TOIT Training
(909) 252-7584
[email protected]
Search
Log in
Menu
Home
Library
IT Library
Developer Courses
User Cuorses
Plans & Pricing
Features
About Us
Contact Sales
Roadmap
Home
Courses
Cybersecurity
Certified Information Systems Security Professional (CISSP)
Curriculum
8 Sections
62 Lessons
40 Hours
Expand all sections
Collapse all sections
01. Security and Risk Management
12
1.1
Establish and maintain a security awareness, education, and training program
1.2
Apply supply chain risk management (SCRM) concepts
1.3
Understand and apply threat modeling concepts and methodologies
1.4
Understand and apply risk management concepts
1.5
Contribute to and enforce personnel security policies and procedures
1.6
Identify, analyze, assess, prioritize, and implement Business Continuity (BC) requirements
1.7
Develop, document, and implement security policy, standards, procedures, and guidelines
1.8
Understand requirements for investigation types
1.9
Understand legal, regulatory, and compliance issues that pertain to information security in a holistic context
1.10
Evaluate, apply, and sustain security governance principles
1.11
Understand and apply security concepts
1.12
Understand, adhere to, and promote professional ethics
02. Asset Security
6
2.1
Determine data security controls and compliance requirements
2.2
Ensure appropriate asset retention
2.3
Manage data lifecycle
2.4
Identify and classify information and assets
2.5
Establish information and asset handling requirements
2.6
Provision information and assets securely
03. Security Architecture and Engineering
10
3.1
Manage the information system lifecycle
3.2
Design site and facility security controls
3.3
Apply security principles to site and facility design
3.4
Understand methods of cryptanalytic attacks
3.5
Select and determine cryptographic solutions
3.6
Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
3.7
Understand security capabilities of Information Systems
3.8
Select controls based upon systems security requirements
3.9
Understand the fundamental concepts of security models
3.10
Research, implement, and manage engineering processes using secure design principles
04. Communication and Network Security
3
4.1
Implement secure communication channels according to design
4.2
Secure network components
4.3
Apply secure design principles in network architectures
05. Identity and Access Management (IAM)
6
5.1
Implement authentication systems
5.2
Implement and manage authorization mechanisms
5.3
Manage the identity and access provisioning lifecycle
5.4
Control physical and logical access to assets
5.5
Federated identity with a third-party service
5.6
Design identification and authentication strategy
06. Security Assessment and Testing
5
6.1
Conduct or facilitate security audits
6.2
Analyze test output and generate report
6.3
Conduct security controls testing
6.4
Collect security process data
6.5
Design and validate assessment, test, and audit strategies
07. Security Operations
15
7.1
Operate and maintain detection and preventative measures
7.2
Conduct incident management
7.3
Apply resource protection
7.4
Apply foundational security operations concepts
7.5
Perform configuration management (CM)
7.6
Conduct logging and monitoring activities
7.7
Understand and comply with investigations
7.8
Address personnel safety and security concerns
7.9
Implement and manage physical security
7.10
Participate in Business Continuity (BC) planning and exercises
7.11
Test disaster recovery plan (DRP)
7.12
Implement disaster recovery (DR) processes
7.13
Implement recovery strategies
7.14
Understand and participate in change management processes
7.15
Implement and support patch and vulnerability management
08. Software Development Security
5
8.1
Define and apply secure coding guidelines and standards
8.2
Assess the effectiveness of software security
8.3
Assess security impact of acquired software
8.4
Understand and integrate security in the Software Development Life Cycle (SDLC)
8.5
Identify and apply security controls in software development ecosystems
This content is protected, please
login
and
enroll
in the course to view this content!