CISSP Training Introduction:
CISSP certification is a globally recognized standard of achievement that confirms an individual’s knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. This was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.
With Global Online Trainings the CISSP Training is coordinated by best industry experts and the CISSP Online tutorial is prepared with best industry updates for offering participants best professional insight over modules. The training is available for individual and corporate batches. To know more about this online training course contact reach at helpdesk of Global Online Trainings today.
CISSP Online Training Course Content:
TOPIC :1 Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
- Learn How to Pass the CISSP Training the first time
- How to deal with CISSP Training test anxiety
- Understanding the most recent changes to the CISSP Training exam format
- Security and Risk Management
- Confidentiality, Integrity and Availability
- Security Governance Policies and their supporting counterparts
- Global Information Security Legal and Regulatory Policies
- Professional Ethics
- Business Continuity
- Personnel Security
- Risk Management
- Threat modeling
- Acquisition Security
- Security Awareness
TOPIC :2 Asset Security (Protecting Security of Assets)
TOPIC :3 Security Engineering (Engineering and Management of Security)
TOPIC :4 Communications and Network Security (Designing and Protecting Network Security)
- Asset Security
- Classify Information
- Identify and Document Asset Ownership
- Asset Privacy Concerns
- Asset retention Policies
- Data Security Controls
- Handling Requirements
- Security Engineering
- Secure Engineering Processes
- Review Security Engineering Models
- Security Architecture
- Web Based vulnerabilities
- Mobile vulnerabilities
- Embedded device vulnerabilities
- Cryptography components and their relationships
- Site and Facility Design
- Physical Security
TOPIC :5 Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
TOPIC :6 Identity and Access Management (Controlling Access and Managing Identity)
- Security Assessment and Testing
- Validate Assessment
- Security Control
- Management and Operational Controls
- Analyze and report test outputs
- Internal and third party audits
- Security Operations
- Handling Investigations
- Investigation Types
- Logging and Monitoring
- Provisioning of Resources
- Security Operations
- Resource Protection
- Incident Management
- Preventative Measures
- Patch and Vulnerability Management
TOPIC :7 Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
- Security Operations (Continued)
- Change Management
- Disaster Recovery
- Business Continuity
- Manage Physical Security
- Personnel Safety Concerns
- Software Development Security
- Software Development Lifecycle
- Security for Development Environments
- Software Security
- Purchased Software Risk
TOPIC :8 Software Development Security (Understanding, Applying, and Enforcing Software Security)
- Communication and Network Security
- Network Architecture
- Network Components
- Communication Channels
- Handling Network Attacks
- Identity and Access Management
- Physical and Logical Access
- Authentication of People and Devices
- Identity as Service (Cloud Identity)
- 3rd Party Identity
- Authorization mechanisms
- Access Control Attacks
- Provisioning Lifecycle
Accountability and Access Control:
Access Control Overview:
- Controlling access to resources is one of the central themes of security. Access control addresses more than just controlling which users can access which files or services of CISSP Training.
- Access control is about the relationships between subjects and objects. The transfer of information from an object to a subject is called access.
- However, access is not just a logical or technical concept; don’t forget about the physical realm where access can be disclosure, use, or proximity.
- A foundational principle of access control is to deny access by default if access is not granted specifically to a subject.
- Subjects are active entities that, through the exercise of access, seek information about or data from passive entities, or objects.
- A subject can be a user, program, process, file, computer, database, and so on. An object can be a file, database, computer, program, process, file, printer, storage media, and so on.
- The subject is always the entity that receives information about or data from the object.
- The subject is also the entity that alters information about or data stored within the object.
- The object is always the entity that provides or hosts the information or data. The roles of subject and object can switch as two entities, such as a program and a database or a process and a file, communicate to accomplish a task.
Types of Access Control:
- Access controls are necessary to protect the confidentiality, integrity, and availability of objects .
- The term access control is used to describe a broad range of controls, from forcing a user to provide a valid username and password to log on to preventing users from gaining access to a resource outside of their sphere of access.
- Access controls can be divided into the following seven categories of function or purpose. You should notice that some security mechanisms can be labeled with multiple function or purpose categories.
Preventative access control : A preventative access control (or preventive access control) is deployed to stop unwanted or unauthorized activity from occurring. Examples of preventative access controls include fences, locks, biometrics, mantraps, lighting, alarm systems, separation of duties, job rotation, data classification, penetration testing, access control methods, encryption, auditing, presence of security cameras or closed circuit television (CCTV), smart cards, callback, security policies, security awareness training, and antivirus software.
Deterrent access control: A deterrent access control is deployed to discourage the violation of security policies. A deterrent control picks up where prevention leaves off. The deterrent doesn’t stop with trying to prevent an action; instead, CISSP Training goes further to exact consequences in the event of an attempted or successful violation. Examples of deterrent access controls include locks, fences, security badges, security guards, mantraps, security cameras, trespass or intrusion alarms, separation of duties, work task procedures, awareness training, encryption, auditing, and firewalls.
Detective access control: A detective access control is deployed to discover unwanted or unauthorized activity. Often detective controls are after-the-fact controls rather than real-time CISSP Training. Examples of detective access controls include security guards, guard dogs, motion detectors, recording and reviewing of events seen by security cameras or CCTV, job rotation, mandatory vacations, audit trails, intrusion detection systems, violation reports, honey pots, supervision and reviews of users, incident investigations, and intrusion detection systems.
Corrective access control: A corrective access control is deployed to restore systems to normal after an unwanted or unauthorized activity has occurred. Usually corrective controls are simple in nature, such as terminating access or rebooting a system. Corrective controls have only a minimal capability to respond to access violations. Examples of corrective access controls include intrusion detection systems, antivirus solutions, alarms, mantraps, business continuity planning, and security policies.
Recovery access control: A recovery access control is deployed to repair or restore resources, functions, and capabilities after a violation of security policies. Recovery controls have a more advanced or complex capability to respond to access violations than a corrective access control. For example, a recovery access control can repair damage as well as stop further damage. Examples of recovery access controls include backups and restores, fault tolerant drive systems, server clustering, antivirus software, and database shadowing.
Compensation access control: A compensation access control is deployed to provide various options to other existing controls to aid in the enforcement and support of a security policy. Examples of compensation access controls include security policy, personnel supervision, monitoring, and work task procedures.
Compensation controls can also be considered to be controls used in place of or instead of more desirable or damaging controls. For example, if a guard dog cannot be used because of the proximity of a residential area, a motion detector with a spotlight and a barking sound playback device can be used.
Directive access control: A directive access control is deployed to direct, confine, or control the actions of subjects to force or encourage compliance with security policies. Examples of directive access controls include security guards, guard dogs, security policy, posted notifications, escape route exit signs, monitoring, supervising, work task procedures, and awareness training.
Access controls can be further categorized by how they are implemented. In this case, the categories are administrative, logical/technical, or physical:
Administrative access controls: Administrative access controls are the policies and procedures defined by an organization’s security policy to implement and enforce overall access control. Administrative access controls focus on two areas: personnel and business practices . Examples of administrative access controls include policies, procedures, hiring practices, background checks, data classification, security training, vacation history, reviews, work supervision, personnel controls, and testing.
Logical/technical access controls: CISSP Training access controls and technical access controls are the hardware or software mechanisms used to manage access to resources and systems and provide protection for those resources and systems. Examples of logical or technical access controls include encryption, smart cards, passwords, biometrics, constrained interfaces, access control lists (ACLs), protocols, firewalls, routers, intrusion detection systems, and clipping levels.
Physical access controls: Physical access controls are the physical barriers deployed to prevent direct contact with systems or portions of a facility. Examples of physical access controls include guards, fences, motion detectors, locked doors, sealed windows, lights, cable protection, laptop locks, swipe cards, guard dogs, video cameras, mantraps, and alarms.