TOIT Training
(909) 252-7584
[email protected]
Search
Log in
Menu
Home
Library
IT Library
Developer Courses
User Cuorses
Plans & Pricing
Features
About Us
Contact Sales
Roadmap
Home
Courses
ISC2
Certified Information Systems Security Professional (CISSP)
Curriculum
8 Sections
62 Lessons
40 Hours
Expand all sections
Collapse all sections
01. Security and Risk Management
12
1.1
Establish and maintain a security awareness, education, and training program
1.2
Apply supply chain risk management (SCRM) concepts
1.3
Understand and apply threat modeling concepts and methodologies
1.4
Contribute to and enforce personnel security policies and procedures
1.5
Understand and apply risk management concepts
1.6
Identify, analyze, assess, prioritize, and implement Business Continuity (BC) requirements
1.7
Develop, document, and implement security policy, standards, procedures, and guidelines
1.8
Understand legal, regulatory, and compliance issues that pertain to information security in a holistic context
1.9
Evaluate, apply, and sustain security governance principles
1.10
Understand requirements for investigation types
1.11
Understand and apply security concepts
1.12
Understand, adhere to, and promote professional ethics
02. Asset Security
6
2.1
Ensure appropriate asset retention
2.2
Determine data security controls and compliance requirements
2.3
Provision information and assets securely
2.4
Manage data lifecycle
2.5
Establish information and asset handling requirements
2.6
Identify and classify information and assets
03. Security Architecture and Engineering
10
3.1
Manage the information system lifecycle
3.2
Design site and facility security controls
3.3
Apply security principles to site and facility design
3.4
Understand methods of cryptanalytic attacks
3.5
Select and determine cryptographic solutions
3.6
Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
3.7
Understand security capabilities of Information Systems
3.8
Select controls based upon systems security requirements
3.9
Understand the fundamental concepts of security models
3.10
Research, implement, and manage engineering processes using secure design principles
04. Communication and Network Security
3
4.1
Implement secure communication channels according to design
4.2
Secure network components
4.3
Apply secure design principles in network architectures
05. Identity and Access Management (IAM)
6
5.1
Implement authentication systems
5.2
Implement and manage authorization mechanisms
5.3
Federated identity with a third-party service
5.4
Manage the identity and access provisioning lifecycle
5.5
Design identification and authentication strategy
5.6
Control physical and logical access to assets
06. Security Assessment and Testing
5
6.1
Analyze test output and generate report
6.2
Conduct or facilitate security audits
6.3
Collect security process data
6.4
Conduct security controls testing
6.5
Design and validate assessment, test, and audit strategies
07. Security Operations
15
7.1
Address personnel safety and security concerns
7.2
Implement and manage physical security
7.3
Participate in Business Continuity (BC) planning and exercises
7.4
Test disaster recovery plan (DRP)
7.5
Implement disaster recovery (DR) processes
7.6
Implement recovery strategies
7.7
Understand and participate in change management processes
7.8
Implement and support patch and vulnerability management
7.9
Operate and maintain detection and preventative measures
7.10
Conduct incident management
7.11
Apply resource protection
7.12
Apply foundational security operations concepts
7.13
Perform configuration management (CM)
7.14
Conduct logging and monitoring activities
7.15
Understand and comply with investigations
08. Software Development Security
5
8.1
Assess security impact of acquired software
8.2
Assess the effectiveness of software security
8.3
Define and apply secure coding guidelines and standards
8.4
Identify and apply security controls in software development ecosystems
8.5
Understand and integrate security in the Software Development Life Cycle (SDLC)
This content is protected, please
login
and
enroll
in the course to view this content!