SlideShare a Scribd company logo
1 of 1
Download to read offline
CISSP® 
Certied Information 
Systems Security Professional 
(ISC)²® is a registered trademark of International Information 
Systems Security Certication Consortium, Inc. 
Duration: 4 Days + 13 Online Hours 
Format: Blended (Classroom + E-learning) 
Description 
Certied Information 
Systems Security 
Professional (CISSP)® 
Prerequisites 
There is no pre-requisite to attend the 
training; however to gain the CISSP® 
Certication, candidates must have either 
of the following: 
A minimum of ve (5) years of cumulative 
paid full-time work experience in two or 
more of the ten domains of (ISC)2 CISSP 
CBK®. 
OR 
Four (4) years of direct full-time work 
experience in two or more of the ten 
domains of (ISC)2 CISSP CBK® with an 
applicable college degree if granted a 
one-year experience waiver with a 
four-year college degree or regional 
equivalent 
OR 
additional credential from the (ISC)² 
approved list. 
Certication 
On successful completion of this course, 
follow steps mentioned below to earn your 
CISSP® : 
1. Obtain the Requisite Experience 
2. Schedule the CBT Exam (Visit 
www.isc2.org/certication-register-now to 
schedule an exam date and pay the fee) 
3. Pass the Exam with a scaled score of 700 
points or greater 
4. Complete the Endorsement Process 
5. Recertication is required every 3 years to 
maintain the certication (either by retaking 
the exam, or through Continued 
Professional Development). 
Please visit (ISC)² CISSP webpage for more 
information. 
The Certied Information Systems Security Professional (CISSP®) is an independent 
information security certication. It is governed by the International Information 
Systems Security Certication Consortium, also known as (ISC)² and is designed to 
ensure that a person handling the computer security for an organization has 
mastered a standardized quantum of knowledge. 
Globally recognized as an objective measure of excellence, the CISSP® certication 
is highly sought after by those looking to enhance their career in Information 
Security. Professionals who work to protect information systems in business, 
government and society should consider the CISSP® certication as their next 
career goal. As technology continually changes, rules get upgraded and new 
threats are identied almost every day, the CISSP® certication needs revalidation 
every three years in order to stay current. 
Our CISSP® training course is an intensive, in-depth training program that explores 
the security theory and management principles at a very high level, and guides 
students through the course materials for the nal CISSP® examination. Our training 
is led by industry professionals with real world experience, who are experts in their 
eld. Students can lay a strong conceptual foundation in security techniques, as 
well as hone their knowledge and skills to obtain the CISSP® certication. 
Course Structure 
The course covers the following key areas of knowledge: 
Introduction to Access Control 
Application and Database Security 
Software Development Security 
Business Continuity  Disaster Recovery Planning 
Cryptography 
Information Security Governance  Risk Management 
Legal, Regulations, Investigations, and Compliance 
Operations Security 
Physical and Environmental Security 
Security Architecture and Design 
Telecommunications and Network Security 
Benets 
From the course: 
• Gain a working knowledge of information security 
• Validate your commitment to the profession 
• Give yourself a career dierentiator, with greater credibility and marketability 
• Increase your earning potential- you can earn a worldwide average of nearly 
30% more than your non-certied counterparts (data according to the Global 
Information Security Workforce Study) 
• Full government and organization requirements for information security 
certication mandates 
• Lend increased credibility to your organization when working with vendors and 
contractors 
• Refresh your knowledge every three years through mandatory recertication 
From the workshop: 
• High quality training from an industry expert 
• Earn 45 PDUs (upon completion of 32 hours classroom training + 13 hours online 
training) 
• Hard copy of the courseware 
• 4 full-length mock exams 
• End to end support via phone, mail and chat 
• Invitations for KnowledgeHut PM Insight Lecture Series and a chance to earn 
PDUs 
To know more about the next available workshop in your country, please visit this 
link: http://www.knowledgehut.com/events 
Who Can Attend 
This training and certication is ideal for 
• IT consultants  managers 
• Security policy writers 
• Privacy  Information security officers 
• Network  Security device 
administrators 
• Security engineers and other security 
professionals whose positions require 
CISSP® certication 
www.knowledgehut.com support@knowledgehut.com

More Related Content

Similar to Certified Information Systems Security Professional (CISSP) brochure

SSCP Certification Training in Dallas & Arlington, TX
SSCP Certification Training in Dallas & Arlington, TXSSCP Certification Training in Dallas & Arlington, TX
SSCP Certification Training in Dallas & Arlington, TXCCI Training Center
 
Certified Information System Auditor- CISA
Certified Information System Auditor- CISACertified Information System Auditor- CISA
Certified Information System Auditor- CISAKnowledgehut
 
Top Cybersecurity Certs
Top Cybersecurity CertsTop Cybersecurity Certs
Top Cybersecurity CertsRiya Kapoor
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 
CISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdfCISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdfInfosec Train
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOSagarNegi10
 
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomCRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomBharathi Grover
 
CISSP with Net Security Training
CISSP with Net Security Training CISSP with Net Security Training
CISSP with Net Security Training Drew Kahrs
 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeMercury Solutions Limited
 
CISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxCISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxInfosectrain3
 
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDITCertifications on Security - IS AUDIT
Certifications on Security - IS AUDITShahzeb Pirzada
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 

Similar to Certified Information Systems Security Professional (CISSP) brochure (20)

SSCP Certification Training in Dallas & Arlington, TX
SSCP Certification Training in Dallas & Arlington, TXSSCP Certification Training in Dallas & Arlington, TX
SSCP Certification Training in Dallas & Arlington, TX
 
Certified Information System Auditor- CISA
Certified Information System Auditor- CISACertified Information System Auditor- CISA
Certified Information System Auditor- CISA
 
Top Cybersecurity Certs
Top Cybersecurity CertsTop Cybersecurity Certs
Top Cybersecurity Certs
 
cissp.pdf
cissp.pdfcissp.pdf
cissp.pdf
 
Cissp why
Cissp whyCissp why
Cissp why
 
Value of IT Certifications (BDPA Cincinnati)
Value of IT Certifications (BDPA Cincinnati)Value of IT Certifications (BDPA Cincinnati)
Value of IT Certifications (BDPA Cincinnati)
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
Cisco cyber scholarship program
Cisco cyber scholarship programCisco cyber scholarship program
Cisco cyber scholarship program
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
CISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdfCISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdf
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomCRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
 
SECO-Institute
SECO-InstituteSECO-Institute
SECO-Institute
 
NSA_CNSS
NSA_CNSSNSA_CNSS
NSA_CNSS
 
CISSP with Net Security Training
CISSP with Net Security Training CISSP with Net Security Training
CISSP with Net Security Training
 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First Time
 
CISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxCISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptx
 
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDITCertifications on Security - IS AUDIT
Certifications on Security - IS AUDIT
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
9891031_certificate
9891031_certificate9891031_certificate
9891031_certificate
 

More from Knowledgehut

Prince2 certification-india(foundation+practitioner)
Prince2 certification-india(foundation+practitioner)Prince2 certification-india(foundation+practitioner)
Prince2 certification-india(foundation+practitioner)Knowledgehut
 
Prince2 foundation-certification
Prince2 foundation-certificationPrince2 foundation-certification
Prince2 foundation-certificationKnowledgehut
 
Python in-the-enterprise-brochure
Python in-the-enterprise-brochurePython in-the-enterprise-brochure
Python in-the-enterprise-brochureKnowledgehut
 
Web frameworks in python
Web frameworks in pythonWeb frameworks in python
Web frameworks in pythonKnowledgehut
 
Finance for non finance managers
Finance for non finance managersFinance for non finance managers
Finance for non finance managersKnowledgehut
 
Ifpug fpa and snap
Ifpug fpa and snapIfpug fpa and snap
Ifpug fpa and snapKnowledgehut
 
Certied Associate of Software Quality
Certied Associate of Software QualityCertied Associate of Software Quality
Certied Associate of Software QualityKnowledgehut
 
Six sigma black belt brochure
Six sigma black belt brochureSix sigma black belt brochure
Six sigma black belt brochureKnowledgehut
 
Six sigma yellow belt brochure
Six sigma yellow belt brochureSix sigma yellow belt brochure
Six sigma yellow belt brochureKnowledgehut
 
PMI ACP - Certification
PMI ACP - CertificationPMI ACP - Certification
PMI ACP - CertificationKnowledgehut
 
PMP Certification Brochure
PMP Certification BrochurePMP Certification Brochure
PMP Certification BrochureKnowledgehut
 
SAFe agilist_brochure
SAFe agilist_brochureSAFe agilist_brochure
SAFe agilist_brochureKnowledgehut
 
Big data analytics_using_hadoop
Big data analytics_using_hadoopBig data analytics_using_hadoop
Big data analytics_using_hadoopKnowledgehut
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical HackerKnowledgehut
 
PgMP programme-management-professional
PgMP programme-management-professionalPgMP programme-management-professional
PgMP programme-management-professionalKnowledgehut
 

More from Knowledgehut (20)

edCeh brochure
edCeh brochureedCeh brochure
edCeh brochure
 
Capm brochure
Capm brochureCapm brochure
Capm brochure
 
Prince2 certification-india(foundation+practitioner)
Prince2 certification-india(foundation+practitioner)Prince2 certification-india(foundation+practitioner)
Prince2 certification-india(foundation+practitioner)
 
Prince2 foundation-certification
Prince2 foundation-certificationPrince2 foundation-certification
Prince2 foundation-certification
 
Python 101
Python 101Python 101
Python 101
 
Python in-the-enterprise-brochure
Python in-the-enterprise-brochurePython in-the-enterprise-brochure
Python in-the-enterprise-brochure
 
Web frameworks in python
Web frameworks in pythonWeb frameworks in python
Web frameworks in python
 
PCI DSS brochure
PCI DSS brochurePCI DSS brochure
PCI DSS brochure
 
Cobit5 brochure
Cobit5 brochureCobit5 brochure
Cobit5 brochure
 
Finance for non finance managers
Finance for non finance managersFinance for non finance managers
Finance for non finance managers
 
Ifpug fpa and snap
Ifpug fpa and snapIfpug fpa and snap
Ifpug fpa and snap
 
Certied Associate of Software Quality
Certied Associate of Software QualityCertied Associate of Software Quality
Certied Associate of Software Quality
 
Six sigma black belt brochure
Six sigma black belt brochureSix sigma black belt brochure
Six sigma black belt brochure
 
Six sigma yellow belt brochure
Six sigma yellow belt brochureSix sigma yellow belt brochure
Six sigma yellow belt brochure
 
PMI ACP - Certification
PMI ACP - CertificationPMI ACP - Certification
PMI ACP - Certification
 
PMP Certification Brochure
PMP Certification BrochurePMP Certification Brochure
PMP Certification Brochure
 
SAFe agilist_brochure
SAFe agilist_brochureSAFe agilist_brochure
SAFe agilist_brochure
 
Big data analytics_using_hadoop
Big data analytics_using_hadoopBig data analytics_using_hadoop
Big data analytics_using_hadoop
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical Hacker
 
PgMP programme-management-professional
PgMP programme-management-professionalPgMP programme-management-professional
PgMP programme-management-professional
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 

Recently uploaded (20)

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

Certified Information Systems Security Professional (CISSP) brochure

  • 1. CISSP® Certied Information Systems Security Professional (ISC)²® is a registered trademark of International Information Systems Security Certication Consortium, Inc. Duration: 4 Days + 13 Online Hours Format: Blended (Classroom + E-learning) Description Certied Information Systems Security Professional (CISSP)® Prerequisites There is no pre-requisite to attend the training; however to gain the CISSP® Certication, candidates must have either of the following: A minimum of ve (5) years of cumulative paid full-time work experience in two or more of the ten domains of (ISC)2 CISSP CBK®. OR Four (4) years of direct full-time work experience in two or more of the ten domains of (ISC)2 CISSP CBK® with an applicable college degree if granted a one-year experience waiver with a four-year college degree or regional equivalent OR additional credential from the (ISC)² approved list. Certication On successful completion of this course, follow steps mentioned below to earn your CISSP® : 1. Obtain the Requisite Experience 2. Schedule the CBT Exam (Visit www.isc2.org/certication-register-now to schedule an exam date and pay the fee) 3. Pass the Exam with a scaled score of 700 points or greater 4. Complete the Endorsement Process 5. Recertication is required every 3 years to maintain the certication (either by retaking the exam, or through Continued Professional Development). Please visit (ISC)² CISSP webpage for more information. The Certied Information Systems Security Professional (CISSP®) is an independent information security certication. It is governed by the International Information Systems Security Certication Consortium, also known as (ISC)² and is designed to ensure that a person handling the computer security for an organization has mastered a standardized quantum of knowledge. Globally recognized as an objective measure of excellence, the CISSP® certication is highly sought after by those looking to enhance their career in Information Security. Professionals who work to protect information systems in business, government and society should consider the CISSP® certication as their next career goal. As technology continually changes, rules get upgraded and new threats are identied almost every day, the CISSP® certication needs revalidation every three years in order to stay current. Our CISSP® training course is an intensive, in-depth training program that explores the security theory and management principles at a very high level, and guides students through the course materials for the nal CISSP® examination. Our training is led by industry professionals with real world experience, who are experts in their eld. Students can lay a strong conceptual foundation in security techniques, as well as hone their knowledge and skills to obtain the CISSP® certication. Course Structure The course covers the following key areas of knowledge: Introduction to Access Control Application and Database Security Software Development Security Business Continuity Disaster Recovery Planning Cryptography Information Security Governance Risk Management Legal, Regulations, Investigations, and Compliance Operations Security Physical and Environmental Security Security Architecture and Design Telecommunications and Network Security Benets From the course: • Gain a working knowledge of information security • Validate your commitment to the profession • Give yourself a career dierentiator, with greater credibility and marketability • Increase your earning potential- you can earn a worldwide average of nearly 30% more than your non-certied counterparts (data according to the Global Information Security Workforce Study) • Full government and organization requirements for information security certication mandates • Lend increased credibility to your organization when working with vendors and contractors • Refresh your knowledge every three years through mandatory recertication From the workshop: • High quality training from an industry expert • Earn 45 PDUs (upon completion of 32 hours classroom training + 13 hours online training) • Hard copy of the courseware • 4 full-length mock exams • End to end support via phone, mail and chat • Invitations for KnowledgeHut PM Insight Lecture Series and a chance to earn PDUs To know more about the next available workshop in your country, please visit this link: http://www.knowledgehut.com/events Who Can Attend This training and certication is ideal for • IT consultants managers • Security policy writers • Privacy Information security officers • Network Security device administrators • Security engineers and other security professionals whose positions require CISSP® certication www.knowledgehut.com support@knowledgehut.com