Check
    • 3.15 Assess and Mitigate the Vulnerabilities of Security Architectures
    • 3.16 SCADA
    • 3.17 Security Concerns of ICS
    • 3.18 Cloud Computing
    • 3.19 Categorization of Cloud
    • 3.20 Internet of Things
    • 3.21 Fog and Edge Computing
    • 3.22 Knowledge Check
    • 3.23 Select and Determine Cryptographic Solutions
    • 3.24 Cryptosystem Elements
    • 3.25 Encryption Methods
    • 3.26 Data Encryption Standards
    • 3.27 Output Feedback, Counter, and Triple DES
    • 3.28 Advanced Encryption Standards
    • 3.29 Asymmetric Cryptography
    • 3.30 Public Key Infrastructure
    • 3.31 PKI Certificate and Processes
    • 3.32 PKI Process: Steps
    • 3.33 Hashing, MAC, and Digital Signatures
    • 3.34 Key Management Principles
    • 3.35 Knowledge Check
    • 3.36 Methods of Cryptanalytic Attacks
    • 3.37 Knowledge Check
    • 3.38 Apply Security Principles to Site and Facility Design
    • 3.39 Design Site and Facility Security Controls
    • 3.40 Personnel Access Controls
    • 3.41 Environmental Security Controls
    • 3.42 Classes of Fires
    • 3.43 Other Security Controls
    • 3.44 HVAC, Power Supply, and Training
    • 3.45 Knowledge Check
    • 3.46 Quick Recap
    • 3.47 Knowledge Check
  • Lesson 04: Communication and Network Security
    • 4.01 Introduction
    • 4.02 Introduction to Communications and Network Security
    • 4.03 Assess and Implement Secure Design Principles
    • 4.04 Physical Layer and Data Link Layer
    • 4.05 Network Layer
    • 4.06 Transport Layer
    • 4.07 Session Layer and Presentation Layer
    • 4.08 Application Layer and Protocols
    • 4.09 Knowledge Check
    • 4.10 IP Addressing
    • 4.11 IPv6 and Its Address Structures
    • 4.12 Knowledge Check
    • 4.13 Internet Security Protocol(IPsec)
    • 4.14 IPsec Security Protocols
    • 4.15 Secure Access Protocols
    • 4.16 Implementation of Multilayer Protocol, Fiber Channels, and Micro-Segmentation
    • 4.17 SDN and Wireless Technologies
    • 4.18 Cellular Network and CDN
    • 4.19 Knowledge Check
    • 4.20 Secure Network Components
    • 4.21 Understand Network Access Control (NAC) and Endpoint Security
    • 4.22 Knowledge Check
    • 4.23 Implement Secure Communication Channels
    • 4.24 Application-Level Gateway, Circuit-Level Gateway, and Network Security Terms
    • 4.25 Remote Access Technologies
    • 4.26 VPN Protocols
    • 4.27 VPN Protocols: Comparison
    • 4.28 Multimedia Collaboration, Network Function Virtualization, and Network Attacks
    • 4.29 Quick Recap
    • 4.30 Knowledge Check
  • Lesson - Spotlight Video One
    • CISSP Spotlight One
  • Lesson 05: Identity and Access Management (IAM)
    • 5.01 Introduction
    • 5.02 Introduction to Identity and Access Management (IAM)
    • 5.03 Control Physical and Logical Access to Assets
    • 5.04 Manage Identification and Authentication of People Devices and Services
    • 5.05 Biometrics and Accuracy Measurement
    • 5.06 Passwords and Its Types
    • 5.07 Tokens, Token Devices, and Authorization
    • 5.08 Federated Identity Management (FIM) and Credential Management System
    • 5.09 Single Sign-On (SSO) and Just-In-Time (JIT)
    • 5.10 Knowledge Check
    • 5.11 Federated Identity with a Third-Party Service
    • 5.12 Implement and Manage Authorization Mechanisms
    • 5.13 Attribute-Based Access Control (ABAC) and Risk-Based Access Control
    • 5.14 Knowledge Check
    • 5.15 Manage the Identity and Access Provisioning Life Cycle
    • 5.16 Privilege Escalation
    • 5.17 Implement Authentication Systems
    • 5.18_Kerberos and Its Steps, RADIUS, TACACS, and TACACS Plus
    • 5.19 Quick Recap
    • 5.20 Knowledge Check
  • Lesson 06: Security Assessment and Testing
    • 6.01 Introduction
    • 6.02 Introduction to Security Assessment and Testing
    • 6.03 Design and Validate Assessment, Test, and Audit Strategies
    • 6.04 SOC Reports and Security Assessments
    • 6.05 Internal Audit and Assessment
    • 6.06 External Audit and Assessment
    • 6.07 Third-Party Audit and Assessment
    • 6.08 Knowledge Check
    • 6.09 Vulnerability Assessment
    • 6.10 Network Discovery Scan
    • 6.11 Network Vulnerability Scan and Web Vulnerability Scan
    • 6.12 Penetration Testing
    • 6.13 Penetration Testing Process and Testing Types
    • 6.14 Log Management and Review
    • 6.15 Security Testing in SDLC
    • 6.16 Code Review and Testing
    • 6.17 Testing Methods
    • 6.18 Interface Testing
    • 6.19 Knowledge Check
    • 6.20 Collect Security Process Data
    • 6.21 KPI Process
    • 6.22 Knowledge Check
    • 6.23 Analyze Test Output and Generate Report
    • 6.24 Quick Recap
    • 6.25 Knowledge Check
  • Lesson 07: Security Operations
    • 7.01 Introduction
    • 7.02 Introduction to Security Operations
    • 7.03 Understand and Comply with Investigations
    • 7.04 Digital Forensics
    • 7.05 Understand the Digital Evidences
    • 7.06 Knowledge Check
    • 7.07 Conduct Logging and Monitoring Activities
    • 7.08 Knowledge Check
    • 7.09 Continuous Monitoring
    • 7.10 Digital Forensics Tools, Tactics, Procedures, Artifacts, and UEBA
    • 7.11 Knowledge Check
    • 7.12 Perform Configuration Management
    • 7.13 Apply Foundational Security Operation Concepts
    • 7.14 Identity and Access Management with Various Types of Accounts
    • 7.15 Apply Resource Protection
    • 7.16 Controls for Protecting Assets
    • 7.17 Conduct Incident Management
    • 7.18 Understand Incident Response Life Cycle
    • 7.19 Knowledge Check
    • 7.20 Operate and Maintain Detective and Preventive Measures
    • 7.21 Understand Anti-Malware Systems, AI, Machine Learning, and Deep Learning
    • 7.22 Implement and Support Patch and Vulnerability Management
    • 7.23 Understand and Participate in Change Management Processes
    • 7.24 Implement Recovery Strategies
    • 7.25 Types of Recoveries
    • 7.26 Operational Recovery
    • 7.27 Recovery Partner Strategies
    • 7.28 Redundancy and Fault Tolerance
    • 7.29 Knowledge Check
    • 7.30 Implement Disaster Recovery (DR) Processes
    • 7.31 Knowledge Check
    • 7.32 Test Disaster Recovery Plans (DRP)
    • 7.33 Knowledge Check
    • 7.34 Participate in Business Continuity (BC) Planning and Exercises
    • 7.35 Implement and Manage Physical Security
    • 7.36 Importance of Lighting in Security Management
    • 7.37 Access Control
    • 7.38 Knowledge Check
    • 7.39 Address Personnel Safety and Security Concerns
    • 7.40 Quick Recap
    • 7.41 Knowledge Check
  • Lesson 8: Software Development Security
    • 8.01 Introduction
    • 8.02 Introduction to Software Development Security
    • 8.03 Integrate Security in the Software Development Life Cycle
    • 8.04 Software Development Models
    • 8.05 Extreme Programming Model
    • 8.06 DevOps and DevSecOps
    • 8.07 CMM and SAMM
    • 8.08 Change Management and Integrated Product Team (IPT)
    • 8.09 Knowledge Check
    • 8.10 Security Controls in Software Development Ecosystems
    • 8.11 Other Security Controls in Software Development Ecosystems
    • 8.12 Software Configuration Management (SCM)
    • 8.13 Database and Data Warehousing Environments
    • 8.14 Knowledge Check
    • 8.15 Assess the Effectiveness of Software Security
    • 8.16 Software Security and Assurance: Granularity of Controls and Separation of Environments
    • 8.17 Software Security and Assurance: TOC or TOU, Prevention of Social Engineering, Backup, Software Forensics, Cryptography
    • 8.18 Software Security and Assurance: Password Protection, Mobile Mode Controls, and Sandbox
    • 8.19 Software Security and Assurance: Strong Language Support, XML, and SAML
    • 8.20 Assessing the Effectiveness of Software Security
    • 8.21 Knowledge Check
    • 8.22 Assess Security Impact of Acquired Software
    • 8.23 Free and Open Source Software
    • 8.24_Knowledge Check
    • 8.25 Define and Apply Secure Coding Guidelines and Standards
    • 8.26 Web Application Environment
    • 8.27 Knowledge Check
    • 8.28 Quick Recap
    • 8.29 Knowledge Check
  • Lesson - Spotlight Video Two
    • Spotlight Two

What do I need to do to unlock my certificate?

To unlock your certificate, you must complete:

  • Complete 85% of the course.
  • Complete one simulation test with a minimum score of 60%.

FAQs

  • Is CISSP a good Certification Training Course?

    Offered by the prestigious (ISC), the CISSP Course is one of the world's most valued information security certifications. There are over 131,000 CISSP certification holders across the world and most of them earn an average annual salary of USD 131,030. The demand for skilled cyber security professionals is high, and getting CISSP certified can give you a competitive edge among peers.

  • Will CISSP get me a job?

    CISSP certification can be pursued only if you have at least five years of experience in IT security. As such, CISSP will increase your credibility and open your doors to many high-paying cyber security jobs in the market. CISSP meets the strict conditions of the ANSI/ISO/IEC 17024 standard and also approved by the US Department of Defense (DoD) which further increases your employment chances.

  • How do I enrol in this online training?

    You can enrol in this training on our website and make an online payment using any of the following option

    • Visa Credit or Debit Card
    • MasterCard
    • American Express
    • Diners Club
    • PayPal

    Once payment is received, you will automatically receive a payment receipt and access information via email.

Buy Now

Our Most Popular Training Courses

PI3

Angular Certification Training Course

MSRP:
Was:
Now: $824

NextTech eLearning

  • Duration 6 Months
View Course
Everything you need to become a PRINCE2 Practitioner, all in one place.
Course Name Exam Access/Duration Price (Incl Tax)  
Angular Certification Training Course 6 Months
MSRP:
Was:
Now: $824
course info
security

CISA Certification Training Course

MSRP:
Was:
Now: $2,943

NextTech eLearning

  • Duration 3 Months
View Course
Everything you need to become a PRINCE2 Practitioner, all in one place.
Course Name Exam Access/Duration Price (Incl Tax)  
CISA Certification Training Course 3 Months
MSRP:
Was:
Now: $2,943
course info
PI4

Java Certification Training Course

MSRP:
Was:
Now: $941

NextTech eLearning

  • Duration 6 Months
View Course
Everything you need to become a PRINCE2 Practitioner, all in one place.
Course Name Exam Access/Duration Price (Incl Tax)  
Java Certification Training Course 6 Months
MSRP:
Was:
Now: $941
course info
PI1

CBAP® Certification Training Course

MSRP:
Was:
Now: $823

NextTech eLearning

  • Duration 3 Months
View Course
Everything you need to become a PRINCE2 Practitioner, all in one place.
Course Name Exam Access/Duration Price (Incl Tax)  
CBAP® Certification Training Course 3 Months
MSRP:
Was:
Now: $823
course info
PD1

MongoDB Certification Training Course

MSRP:
Was:
Now: $1,238

NextTech eLearning

  • Duration 3 Months
View Course
Everything you need to become a PRINCE2 Practitioner, all in one place.
Course Name Exam Access/Duration Price (Incl Tax)  
MongoDB Certification Training Course 3 Months
MSRP:
Was:
Now: $1,238
course info
NextTech
Address :
Level 9 123 Pitt Street
Sydney - NSW - 2000
1300 263 559

Information

  • Contact Us
  • Blog
  • Sitemap

Brands

  • Microsoft
  • VMware
  • NextTech eLearning
  • SAP
  • AXELOS
  • View All

All Courses

  • Applications
  • Information Technology
  • Process Management
  • Professional Development
  • View All

Sign Up For Newsletter

Get the latest updates on new products and upcoming sales

PRINCE2®, PRINCE2 Agile®, MSP®, P3O®, M_o_R®, MoV®, MoP® and ITIL® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. The Swirl logo™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. CAPM is a registered mark of the Project Management Institute, Inc. PMP is a registered mark of the Project Management Institute, Inc. PMI is a registered mark of the Project Management Institute, Inc. The PMI Registered Education Provider logo is a registered mark of the Project Management Institute, Inc. PMBOK is a registered mark of the Project Management Institute, Inc. PMI Program Management Professional (PgMP)® is a registered mark of Project Management Institute, Inc. PMI Agile Certified Practitioner (PMI-ACP)® is a registered mark of Project Management Institute, Inc.
© 2023 NextTech. Site by Andmine Digital Agency Melbourne Digital Agency Melbourne - AndMine