Certified Information Security Manager (CISM) | ISACA
Deep Dive Security Sessions | Real-time Case Studies | Comprehensive CBK Coverage | Certification Exam Readiness Support | Interactive Discussions | Latest Security Branches and Technology Risk Issues
CISSP curriculum covers subject matter in a variety of Information Security topics.[8] The CISSP examination is based on what (ISC)² terms the Common Body of Knowledge (or CBK). According to (ISC)², "the CISSP CBK is a taxonomy – a collection of topics relevant to information security professionals around the world. The CISSP CBK establishes a common framework of information security terms and principles that allow information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession with a common understanding.
Understand and apply concepts of confidentiality, integrity and availability
Evaluate and apply security governance principles
Determine compliance requirements
Understand legal and regulatory issues that pertain to information security in a global context
Understand, adhere to, and promote professional ethics
Develop, document, and implement security policy, standards, procedures and guidelines
Identify, analyze, and prioritize Business Continuity (BC) requirements
Contribute to and enforce personnel security policies and procedures
Understand and apply risk management concepts
Understand and apply threat modeling concepts and methodologies
Apply risk-based management concepts to the supply chain
Establish and maintain a security awareness, education, and training program
Identify and classify information and assets
Determine and maintain information and asset ownership
Protect privacy
Ensure appropriate asset retention
Determine data security controls
Establish information and asset handling requirements
Implement and manage engineering processes using secure design principles
Understand the fundamental concepts of security models
Select controls based upon systems security requirements.
Understand the security capabilities of information systems
Assess and mitigate the vulnerabilities of security architectures, designs and solution elements
Assess and mitigate vulnerabilities in web-based systems
Assess and mitigate vulnerabilities in mobile systems
Assess and mitigate vulnerabilities in embedded devices
Apply cryptography
Apply security principles to site and facility design
Implement site and facility security controls
Implement secure design principles in network architecture
Secure network components
Implement secure communication channels according to design
Control physical and logical access to assets
Manage identification and authentication of people, devices and services
Integrate identity as a third-party service
Implement and manage authorization mechanisms
Manage the identity and access provisioning lifecycle
Design and validate assessment, test and audit strategies
Conduct security control testing
Collect security process data
Analyze test output and generate reports
Conduct or facilitate security audits
Understand and support investigations
Understand the requirements for different types of investigations
Conduct logging and monitoring activities
Securely provision resources
Understand and apply foundational security operations concepts
Apply resource protection techniques
Conduct incident management
Operate and maintain detective and preventative measures
Implement and support patch and vulnerability management
Understand and participate in change management processes
Implement recovery strategies
Implement disaster recovery (DR) processes
Test disaster recovery plans (DRP)
Participate in business continuity (BC) planning and exercises
Implement and manage physical security
Address personnel safety and security concerns
Understand and apply security in the software development lifecycle
Enforce security controls in development environments
Assess the effectiveness of software security
Assess security impact of acquired software
Define and apply secure coding guidelines and standards
Contact Us For More Details
Please fill out the form below to enroll now
Training Calendar
S.No | Course | Hours | Total no of hours | Days | Batch Dates | Start time (IST) | End time (IST) | Batch Status | |
---|---|---|---|---|---|---|---|---|---|
1 | CISA | 4 | 36 | Weekend | Sep 7,8,14,15,21,22,28,29, Oct 5 | 7:00 PM | 11:00 PM | [ Open ] | |
2 | CISM | 4 | 32 | Weekend | Sep 21,22,28,29, Oct 5,6,12,13 | 7:00 PM | 11:00 PM | [ Open ] | |
3 | CEH WORLD | 4 | 32 | Weekend | Sep 7,8,14,21,22,28,29, Oct 5,6,12 | 8:00 PM | 12:00 PM | [ Open ] |
S.No | Course | Hours | Total no of hours | Days | Batch Dates | Start time (IST) | End time (IST) | Batch Status | |
---|---|---|---|---|---|---|---|---|---|
1 | CISA | 4 | 36 | Weekend | Sep 7,8,14,15,21,22,28,29, Oct 5 | 7:00 PM | 11:00 PM | [ Open ] | |
2 | CISM | 4 | 32 | Weekend | Sep 21,22,28,29, Oct 5,6,12,13 | 7:00 PM | 11:00 PM | [ Open ] | |
3 | CEH WORLD | 4 | 32 | Weekend | Sep 7,8,14,21,22,28,29, Oct 5,6,12 | 8:00 PM | 12:00 PM | [ Open ] |