SlideShare uma empresa Scribd logo
1 de 28
©2015 International Institute for Learning, Inc., All rights reserved. 1
Too Many Security Incidents. Too Few
Security Professionals.
Benefits of CISSP® Certification
©2015 International Institute for Learning, Inc., All rights reserved. 2
Global IIL Companies
IIL US
IIL Asia (Singapore)
IIL Australia
IIL Brasil
IIL Canada
IIL China
IIL Europe (United Kingdom)
IIL Finland
IIL France
IIL Germany
IIL Hong Kong
IIL Hungary
IIL India
IIL Japan
IIL Korea (Seoul)
IIL México
IIL Middle East (Dubai)
IIL Spain
©2015 International Institute for Learning, Inc., All rights reserved. 3
Sneak Preview
Radical, futuristic
presentation –
No death by PPT!
Snazzy high-
resolution graphics
Fully immersive
experience
Conceptually laid
out to suit the
nature of the CISSP
coursework
Module-wise
assessments
2 - Full-length
sample exams
©2015 International Institute for Learning, Inc., All rights reserved. 4
Sneak Preview
©2015 International Institute for Learning, Inc., All rights reserved. 5
Sneak Preview
©2015 International Institute for Learning, Inc., All rights reserved. 6
Sneak Preview
©2015 International Institute for Learning, Inc., All rights reserved. 7
Sneak Preview – Cryptography
©2015 International Institute for Learning, Inc., All rights reserved. 8
Sneak Preview – Cryptography
©2015 International Institute for Learning, Inc., All rights reserved. 9
Sneak Preview
©2015 International Institute for Learning, Inc., All rights reserved. 10
Partial List of Accreditations
©2015 International Institute for Learning, Inc., All rights reserved. 11
• The “Gold” standard in Information security certification
• Complies with DoD 8750 mandate
• Administered by ISC2 (International Information Systems Security
Certification Consortium)
• 250 Questions – Multiple Choice
• 6-hour exam !!
About the CISSP®
©2015 International Institute for Learning, Inc., All rights reserved. 12
Commit to Code of Ethics
Have required work experience (as of 1 Oct)
• Five years of relevant security work -- OR --
• Four years of work + college degree
Pass the Examination & Endorsement from a CISSP®
• 250 multiple-choice questions; six hours
Continuing Professional Education
• 120 credits per three year certification period
Pay yearly maintenance fee
How to Become a CISSP®
©2015 International Institute for Learning, Inc., All rights reserved. 13
• (ISC)²® is the global, not-for-profit leader in educating and certifying
cyber, information, software, and infrastructure security
professionals.
• Provides vendor-neutral education products.
• Headquartered in the United States and with offices in London, Hong
Kong, Tokyo, Mumbai, and an authorized China agency in Beijing
About the ISC2
©2015 International Institute for Learning, Inc., All rights reserved. 14
Security, Risk, Compliance, Law,
Regulations, and Business Continuity
• Confidentiality, integrity, and
availability concepts
• Security governance principles
• Compliance
• Legal and regulatory issues
• Professional ethic
• Security policies, standards,
procedures, and guidelines
Domain 1 – Security and Risk
Management
©2015 International Institute for Learning, Inc., All rights reserved. 15
Protecting Security of Assets
• Information and asset classification
• Ownership (e.g., data owners, system
owners)
• Protect privacy
• Appropriate retention
• Data security controls
• Handling requirements (e.g.,
markings, labels, storage)
Domain 2 – Asset Security
©2015 International Institute for Learning, Inc., All rights reserved. 16
Engineering and Management of Security
• Engineering processes using secure
design principles
• Security models fundamental
concepts
• Security evaluation models
• Security capabilities of information
systems
• Security architectures, designs, and
solution elements vulnerabilities
• Web-based systems vulnerabilities
• Mobile systems vulnerabilities
Domain 3 – Security Engineering
©2015 International Institute for Learning, Inc., All rights reserved. 17
Security Engineering – Part 2
• Embedded devices and cyber-
physical systems vulnerabilities
• Cryptography
• Site and facility design secure
principles
• Physical security
Domain 3
©2015 International Institute for Learning, Inc., All rights reserved. 18
Designing and Protecting Network Security
• Secure network architecture design (e.g., IP & non-IP
protocols, segmentation)
• Secure network components
• Secure communication channels
• Network attacks
Domain 4 – Communication and
Network Security
©2015 International Institute for Learning, Inc., All rights reserved. 19
Controlling Access and Managing Identity
• Physical and logical assets control
• Identification and authentication of people and devices
• Identity as a service (e.g., cloud identity)
• Third-party identity services (e.g., on-premise)
• Access control attacks
• Identity and access provisioning lifecycle (e.g., provisioning
review)
Domain 5 – Identity and Access
Management
©2015 International Institute for Learning, Inc., All rights reserved. 20
Designing, Performing, and Analysing
Security Testing
• Assessment and test strategies
• Security process data (e.g.,
management and operational
controls)
• Security control testing
• Test outputs (e.g., automated,
manual)
• Security architectures
vulnerabilities
Domain 6 – Security Assessment and
Testing
©2015 International Institute for Learning, Inc., All rights reserved. 21
Foundational Concepts, Investigations, Incident
• Management and Disaster Recovery
• Investigations support and requirements
• Logging and monitoring activities
• Provisioning of resources
• Foundational security operations
concepts
• Resource protection techniques
• Incident management
• Preventative measures
Domain 7 – Security Operations
©2015 International Institute for Learning, Inc., All rights reserved. 22
Security Operations – Part 2
• Business continuity planning
and exercises
• Physical security
• Personnel safety concerns
Domain 7 – Security Operations
©2015 International Institute for Learning, Inc., All rights reserved. 23
Understanding, Applying, and
Enforcing Software Security
• Security in the software
development lifecycle
• Development of environment
security controls
• Software security effectiveness
• Acquired software security
impact
Domain 8 – Software Development
Security
©2015 International Institute for Learning, Inc., All rights reserved. 24
What Else? – Russell’s Teapot
©2015 International Institute for Learning, Inc., All rights reserved. 25
What Else – When were the pyramids built?
©2015 International Institute for Learning, Inc., All rights reserved. 26
• CISSP® CBK – 4th Edition
• https://www.cccure.org/
• Exam application assistance
• Endorsement assistance
• Laptops in class (Exam Registration & Site
Registration)
Pre-reading and Other Things…
©2015 International Institute for Learning, Inc., All rights reserved. 27
After a failed attempt at conquering Mt. Everest,
Sir Edmund Hilary said,
"I will come again and conquer you. Because as a
mountain, you cannot grow. But as a human, I
can!!"
Thank you
©2015 International Institute for Learning, Inc., All rights reserved. 28
We invite you to get a closer look at what IIL can do for you and your
organization, by visiting www.iil.com or email learning@iil.com and let us
know how we can meet your learning needs.
Please connect with IIL Socially:
Like us on: facebook.com/IIL.inc
Follow us: twitter.com/IILGLOBAL
Join our Discussions on LinkedIn
At IIL, Our Greatest Accomplishments are
Yours

Mais conteúdo relacionado

Destaque

Destaque (15)

How Hiring Managers Can Interview Like a Pro
How Hiring Managers Can Interview Like a ProHow Hiring Managers Can Interview Like a Pro
How Hiring Managers Can Interview Like a Pro
 
Hiring Managers And Interviewing - Training for Recruiters
Hiring Managers And Interviewing - Training for RecruitersHiring Managers And Interviewing - Training for Recruiters
Hiring Managers And Interviewing - Training for Recruiters
 
Building & Managing a Team
Building & Managing a TeamBuilding & Managing a Team
Building & Managing a Team
 
Empower Yourself: Negotiate For The User - UserFocus 2012
Empower Yourself: Negotiate For The User - UserFocus 2012Empower Yourself: Negotiate For The User - UserFocus 2012
Empower Yourself: Negotiate For The User - UserFocus 2012
 
Things Recruiters & Hiring Managers Won't Tell You
Things Recruiters & Hiring Managers Won't Tell YouThings Recruiters & Hiring Managers Won't Tell You
Things Recruiters & Hiring Managers Won't Tell You
 
Hr Manager Interview Questions Sample
Hr Manager Interview Questions SampleHr Manager Interview Questions Sample
Hr Manager Interview Questions Sample
 
Behavioral Event Interview Training for Islamic School Managers
Behavioral Event Interview Training for Islamic School ManagersBehavioral Event Interview Training for Islamic School Managers
Behavioral Event Interview Training for Islamic School Managers
 
2010 Employment Lifecycle And Orientation Team Lead Training
2010 Employment Lifecycle And Orientation Team Lead Training2010 Employment Lifecycle And Orientation Team Lead Training
2010 Employment Lifecycle And Orientation Team Lead Training
 
5 Keys to Impress a Hiring Manager
5 Keys to Impress a Hiring Manager5 Keys to Impress a Hiring Manager
5 Keys to Impress a Hiring Manager
 
Startup Recruiting Trends
Startup Recruiting TrendsStartup Recruiting Trends
Startup Recruiting Trends
 
The Hiring Manager Conundrum
The Hiring Manager Conundrum The Hiring Manager Conundrum
The Hiring Manager Conundrum
 
"Selection, Hiring, Orientation And Training For The Internet Department" - ...
"Selection, Hiring, Orientation And Training For The Internet Department" -  ..."Selection, Hiring, Orientation And Training For The Internet Department" -  ...
"Selection, Hiring, Orientation And Training For The Internet Department" - ...
 
Nine Steps to Making Your Interviewing System World-Class
Nine Steps to Making Your Interviewing System World-ClassNine Steps to Making Your Interviewing System World-Class
Nine Steps to Making Your Interviewing System World-Class
 
The New Journalist in the Age of Social Media
The New Journalist in the Age of Social MediaThe New Journalist in the Age of Social Media
The New Journalist in the Age of Social Media
 
8051 architecture
8051 architecture8051 architecture
8051 architecture
 

Mais de International Institute for Learning

Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
International Institute for Learning
 

Mais de International Institute for Learning (20)

Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
 
Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013
 
PMI Professional in Business Analyisis (PMI-PBA) Certification
PMI Professional in Business Analyisis (PMI-PBA) Certification PMI Professional in Business Analyisis (PMI-PBA) Certification
PMI Professional in Business Analyisis (PMI-PBA) Certification
 
2015 - New PMI Continuing Certification Requirements (CCR)
2015 - New PMI Continuing Certification Requirements (CCR) 2015 - New PMI Continuing Certification Requirements (CCR)
2015 - New PMI Continuing Certification Requirements (CCR)
 
Leverage the Power of Coaching within Your Projects and Business
Leverage the Power of Coaching within Your Projects and Business Leverage the Power of Coaching within Your Projects and Business
Leverage the Power of Coaching within Your Projects and Business
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
Applying Lean Six Sigma in Healthcare
Applying Lean Six Sigma in HealthcareApplying Lean Six Sigma in Healthcare
Applying Lean Six Sigma in Healthcare
 
Global Business Etiquette
Global Business Etiquette Global Business Etiquette
Global Business Etiquette
 
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the RideThe Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
 
Project Management in the Cloud: Dynamic Communication
Project Management in the Cloud: Dynamic Communication Project Management in the Cloud: Dynamic Communication
Project Management in the Cloud: Dynamic Communication
 
Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...
 
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
 
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
 
Emerging Trends in PMO Governance
Emerging Trends in PMO Governance Emerging Trends in PMO Governance
Emerging Trends in PMO Governance
 
Critical Success Factors for Optimal Use of Project Server
Critical Success Factors for Optimal Use of Project Server Critical Success Factors for Optimal Use of Project Server
Critical Success Factors for Optimal Use of Project Server
 
Improving Project Management Skills with Lean Six Sigma
Improving Project Management Skills with Lean Six Sigma Improving Project Management Skills with Lean Six Sigma
Improving Project Management Skills with Lean Six Sigma
 
Webinar: Metrics Management - Be Careful What You Wish For!
Webinar: Metrics Management - Be Careful What You Wish For!Webinar: Metrics Management - Be Careful What You Wish For!
Webinar: Metrics Management - Be Careful What You Wish For!
 
Grateful Leadership
Grateful Leadership Grateful Leadership
Grateful Leadership
 
CAPM® EDGE
CAPM® EDGECAPM® EDGE
CAPM® EDGE
 

Último

Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
amitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
amitlee9823
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
MarinCaroMartnezBerg
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
amitlee9823
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
amitlee9823
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
JoseMangaJr1
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Último (20)

Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 

Too Many Security Incidents. Too Few Security Professionals. - Benefits of CISSP Certification

  • 1. ©2015 International Institute for Learning, Inc., All rights reserved. 1 Too Many Security Incidents. Too Few Security Professionals. Benefits of CISSP® Certification
  • 2. ©2015 International Institute for Learning, Inc., All rights reserved. 2 Global IIL Companies IIL US IIL Asia (Singapore) IIL Australia IIL Brasil IIL Canada IIL China IIL Europe (United Kingdom) IIL Finland IIL France IIL Germany IIL Hong Kong IIL Hungary IIL India IIL Japan IIL Korea (Seoul) IIL México IIL Middle East (Dubai) IIL Spain
  • 3. ©2015 International Institute for Learning, Inc., All rights reserved. 3 Sneak Preview Radical, futuristic presentation – No death by PPT! Snazzy high- resolution graphics Fully immersive experience Conceptually laid out to suit the nature of the CISSP coursework Module-wise assessments 2 - Full-length sample exams
  • 4. ©2015 International Institute for Learning, Inc., All rights reserved. 4 Sneak Preview
  • 5. ©2015 International Institute for Learning, Inc., All rights reserved. 5 Sneak Preview
  • 6. ©2015 International Institute for Learning, Inc., All rights reserved. 6 Sneak Preview
  • 7. ©2015 International Institute for Learning, Inc., All rights reserved. 7 Sneak Preview – Cryptography
  • 8. ©2015 International Institute for Learning, Inc., All rights reserved. 8 Sneak Preview – Cryptography
  • 9. ©2015 International Institute for Learning, Inc., All rights reserved. 9 Sneak Preview
  • 10. ©2015 International Institute for Learning, Inc., All rights reserved. 10 Partial List of Accreditations
  • 11. ©2015 International Institute for Learning, Inc., All rights reserved. 11 • The “Gold” standard in Information security certification • Complies with DoD 8750 mandate • Administered by ISC2 (International Information Systems Security Certification Consortium) • 250 Questions – Multiple Choice • 6-hour exam !! About the CISSP®
  • 12. ©2015 International Institute for Learning, Inc., All rights reserved. 12 Commit to Code of Ethics Have required work experience (as of 1 Oct) • Five years of relevant security work -- OR -- • Four years of work + college degree Pass the Examination & Endorsement from a CISSP® • 250 multiple-choice questions; six hours Continuing Professional Education • 120 credits per three year certification period Pay yearly maintenance fee How to Become a CISSP®
  • 13. ©2015 International Institute for Learning, Inc., All rights reserved. 13 • (ISC)²® is the global, not-for-profit leader in educating and certifying cyber, information, software, and infrastructure security professionals. • Provides vendor-neutral education products. • Headquartered in the United States and with offices in London, Hong Kong, Tokyo, Mumbai, and an authorized China agency in Beijing About the ISC2
  • 14. ©2015 International Institute for Learning, Inc., All rights reserved. 14 Security, Risk, Compliance, Law, Regulations, and Business Continuity • Confidentiality, integrity, and availability concepts • Security governance principles • Compliance • Legal and regulatory issues • Professional ethic • Security policies, standards, procedures, and guidelines Domain 1 – Security and Risk Management
  • 15. ©2015 International Institute for Learning, Inc., All rights reserved. 15 Protecting Security of Assets • Information and asset classification • Ownership (e.g., data owners, system owners) • Protect privacy • Appropriate retention • Data security controls • Handling requirements (e.g., markings, labels, storage) Domain 2 – Asset Security
  • 16. ©2015 International Institute for Learning, Inc., All rights reserved. 16 Engineering and Management of Security • Engineering processes using secure design principles • Security models fundamental concepts • Security evaluation models • Security capabilities of information systems • Security architectures, designs, and solution elements vulnerabilities • Web-based systems vulnerabilities • Mobile systems vulnerabilities Domain 3 – Security Engineering
  • 17. ©2015 International Institute for Learning, Inc., All rights reserved. 17 Security Engineering – Part 2 • Embedded devices and cyber- physical systems vulnerabilities • Cryptography • Site and facility design secure principles • Physical security Domain 3
  • 18. ©2015 International Institute for Learning, Inc., All rights reserved. 18 Designing and Protecting Network Security • Secure network architecture design (e.g., IP & non-IP protocols, segmentation) • Secure network components • Secure communication channels • Network attacks Domain 4 – Communication and Network Security
  • 19. ©2015 International Institute for Learning, Inc., All rights reserved. 19 Controlling Access and Managing Identity • Physical and logical assets control • Identification and authentication of people and devices • Identity as a service (e.g., cloud identity) • Third-party identity services (e.g., on-premise) • Access control attacks • Identity and access provisioning lifecycle (e.g., provisioning review) Domain 5 – Identity and Access Management
  • 20. ©2015 International Institute for Learning, Inc., All rights reserved. 20 Designing, Performing, and Analysing Security Testing • Assessment and test strategies • Security process data (e.g., management and operational controls) • Security control testing • Test outputs (e.g., automated, manual) • Security architectures vulnerabilities Domain 6 – Security Assessment and Testing
  • 21. ©2015 International Institute for Learning, Inc., All rights reserved. 21 Foundational Concepts, Investigations, Incident • Management and Disaster Recovery • Investigations support and requirements • Logging and monitoring activities • Provisioning of resources • Foundational security operations concepts • Resource protection techniques • Incident management • Preventative measures Domain 7 – Security Operations
  • 22. ©2015 International Institute for Learning, Inc., All rights reserved. 22 Security Operations – Part 2 • Business continuity planning and exercises • Physical security • Personnel safety concerns Domain 7 – Security Operations
  • 23. ©2015 International Institute for Learning, Inc., All rights reserved. 23 Understanding, Applying, and Enforcing Software Security • Security in the software development lifecycle • Development of environment security controls • Software security effectiveness • Acquired software security impact Domain 8 – Software Development Security
  • 24. ©2015 International Institute for Learning, Inc., All rights reserved. 24 What Else? – Russell’s Teapot
  • 25. ©2015 International Institute for Learning, Inc., All rights reserved. 25 What Else – When were the pyramids built?
  • 26. ©2015 International Institute for Learning, Inc., All rights reserved. 26 • CISSP® CBK – 4th Edition • https://www.cccure.org/ • Exam application assistance • Endorsement assistance • Laptops in class (Exam Registration & Site Registration) Pre-reading and Other Things…
  • 27. ©2015 International Institute for Learning, Inc., All rights reserved. 27 After a failed attempt at conquering Mt. Everest, Sir Edmund Hilary said, "I will come again and conquer you. Because as a mountain, you cannot grow. But as a human, I can!!" Thank you
  • 28. ©2015 International Institute for Learning, Inc., All rights reserved. 28 We invite you to get a closer look at what IIL can do for you and your organization, by visiting www.iil.com or email learning@iil.com and let us know how we can meet your learning needs. Please connect with IIL Socially: Like us on: facebook.com/IIL.inc Follow us: twitter.com/IILGLOBAL Join our Discussions on LinkedIn At IIL, Our Greatest Accomplishments are Yours