Certified Information Security Manager (CISM) | ISACA

Deep Dive Security Sessions | Real-time Case Studies | Comprehensive CBK Coverage | Certification Exam Readiness Support | Interactive Discussions | Latest Security Branches and Technology Risk Issues

CISSP curriculum covers subject matter in a variety of Information Security topics.[8] The CISSP examination is based on what (ISC)² terms the Common Body of Knowledge (or CBK). According to (ISC)², "the CISSP CBK is a taxonomy – a collection of topics relevant to information security professionals around the world. The CISSP CBK establishes a common framework of information security terms and principles that allow information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession with a common understanding.

Course Duration: 6 Weekends
Microsoft Azzure TRAINING SYLLABUS

Understand and apply concepts of confidentiality, integrity and availability

Evaluate and apply security governance principles

Determine compliance requirements

Understand legal and regulatory issues that pertain to information security in a global context

Understand, adhere to, and promote professional ethics

Develop, document, and implement security policy, standards, procedures and guidelines

Identify, analyze, and prioritize Business Continuity (BC) requirements

Contribute to and enforce personnel security policies and procedures

Understand and apply risk management concepts

Understand and apply threat modeling concepts and methodologies

Apply risk-based management concepts to the supply chain

Establish and maintain a security awareness, education, and training program

Identify and classify information and assets

Determine and maintain information and asset ownership

Protect privacy

Ensure appropriate asset retention

Determine data security controls

Establish information and asset handling requirements

Implement and manage engineering processes using secure design principles

Understand the fundamental concepts of security models

Select controls based upon systems security requirements.

Understand the security capabilities of information systems

Assess and mitigate the vulnerabilities of security architectures, designs and solution elements

Assess and mitigate vulnerabilities in web-based systems

Assess and mitigate vulnerabilities in mobile systems

Assess and mitigate vulnerabilities in embedded devices

Apply cryptography

Apply security principles to site and facility design

Implement site and facility security controls

Implement secure design principles in network architecture

Secure network components

Implement secure communication channels according to design

Control physical and logical access to assets

Manage identification and authentication of people, devices and services

Integrate identity as a third-party service

Implement and manage authorization mechanisms

Manage the identity and access provisioning lifecycle

Design and validate assessment, test and audit strategies

Conduct security control testing

Collect security process data

Analyze test output and generate reports

Conduct or facilitate security audits

Understand and support investigations

Understand the requirements for different types of investigations

Conduct logging and monitoring activities

Securely provision resources

Understand and apply foundational security operations concepts

Apply resource protection techniques

Conduct incident management

Operate and maintain detective and preventative measures

Implement and support patch and vulnerability management

Understand and participate in change management processes

Implement recovery strategies

Implement disaster recovery (DR) processes

Test disaster recovery plans (DRP)

Participate in business continuity (BC) planning and exercises

Implement and manage physical security

Address personnel safety and security concerns

Understand and apply security in the software development lifecycle

Enforce security controls in development environments

Assess the effectiveness of software security

Assess security impact of acquired software

Define and apply secure coding guidelines and standards

Contact Us For More Details

Please fill out the form below to enroll now

Training Calendar

S.No Course Hours Total no of hours Days Batch Dates Start time (IST) End time (IST) Batch Status
1 CISA 4 36 Weekend Sep 7,8,14,15,21,22,28,29, Oct 5 7:00 PM 11:00 PM [ Open ]
2 CISM 4 32 Weekend Sep 21,22,28,29, Oct 5,6,12,13 7:00 PM 11:00 PM [ Open ]
3 CEH WORLD 4 32 Weekend Sep 7,8,14,21,22,28,29, Oct 5,6,12 8:00 PM 12:00 PM [ Open ]
S.No Course Hours Total no of hours Days Batch Dates Start time (IST) End time (IST) Batch Status
1 CISA 4 36 Weekend Sep 7,8,14,15,21,22,28,29, Oct 5 7:00 PM 11:00 PM [ Open ]
2 CISM 4 32 Weekend Sep 21,22,28,29, Oct 5,6,12,13 7:00 PM 11:00 PM [ Open ]
3 CEH WORLD 4 32 Weekend Sep 7,8,14,21,22,28,29, Oct 5,6,12 8:00 PM 12:00 PM [ Open ]
s