
Software Development Life Cycle (SDLC), including change management.
Backup storage strategies and recovery site strategies.Logging and monitoring, such as intrusion detection (IDS), intrusion prevention (IPS), and SIEM.Vulnerability assessments, penetration testing, disaster recovery (DR), and business continuity (BC).Identity and Access Management (IAM) and authorization, such as RBAC, MAC, and DAC.
Network security, such as Network Access Control (NAC) devices and endpoint security. Asset classification, data classification, and data security controls. Cryptography, such as symmetric, asymmetric, Public Key Infrastructure (PKI), and digital signatures. Confidentiality, integrity, and availability (CIA). This CISSP training maps to the CISSP methodology exam objectives and covers topics such as: CISSP Certification Training: What You Need to Know After finishing this CISSP Certification training, you'll have a broad understanding of the eight domains of the CISSP CBK, be ready to take on the CISSP exam, and be in a good position to move into more senior-level security roles.įor anyone who leads an IT team, this (ISC)² training can be used for CISSP exam prep, onboarding new security professionals, individual or team training plans, or as a (ISC)² reference resource.