SlideShare a Scribd company logo
1 of 86
What’s in it for you?
1. Why CISSP?
2. What is CISSP?
3. Exam Requirements
4. CISSP Exam
5. CISSP Domains
Why CISSP?
Click here to watch the video
Why CISSP?
Cyber Security has various certifications like CCNA, CompTIA, CISM, CISA, CEH.
In addition to these, the most in-demand certification is the CISSP (Certified
Information System Security Professional)
Why CISSP?
The demand for CISSP certified professionals has grown rapidly, when compared to the
other cyber security professionals. There are nearly 50,000 job postings for the same
Source: INFOSEC
What is CISSP?
What is CISSP?
Certified Information Systems Security Professional (CISSP) certification is an
advanced level cyber security certification; it trains a candidate to become an
information assurance professional. This is one of the toughest cyber security
certifications.
What is CISSP?
A candidate with a CISSP certification will be able to define the design, architecture,
controls, and management of highly secure business environments
Exam Requirements
Exam Requirements
To be eligible for the CISSP certification, a candidate must have at least 5 years of work
experience in the field of the information security domain. Before taking up this
certification, it is suggested that the candidate clears other certifications like CCNA,
CompTIA Security+, CEH, CISM, CISA, and so on.
The CISSP Certification is suitable for professionals working in the following fields:
• Security Consultants and Managers
• Network and Security Architects
• IT Directors
• Security Auditors
• Chief Information Security officers
Exam Requirements
CISSP Exam
CISSP Exam
The CISSP Certification is developed by the International Information Systems Security
Certification Consortium (ISC)2.
CISSP Exam
The CISSP Certification is developed by the International Information Systems Security
Certification Consortium (ISC)2.
Certificate Provider
CISSP Exam
The CISSP Certification is developed by the International Information Systems Security
Certification Consortium (ISC)2.
Certificate Provider
Exam Fees
$699
CISSP Exam
The CISSP Certification is developed by the International Information Systems Security
Certification Consortium (ISC)2.
No. of questions in the
exam and duration
• 250 Questions in 6 Hours
• Type of questions:
Multiple choice
CISSP Exam
The CISSP Certification is developed by the International Information Systems Security
Certification Consortium (ISC)2.
Pass Mark
No. of questions in the
exam and duration
• 250 Questions in 6 Hours
• Type of questions:
Multiple choice
700 out of 1000
CISSP Domains
CISSP Domains
The CISSP Certification has a total of 8 domains:
Security and Risk
Management Asset Security
Security Engineering
Communications and
Network Security
Identity and Access
Management
Security Assessment and
Testing
Security Operations
Software
Development Security
Security and Risk
Management
CISSP Exam
This domain mainly consists of the fundamentals of security policies, compliance law
and regulations, professional ethics, risk management, and threat modeling
1. Security and Risk Management
CISSP Exam
Under security policies, Information Security and Cyber Security play a vital role
Information Security
Processes and tools deployed to
protect sensitive information
Cyber Security
Set of techniques used to protect the
integrity of networks
1. Security and Risk Management
CISSP Exam
The following approaches are adopted to implement cyber security
Security measures are
decided based on
regulations
Here, security measures
are based on no specific
criteria
Security measures are
based on unique risks in
an organization
Compliance - based Ad - hoc Risk - based
1. Security and Risk Management
CISSP Exam
To protect the information within a company Confidentiality, Integrity, and Availability (CIA)
security model is designed
CIA triad
Confidentiality
Integrity
Availability
1. Security and Risk Management
CISSP Exam1. Security and Risk Management
The GRC trilogy is a structured approach adopted by organizations to align IT objectives
with business objectives
Risk Management ComplianceGovernance
CISSP Exam1. Security and Risk Management
The GRC trilogy is a structured approach adopted by organizations to align IT objectives
with business objectives
Governance is taken care of by the senior professionals of an
organization. Such a program has goals like ensuring goals are
achieved, providing strategic plans, and so on
Governance Risk Management Compliance
CISSP Exam
The GRC trilogy is a structured approach adopted by organizations to align IT objectives
with business objectives
In risk management, the organizations look into mitigating all types of
risks such as investment, physical, and cyber risks
1. Security and Risk Management
Governance Risk Management Compliance
CISSP Exam
The GRC trilogy is a structured approach adopted by organizations to align IT objectives
with business objectives
Risk Management Compliance
Compliance refers to abiding by the defined laws and regulations
1. Security and Risk Management
Governance
CISSP Exam
The GRC trilogy is a structured approach adopted by organizations to align IT objectives
with business objectives
Risk Management Compliance
Compliance refers to abiding by the defined laws and regulations
1. Security and Risk Management
Governance
Did you know that the senior management of an organization
develops a security policy that is implemented to achieve the
organization’s goals?
CISSP Exam
The GRC trilogy is a structured approach adopted by organizations to align IT objectives
with business objectives
Risk Management Compliance
Compliance refers to abiding by the defined laws and regulations
1. Security and Risk Management
Governance
Let’s have a look at the characteristics of these security
policies
CISSP Exam1. Security and Risk Management
They should support the vision
and mission
CISSP Exam1. Security and Risk Management
They should support the vision
and mission
All the business units should be
integrated
CISSP Exam1. Security and Risk Management
They should be updated
regularly
They should support the vision
and mission
All the business units should be
integrated
CISSP Exam1. Security and Risk Management
Security policies should be
easy to understand
They should be updated
regularly
They should support the vision
and mission
All the business units should be
integrated
1. Security and Risk Management
A risk analysis team is formed in an organization to perform the analysis of each known
risk. The steps to perform risk analysis is as shown below:
1. Security and Risk Management
A risk analysis team is formed in an organization to perform the analysis of each known
risk. The steps to perform risk analysis is as shown below:
Assessment of the value
of the company’s assets
Analyzing risks to
assets
Identify
countermeasures to
mitigate the risks
2 31
1. Security and Risk Management
A risk analysis team is formed in an organization to perform the analysis of each known
risk. The steps to perform risk analysis is as shown below:
1 2 3
Assessment of the value
of the company’s assets
Analyzing risks to
assets
Identify
countermeasures to
mitigate the risks
1. Security and Risk Management
A risk analysis team is formed in an organization to perform the analysis of each known
risk. The steps to perform risk analysis is as shown below:
1 2 3
Assessment of the value
of the company’s assets
Analyzing risks to
assets
Identify
countermeasures to
mitigate the risks
1. Security and Risk Management
A risk analysis team is formed in an organization to perform the analysis of each known
risk. The steps to perform risk analysis is as shown below:
1 2 3
Assessment of the value
of the company’s assets
Analyzing risks to
assets
Identify
countermeasures to
mitigate the risks
Asset Security
CISSP Exam2. Asset Security
1. Data Classification
2. Data Management
3. Data Remanence
4. Data Loss Prevention
Asset Security is the second domain of the CISSP. It deals with the collection and protection
of information. These are the steps we will be looking into
CISSP Exam2. Asset Security
Data is classified by the data owner
1. Data Classification
CISSP Exam2. Asset Security
The classification of data is done based on certain set criteria’s
1. Data Classification
CISSP Exam2. Asset Security
Data classification is annually reviewed
1. Data Classification
CISSP Exam2. Asset Security
2. Data Management
In data management the information lifecycle is managed
CISSP Exam2. Asset Security
2. Data Management
Data management ensures that the data complies to the standards
CISSP Exam2. Asset Security
2. Data Management
Data management also ensures data validity and integrity
CISSP Exam2. Asset Security
3. Data Remanence
Data Remanence is defined as the remains of the digital data that is
present even after erasing the data
CISSP Exam2. Asset Security
3. Data Remanence
Security professionals should be well versed with techniques to avoid
Data Remanence
CISSP Exam2. Asset Security
To prevent data loss, a set of measures is adopted to ensure that
information is only available to authorized users
4. Data Loss Prevention
Security Engineering
CISSP Exam3. Security Engineering
This domain talks about security architecture, security models, cryptography, and physical
security
Security Architecture Cryptography
CISSP Exam3. Security Engineering
This domain talks about security architecture, security models, cryptography, and physical
security
Security Architecture Cryptography
Takes the help of TCB (Trusted computing base), Security Perimeter, and
Reference models to implement security
CISSP Exam3. Security Engineering
Security Architecture Cryptography
Information is secured by converting data from a readable format to a
non-readable format and vice versa
This domain talks about security architecture, security models, cryptography, and physical
security
Communications and
Network Security
CISSP Exam4. Communications and Network Security
This domain consists of network structures, countermeasures, transmission methods, and
security measures used to achieve CIA
CISSP Exam4. Communications and Network Security
This domain consists of network structures, countermeasures, transmission methods, and
security measures used to achieve CIA
OSI Model
Open Systems Interconnection model describes how data is
transferred from one computer to another
CISSP Exam4. Communications and Network Security
This domain consists of network structures, countermeasures, transmission methods, and
security measures used to achieve CIA
Firewall is a hardware or software which blocks the incoming or
outgoing traffic from the internet to your computer
FirewallOSI Model
CISSP Exam4. Communications and Network Security
This domain consists of network structures, countermeasures, transmission methods, and
security measures used to achieve CIA
IDS is designed to detect unauthorized access to a system. It is used
together with a firewall and a router
Firewall Intrusion Detection SystemOSI Model
Identity and Access
Management
CISSP Exam5. Identity and Access Management
Identity and Access Management talks about the access control, identification,
authorization, and attacks on access control and its countermeasures.
CISSP Exam5. Identity and Access Management
Identity and Access Management talks about the access control, identification,
authorization, and attacks on access control and its countermeasures.
Let’s have a look at the following topics:
1. Identity Management
2. Kerberos
3. Access Criteria
CISSP Exam5. Identity and Access Management
Identity and Access Management talks about the access control, identification,
authorization, and attacks on access control and its countermeasures.
Identity Management is used to establish
identities to identify and authenticate users
through automated means
1
CISSP Exam5. Identity and Access Management
Identity and Access Management talks about the access control, identification,
authorization, and attacks on access control and its countermeasures.
Kerberos, an authentication protocol that is
based on symmetric-key cryptography,
provides end to end security
2
CISSP Exam5. Identity and Access Management
Identity and Access Management talks about the access control, identification,
authorization, and attacks on access control and its countermeasures.
Access privileges should be granted based
on the level of trust and the job role in the
organization. For safety reasons, it should
also be provided based on the location and
the time
3
Security Assessment and
Testing
CISSP Exam6. Security Assessment and Testing
This domain looks into audits, security control assessment, and testing reports
CISSP Exam6. Security Assessment and Testing
An audit is a repeated process wherein an independent professional
evaluates and analyzes evidence
This domain looks into audits, security control assessment, and testing reports
CISSP Exam6. Security Assessment and Testing
Vulnerability assessment is the process by which IT risks are identified
and evaluated
This domain looks into audits, security control assessment, and testing reports
CISSP Exam6. Security Assessment and Testing
Testing is performed to check the data flow between the application
and the system
This domain looks into audits, security control assessment, and testing reports
Security Operations
CISSP Exam7. Security Operations
This domain includes investigations, monitoring and logging, disaster recovery, and change
management
CISSP Exam7. Security Operations
This domain includes investigations, monitoring and logging, disaster recovery, and change
management
The topics in this domain are:
1. Digital Forensics
2. Incident Management
3. Perimeter Security
CISSP Exam7. Security Operations
This domain includes investigations, monitoring and logging, disaster recovery, and change
management
Here, digital data is examined to identify,
recover, and analyze opinions about digital
information
1
Digital Forensics
CISSP Exam7. Security Operations
This domain includes investigations, monitoring and logging, disaster recovery, and change
management
Incident Management works to restore the
services to normal as soon as possible. A
team called the incident response team is
deployed to handle such emergencies
2
Incident Management
CISSP Exam7. Security Operations
This domain includes investigations, monitoring and logging, disaster recovery, and change
management
3
Perimeter Security
Perimeter defense allows us to detect and
keep a check on unauthorized physical
access. Access to the facility is controlled
Software Development
Security
CISSP Exam8. Software Development Security
This domain talks about security in a software development lifecycle.
CISSP Exam
Application Program Interface
• It is a collection of protocols and
functions used to create applications.
• API supports formats such as
Representational State Transfer (REST)
and Simple Object Access Protocol
(SOAP)
8. Software Development Security
CISSP Exam
Security Threats and Attacks - Malware
• Malware refers to malicious software,
viruses, ransomware, and worms.
• Trojan virus is also a form of malware
that disguises itself as a legitimate
software
8. Software Development Security
CISSP Exam
Security Threats and Attacks - Spyware
It is a type of malware which is used to
secretly gather information of the victim to
give it to a third party
8. Software Development Security
CISSP Exam
Security Threats and Attacks - Adware
As the name suggests, this is a type of
malware that constantly displays ads and
pop-ups. Some of such ads can also gather
your information
8. Software Development Security
CISSP Exam
Security Threats and Attacks - Social Engineering Attacks
It is the art of manipulating people so that
they end up giving their confidential
information. It is broken down into Phishing,
Spear Phishing, and Whaling Phishing
Attack.
8. Software Development Security
CISSP Exam
Security Threats and Attacks - SQL Injection Attack
In a database driven website, the hacker
manipulates a standard SQL query.
Malicious code is inserted into a SQL server
to obtain information
8. Software Development Security
CISSP Tutorial | CISSP Tutorial For Beginners | CISSP Certification | CISSP Training | Simplilearn

More Related Content

More from Simplilearn

Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...
Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...
Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...
Simplilearn
 
How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...
How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...
How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...
Simplilearn
 
Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...
Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...
Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...
Simplilearn
 
Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...
Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...
Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...
Simplilearn
 
Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...
Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...
Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...
Simplilearn
 
React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...
React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...
React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...
Simplilearn
 
What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...
What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...
What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...
Simplilearn
 
How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...
How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...
How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...
Simplilearn
 
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
Simplilearn
 
Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...
Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...
Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...
Simplilearn
 
How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...
How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...
How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...
Simplilearn
 
How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...
How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...
How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...
Simplilearn
 
Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...
Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...
Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...
Simplilearn
 
Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...
Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...
Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...
Simplilearn
 
YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...
YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...
YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...
Simplilearn
 
Instagram Ads.pptx
Instagram Ads.pptxInstagram Ads.pptx
Instagram Ads.pptx
Simplilearn
 
Introduction to MATLAB in 8 Minutes
Introduction to MATLAB in 8 Minutes Introduction to MATLAB in 8 Minutes
Introduction to MATLAB in 8 Minutes
Simplilearn
 
MATLAB Tutorial For Beginners 2023
MATLAB Tutorial For Beginners 2023MATLAB Tutorial For Beginners 2023
MATLAB Tutorial For Beginners 2023
Simplilearn
 
How to Install MATLAB Software in Laptop ?
How to Install MATLAB Software in Laptop ?How to Install MATLAB Software in Laptop ?
How to Install MATLAB Software in Laptop ?
Simplilearn
 
Chat GPT for Content Creation
Chat GPT for Content CreationChat GPT for Content Creation
Chat GPT for Content Creation
Simplilearn
 

More from Simplilearn (20)

Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...
Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...
Backpropagation in Neural Networks | Back Propagation Algorithm with Examples...
 
How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...
How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...
How to Become a Business Analyst ?| Roadmap to Become Business Analyst | Simp...
 
Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...
Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...
Career Opportunities In Artificial Intelligence 2023 | AI Job Opportunities |...
 
Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...
Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...
Programming for Beginners | How to Start Coding in 2023? | Introduction to Pr...
 
Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...
Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...
Best IDE for Programming in 2023 | Top 8 Programming IDE You Should Know | Si...
 
React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...
React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...
React 18 Overview | React 18 New Features and Changes | React 18 Tutorial 202...
 
What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...
What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...
What Is Next JS ? | Introduction to Next JS | Basics of Next JS | Next JS Tut...
 
How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...
How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...
How To Become an SEO Expert In 2023 | SEO Expert Tutorial | SEO For Beginners...
 
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
WordPress Tutorial for Beginners 2023 | What Is WordPress and How Does It Wor...
 
Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...
Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...
Blogging For Beginners 2023 | How To Create A Blog | Blogging Tutorial | Simp...
 
How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...
How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...
How To Start A Blog In 2023 | Pros And Cons Of Blogging | Blogging Tutorial |...
 
How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...
How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...
How to Increase Website Traffic ? | 10 Ways To Increase Website Traffic in 20...
 
Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...
Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...
Google Keyword Planner Tutorial For 2023 | How to Use Google Keyword Planner?...
 
Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...
Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...
Content Writing Tutorial for Beginners | What Is Content Writing | Content Wr...
 
YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...
YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...
YouTube SEO 2023 | How to Rank YouTube Videos ? | YouTube SEO Tutorial | Simp...
 
Instagram Ads.pptx
Instagram Ads.pptxInstagram Ads.pptx
Instagram Ads.pptx
 
Introduction to MATLAB in 8 Minutes
Introduction to MATLAB in 8 Minutes Introduction to MATLAB in 8 Minutes
Introduction to MATLAB in 8 Minutes
 
MATLAB Tutorial For Beginners 2023
MATLAB Tutorial For Beginners 2023MATLAB Tutorial For Beginners 2023
MATLAB Tutorial For Beginners 2023
 
How to Install MATLAB Software in Laptop ?
How to Install MATLAB Software in Laptop ?How to Install MATLAB Software in Laptop ?
How to Install MATLAB Software in Laptop ?
 
Chat GPT for Content Creation
Chat GPT for Content CreationChat GPT for Content Creation
Chat GPT for Content Creation
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

CISSP Tutorial | CISSP Tutorial For Beginners | CISSP Certification | CISSP Training | Simplilearn

  • 1.
  • 2. What’s in it for you? 1. Why CISSP? 2. What is CISSP? 3. Exam Requirements 4. CISSP Exam 5. CISSP Domains
  • 4. Click here to watch the video
  • 5. Why CISSP? Cyber Security has various certifications like CCNA, CompTIA, CISM, CISA, CEH. In addition to these, the most in-demand certification is the CISSP (Certified Information System Security Professional)
  • 6. Why CISSP? The demand for CISSP certified professionals has grown rapidly, when compared to the other cyber security professionals. There are nearly 50,000 job postings for the same Source: INFOSEC
  • 8. What is CISSP? Certified Information Systems Security Professional (CISSP) certification is an advanced level cyber security certification; it trains a candidate to become an information assurance professional. This is one of the toughest cyber security certifications.
  • 9. What is CISSP? A candidate with a CISSP certification will be able to define the design, architecture, controls, and management of highly secure business environments
  • 11. Exam Requirements To be eligible for the CISSP certification, a candidate must have at least 5 years of work experience in the field of the information security domain. Before taking up this certification, it is suggested that the candidate clears other certifications like CCNA, CompTIA Security+, CEH, CISM, CISA, and so on.
  • 12. The CISSP Certification is suitable for professionals working in the following fields: • Security Consultants and Managers • Network and Security Architects • IT Directors • Security Auditors • Chief Information Security officers Exam Requirements
  • 14. CISSP Exam The CISSP Certification is developed by the International Information Systems Security Certification Consortium (ISC)2.
  • 15. CISSP Exam The CISSP Certification is developed by the International Information Systems Security Certification Consortium (ISC)2. Certificate Provider
  • 16. CISSP Exam The CISSP Certification is developed by the International Information Systems Security Certification Consortium (ISC)2. Certificate Provider Exam Fees $699
  • 17. CISSP Exam The CISSP Certification is developed by the International Information Systems Security Certification Consortium (ISC)2. No. of questions in the exam and duration • 250 Questions in 6 Hours • Type of questions: Multiple choice
  • 18. CISSP Exam The CISSP Certification is developed by the International Information Systems Security Certification Consortium (ISC)2. Pass Mark No. of questions in the exam and duration • 250 Questions in 6 Hours • Type of questions: Multiple choice 700 out of 1000
  • 20. CISSP Domains The CISSP Certification has a total of 8 domains: Security and Risk Management Asset Security Security Engineering Communications and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security
  • 22. CISSP Exam This domain mainly consists of the fundamentals of security policies, compliance law and regulations, professional ethics, risk management, and threat modeling 1. Security and Risk Management
  • 23. CISSP Exam Under security policies, Information Security and Cyber Security play a vital role Information Security Processes and tools deployed to protect sensitive information Cyber Security Set of techniques used to protect the integrity of networks 1. Security and Risk Management
  • 24. CISSP Exam The following approaches are adopted to implement cyber security Security measures are decided based on regulations Here, security measures are based on no specific criteria Security measures are based on unique risks in an organization Compliance - based Ad - hoc Risk - based 1. Security and Risk Management
  • 25. CISSP Exam To protect the information within a company Confidentiality, Integrity, and Availability (CIA) security model is designed CIA triad Confidentiality Integrity Availability 1. Security and Risk Management
  • 26. CISSP Exam1. Security and Risk Management The GRC trilogy is a structured approach adopted by organizations to align IT objectives with business objectives Risk Management ComplianceGovernance
  • 27. CISSP Exam1. Security and Risk Management The GRC trilogy is a structured approach adopted by organizations to align IT objectives with business objectives Governance is taken care of by the senior professionals of an organization. Such a program has goals like ensuring goals are achieved, providing strategic plans, and so on Governance Risk Management Compliance
  • 28. CISSP Exam The GRC trilogy is a structured approach adopted by organizations to align IT objectives with business objectives In risk management, the organizations look into mitigating all types of risks such as investment, physical, and cyber risks 1. Security and Risk Management Governance Risk Management Compliance
  • 29. CISSP Exam The GRC trilogy is a structured approach adopted by organizations to align IT objectives with business objectives Risk Management Compliance Compliance refers to abiding by the defined laws and regulations 1. Security and Risk Management Governance
  • 30. CISSP Exam The GRC trilogy is a structured approach adopted by organizations to align IT objectives with business objectives Risk Management Compliance Compliance refers to abiding by the defined laws and regulations 1. Security and Risk Management Governance Did you know that the senior management of an organization develops a security policy that is implemented to achieve the organization’s goals?
  • 31. CISSP Exam The GRC trilogy is a structured approach adopted by organizations to align IT objectives with business objectives Risk Management Compliance Compliance refers to abiding by the defined laws and regulations 1. Security and Risk Management Governance Let’s have a look at the characteristics of these security policies
  • 32. CISSP Exam1. Security and Risk Management They should support the vision and mission
  • 33. CISSP Exam1. Security and Risk Management They should support the vision and mission All the business units should be integrated
  • 34. CISSP Exam1. Security and Risk Management They should be updated regularly They should support the vision and mission All the business units should be integrated
  • 35. CISSP Exam1. Security and Risk Management Security policies should be easy to understand They should be updated regularly They should support the vision and mission All the business units should be integrated
  • 36. 1. Security and Risk Management A risk analysis team is formed in an organization to perform the analysis of each known risk. The steps to perform risk analysis is as shown below:
  • 37. 1. Security and Risk Management A risk analysis team is formed in an organization to perform the analysis of each known risk. The steps to perform risk analysis is as shown below: Assessment of the value of the company’s assets Analyzing risks to assets Identify countermeasures to mitigate the risks 2 31
  • 38. 1. Security and Risk Management A risk analysis team is formed in an organization to perform the analysis of each known risk. The steps to perform risk analysis is as shown below: 1 2 3 Assessment of the value of the company’s assets Analyzing risks to assets Identify countermeasures to mitigate the risks
  • 39. 1. Security and Risk Management A risk analysis team is formed in an organization to perform the analysis of each known risk. The steps to perform risk analysis is as shown below: 1 2 3 Assessment of the value of the company’s assets Analyzing risks to assets Identify countermeasures to mitigate the risks
  • 40. 1. Security and Risk Management A risk analysis team is formed in an organization to perform the analysis of each known risk. The steps to perform risk analysis is as shown below: 1 2 3 Assessment of the value of the company’s assets Analyzing risks to assets Identify countermeasures to mitigate the risks
  • 42. CISSP Exam2. Asset Security 1. Data Classification 2. Data Management 3. Data Remanence 4. Data Loss Prevention Asset Security is the second domain of the CISSP. It deals with the collection and protection of information. These are the steps we will be looking into
  • 43. CISSP Exam2. Asset Security Data is classified by the data owner 1. Data Classification
  • 44. CISSP Exam2. Asset Security The classification of data is done based on certain set criteria’s 1. Data Classification
  • 45. CISSP Exam2. Asset Security Data classification is annually reviewed 1. Data Classification
  • 46. CISSP Exam2. Asset Security 2. Data Management In data management the information lifecycle is managed
  • 47. CISSP Exam2. Asset Security 2. Data Management Data management ensures that the data complies to the standards
  • 48. CISSP Exam2. Asset Security 2. Data Management Data management also ensures data validity and integrity
  • 49. CISSP Exam2. Asset Security 3. Data Remanence Data Remanence is defined as the remains of the digital data that is present even after erasing the data
  • 50. CISSP Exam2. Asset Security 3. Data Remanence Security professionals should be well versed with techniques to avoid Data Remanence
  • 51. CISSP Exam2. Asset Security To prevent data loss, a set of measures is adopted to ensure that information is only available to authorized users 4. Data Loss Prevention
  • 53. CISSP Exam3. Security Engineering This domain talks about security architecture, security models, cryptography, and physical security Security Architecture Cryptography
  • 54. CISSP Exam3. Security Engineering This domain talks about security architecture, security models, cryptography, and physical security Security Architecture Cryptography Takes the help of TCB (Trusted computing base), Security Perimeter, and Reference models to implement security
  • 55. CISSP Exam3. Security Engineering Security Architecture Cryptography Information is secured by converting data from a readable format to a non-readable format and vice versa This domain talks about security architecture, security models, cryptography, and physical security
  • 57. CISSP Exam4. Communications and Network Security This domain consists of network structures, countermeasures, transmission methods, and security measures used to achieve CIA
  • 58. CISSP Exam4. Communications and Network Security This domain consists of network structures, countermeasures, transmission methods, and security measures used to achieve CIA OSI Model Open Systems Interconnection model describes how data is transferred from one computer to another
  • 59. CISSP Exam4. Communications and Network Security This domain consists of network structures, countermeasures, transmission methods, and security measures used to achieve CIA Firewall is a hardware or software which blocks the incoming or outgoing traffic from the internet to your computer FirewallOSI Model
  • 60. CISSP Exam4. Communications and Network Security This domain consists of network structures, countermeasures, transmission methods, and security measures used to achieve CIA IDS is designed to detect unauthorized access to a system. It is used together with a firewall and a router Firewall Intrusion Detection SystemOSI Model
  • 62. CISSP Exam5. Identity and Access Management Identity and Access Management talks about the access control, identification, authorization, and attacks on access control and its countermeasures.
  • 63. CISSP Exam5. Identity and Access Management Identity and Access Management talks about the access control, identification, authorization, and attacks on access control and its countermeasures. Let’s have a look at the following topics: 1. Identity Management 2. Kerberos 3. Access Criteria
  • 64. CISSP Exam5. Identity and Access Management Identity and Access Management talks about the access control, identification, authorization, and attacks on access control and its countermeasures. Identity Management is used to establish identities to identify and authenticate users through automated means 1
  • 65. CISSP Exam5. Identity and Access Management Identity and Access Management talks about the access control, identification, authorization, and attacks on access control and its countermeasures. Kerberos, an authentication protocol that is based on symmetric-key cryptography, provides end to end security 2
  • 66. CISSP Exam5. Identity and Access Management Identity and Access Management talks about the access control, identification, authorization, and attacks on access control and its countermeasures. Access privileges should be granted based on the level of trust and the job role in the organization. For safety reasons, it should also be provided based on the location and the time 3
  • 68. CISSP Exam6. Security Assessment and Testing This domain looks into audits, security control assessment, and testing reports
  • 69. CISSP Exam6. Security Assessment and Testing An audit is a repeated process wherein an independent professional evaluates and analyzes evidence This domain looks into audits, security control assessment, and testing reports
  • 70. CISSP Exam6. Security Assessment and Testing Vulnerability assessment is the process by which IT risks are identified and evaluated This domain looks into audits, security control assessment, and testing reports
  • 71. CISSP Exam6. Security Assessment and Testing Testing is performed to check the data flow between the application and the system This domain looks into audits, security control assessment, and testing reports
  • 73. CISSP Exam7. Security Operations This domain includes investigations, monitoring and logging, disaster recovery, and change management
  • 74. CISSP Exam7. Security Operations This domain includes investigations, monitoring and logging, disaster recovery, and change management The topics in this domain are: 1. Digital Forensics 2. Incident Management 3. Perimeter Security
  • 75. CISSP Exam7. Security Operations This domain includes investigations, monitoring and logging, disaster recovery, and change management Here, digital data is examined to identify, recover, and analyze opinions about digital information 1 Digital Forensics
  • 76. CISSP Exam7. Security Operations This domain includes investigations, monitoring and logging, disaster recovery, and change management Incident Management works to restore the services to normal as soon as possible. A team called the incident response team is deployed to handle such emergencies 2 Incident Management
  • 77. CISSP Exam7. Security Operations This domain includes investigations, monitoring and logging, disaster recovery, and change management 3 Perimeter Security Perimeter defense allows us to detect and keep a check on unauthorized physical access. Access to the facility is controlled
  • 79. CISSP Exam8. Software Development Security This domain talks about security in a software development lifecycle.
  • 80. CISSP Exam Application Program Interface • It is a collection of protocols and functions used to create applications. • API supports formats such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP) 8. Software Development Security
  • 81. CISSP Exam Security Threats and Attacks - Malware • Malware refers to malicious software, viruses, ransomware, and worms. • Trojan virus is also a form of malware that disguises itself as a legitimate software 8. Software Development Security
  • 82. CISSP Exam Security Threats and Attacks - Spyware It is a type of malware which is used to secretly gather information of the victim to give it to a third party 8. Software Development Security
  • 83. CISSP Exam Security Threats and Attacks - Adware As the name suggests, this is a type of malware that constantly displays ads and pop-ups. Some of such ads can also gather your information 8. Software Development Security
  • 84. CISSP Exam Security Threats and Attacks - Social Engineering Attacks It is the art of manipulating people so that they end up giving their confidential information. It is broken down into Phishing, Spear Phishing, and Whaling Phishing Attack. 8. Software Development Security
  • 85. CISSP Exam Security Threats and Attacks - SQL Injection Attack In a database driven website, the hacker manipulates a standard SQL query. Malicious code is inserted into a SQL server to obtain information 8. Software Development Security

Editor's Notes

  1. Style - 01
  2. Style - 01
  3. Style - 01