CISSP Program Overview
CISSP Program Overview
The CISSP certification is one of the most renowned achievements within the
realm of information security. Our training course is meticulously crafted to
endow participants with the technical skills and managerial prowess necessary
to effectively design, build, and oversee an organization’s security framework,
aligning with globally recognized information security norms.
CISSP Domains
1) Domain 1: Security and Risk Management
2) Domain 2: Asset Security
3) Domain 3: Security Architecture and Engineering
4) Domain 4: Communication and Network Security
5) Domain 5: Identity and Access Management (IAM)
6) Domain 6: Security Assessment and Testing
7) Domain 7: Security Operations
8) Domain 8: Software Development Security
Domain 1: Security and Risk Management
1.1 - Understand, adhere to, and promote professional ethics
• ISC2 Code of Professional Ethics
• Organizational code of ethics
1.2 - Understand and apply security concepts
• Confidentiality, integrity, and availability, authenticity, and
nonrepudiation (5 Pillars of Information Security)
1.3 - Evaluate and apply security governance principles
• Alignment of the security function to business strategy, goals, mission,
and objectives
• Organizational processes (e.g., acquisitions, divestitures, governance
committees)
• Organizational roles and responsibilities
• Security control frameworks (e.g., International Organization for
Standardization (ISO), National Institute of Standards and Technology
(NIST), Control Objectives for Information and Related Technology
(COBIT), Sherwood Applied Business Security Architecture (SABSA),
Payment Card Industry (PCI), Federal Risk and Authorization
Management Program (FedRAMP))
• Due care/due diligence
1.4 - Understand legal, regulatory, and compliance issues that pertain to
information security in a holistic context
• Cybercrimes and data breaches
• Licensing and Intellectual Property requirements
• Import/export controls
• Transborder data flow
• Issues related to privacy (e.g., General Data Protection Regulation
(GDPR), California Consumer Privacy Act, Personal Information
Protection Law, Protection of Personal Information Act)
• Contractual, legal, industry standards, and regulatory requirements
1.5 - Understand requirements for investigation types (i.e., administrative,
criminal, civil, regulatory, industry standards)
1.6 - Develop, document, and implement security policy, standards,
procedures, and guidelines
• Alignment of the security function to business strategy, goals, mission,
and objectives
• Organizational processes (e.g., acquisitions, divestitures, governance
committees)
• Organizational roles and responsibilities
• Security control frameworks (e.g., International Organization for
Standardization (ISO), National Institute of Standards and Technology
(NIST), Control Objectives for Information and Related Technology
(COBIT), Sherwood Applied Business Security Architecture (SABSA),
Payment Card Industry (PCI), Federal Risk and Authorization
Management Program (FedRAMP))
• Due care/due diligence
1.7 - Identify, analyse, assess, prioritize, and implement Business Continuity
(BC) requirements
• Business impact analysis (BIA)
• External dependencies
1.8 - Contribute to and enforce personnel security policies and procedures
• Candidate screening and hiring
• Employment agreements and policy driven requirements
• Onboarding, transfers, and termination processes
• Vendor, consultant, and contractor agreements and controls
1.9 - Understand and apply risk management concepts
• Threat and vulnerability identification
• Risk analysis, assessment, and scope
• Risk response and treatment (e.g., cybersecurity insurance)
• Applicable types of controls (e.g., preventive, detection, corrective)
• Control assessments (e.g., security and privacy)
• Continuous monitoring and measurement
• Reporting (e.g., internal, external)
• Continuous improvement (e.g., risk maturity modelling)
• Risk frameworks (e.g., International Organization for Standardization
(ISO), National Institute of Standards and Technology (NIST), Control
Objectives for Information and Related Technology (COBIT), Sherwood
Applied Business Security Architecture (SABSA), Payment Card Industry
(PCI))
1.10 - Understand and apply threat modelling concepts and methodologies
1.11 - Apply Supply Chain Risk Management (SCRM) concepts
• Risks associated with the acquisition of products and services from
suppliers and providers (e.g., product tampering, counterfeits,
implants)
• Risk mitigations (e.g., third-party assessment and monitoring,
minimum security requirements, service level requirements, silicon
root of trust, physically unclonable function, software bill of materials)
1.12 - Establish and maintain a security awareness, education, and training
program
• Methods and techniques to increase awareness and training (e.g.,
social engineering, phishing, security champions, gamification)
• Periodic content reviews to include emerging technologies and trends
(e.g., cryptocurrency, artificial intelligence (AI), blockchain)
• Program effectiveness evaluation