What is CISSP?
Benefits of CISSP
CISSP Certification Requirements
Confidentiality, integrity and availability
Security governance principles
Legal and regulatory Issues
Business continuity requirements
Policies, standards, procedures, and guidelines
Risk management concepts
Types of Intellectual Property (IP) Law
Introduction to Risk Analysis
Importance of Business Continuity Planning
Aligning security and risk to organizational objectives
Evaluate and apply security governance principles
Implement policies, standards and procedures
Applying risk management concepts
Assessing threats and vulnerabilities
Performing risk analysis and control
Defining qualitative and quantitative analysis
Preserving the business
Adhering to Business Continuity Management Code of Practice and Specifications
Performing a business impact analysis
Data Quality Assurance and Quality Control
Limitation on collection of sensitive data
Media Resource Protection
Standards Selection Critical Security Control
Examining security models and frameworks
The Information Security Triad and multi-level models
Investigating industry standards: ISO 27001/27002
Evaluating security model fundamental concepts
Exploring system and component security concepts
Certification and accreditation criteria and models
Reviewing mobile system/cloud/IoT vulnerabilities
Protecting information by applying cryptography
Detailing symmetric and asymmetric encryption systems
Ensuring message integrity through hashing
Uncovering threats to cryptographic systems
Secure design principles
Controls and countermeasures
Trusted platform module
Mainframes and Other Thin Client Systems
Multilevel Security Models
Information Technology Security Evaluation Criteria
The Internet of Things
DES Operation Modes Electronic Code Book
Cryptography Methods Transposition Ciphe
Content distribution networks
Remote meeting technology
Remote access and VPN
Host-to-Host Layer and Application Layer
Types of IP Addressing
Flavors of LAN transmission methods
IEEE Wireless Standards and Spread-Spectrum Technologies
Physical and logical access
Types of Biometrics
Third-party identity services
Types of Access Control Administration
Unauthorized Disclosure of Information
Identification Authentication and Authorization
Assessment and test strategies
Security control testing
Security testing strategies
Risk Evaluation and Control
Internal and third-party audits
Reasons to Use Synthetic Transactions
Code Review and Testing
Common Software Vulnerabilities
Leveraging the role of testing and auditing to analyze the effectiveness of security controls
Differentiating detection and protection systems
Operational, criminal, civil, and regulatory investigations
Operating and Maintaining Preventive Measures
Logging and Monitoring Activities
Threats to Operations
Security Measurements, Metrics, and Reporting
Forensic Investigation Guidelines
Honeypots and honeynets
Change management processes
Disaster recovery processes
Cloud and Virtual Storage Security Issues
24 Oct, 2020 - 28 Nov, 2020
25 Oct, 2020 - 24 Nov, 2020
28 Oct, 2020 - 12 Nov, 2020
31 Oct, 2020 - 05 Dec, 2020
01 Nov, 2020 - 01 Dec, 2020
04 Nov, 2020 - 19 Nov, 2020
Trusted By Companies Worldwide & 4,10,350+ Learners
Yes, you get two kinds of discounts. They are group discount and referral discount. Group discount is offered when you join as a group, and referral discount is offered when you are referred from someone who has already enrolled in our training.
The trainer will give Server Access to the course seekers, and we make sure you acquire practical hands-on training by providing you with every utility that is needed for your understanding of the course.
The trainer is a certified consultant and has significant amount of experience in working with the technology.
Yes, we accept payments in two installments.
If you are enrolled in classes and/or have paid fees, but want to cancel the registration for certain reason, it can be attained within first 2 sessions of the training. Please make a note that refunds will be processed within 30 days of prior request.
User Reviews on popular courses
I took .NET training from Mindmajix. I must say the course content was highly qualitative and the trainer covered all concepts. Overall it was a good experience with Mindmajix.
Thank You for the sessions that helped me gaining knowledge in Spotfire training. Trainer's experience helped me to get the detailed information regarding the key concepts and challenging tasks in real-time. Thanks once again.
Perfect sessions to know all the key concepts of Spotfire certification training. Thanks to the support team as well. Thanks to Mindmajix.
Servicenow training offered by MindMajix is excellent, and you clear Servicenow certification very easily after attending this training, and also you will get the real time view of the Servicenow.
The ServiceNow Course and trainer knowledge are so excellent and satisfied me. The pdf documents which are provided by the trainer are so helpful.
Mindmajix ServiceNow certification course is the best one, I have attended by far. It covered all the topics exactly what I was hoping for.
This was the first time I opted for training in ServiceNow and I was completely blown away by the training I got from Mindmajix. The training program was very well organized and all the required contents were covered in a proper manner. This training had given me tremendous confidence to secure a job. I really appreciate this training from Mindmajix.