Cyber Security CISSP - Certification Training

CISSP - Certification Training

599.00 599.00
$599.00
PRICE PER USER
$
X
USERS


=
SUBTOTAL
$
  • Course Delivery: On Demand
  • Duration: 32 
  • Language: English
  • Difficulty: Intermediate
  • Audience: Cyber Security Professionals

Chat Live | Contact Us | Toll Free: (888) 360-8764

Key Features


  • 32 hours of high-quality eLearning content
  • Five simulation exams with 250 questions each
  • 30 CPEs offered
  • Eight, domain-specific test papers
  • 98.6% pass rate
  • Mobile friendly
 

Description

Why Take CISSP Training?

53% growth in information security jobs by 2018

Peninsula/Stanford Journalism

51% of security architects are CISSP certified

LinkedIn Research

The average salary of a CISSP is $112,000

Indeed Salary Data

The CISSP course helps you develop skills to enhance your organizations business environment and secure the information of the company. CISSP helps you define the architecture, design, build, as per the approved Information Security standards.

CISSP is an independent information security certification governed by the International Information Systems Security Certification Consortium, also known as (ISC)². The CISSP exam is designed to ensure that the professional handling computer security for a company or client has mastered a standardized body of knowledge. Through this course you will be able to learn various aspects that involve securing a company's information security. The course imparts knowledge on business continuity planning & disaster recovery planning which are vital for the smooth functioning of an organization.

 

Course Objectives

The CISSP course ensures your expertise in Information Security. Through this course you would be able to:
  • Define the architecture, design and manage the information security of your organization.
  • Acquire the relevant knowledge and skills required to clear the CISSP certification exam
  • Develop a working knowledge of the eight domains areas as prescribed by CISSP - Common Book of Knowledge 2015.
 

Topics Covered

Introduction
  • CISSP introduction
  • Objectives
  • CISSP
  • (ISC)2
  • CISSP domains
  • Benefits of CISSP for professionals
  • Benefits of CISSP for employers
  • CISSP certification requirements
  • CISSP examination
  • Conclusion

Domain 01 - Security and Risk Management
  • Security and risk management
  • Objectives
  • Importance of Information Security and Risk Management
  • Role and Importance of CIA in ISM
  • Confidentiality
  • Integrity
  • Availability
  • Information Security
  • Information Security Management
  • Information Security Governance
  • IT Security and Organizational Goals, Mission, and Objectives
  • Goals, Mission, and Objectives
  • Aligning Security with Goals, Mission, and Objectives
  • Business Scenario
  • Organizational Processes
  • Auditing
  • Control Framework
  • Due Care
  • Due Diligence
  • Security Controls
  • Service Level Agreements
  • Managing Third - Party Governance
  • Offshoring - Privacy Requirements and Compliance
  • Business Scenario
  • Layers of Responsibility
  • Security Policies
  • Types of Security Policies
  • Security Policy Implementation
  • Policy Chart
  • Standards, Guidelines, Procedures, and Baselines
  • Business Scenario
  • Need for Compliance
  • Regulatory Compliance
  • Compliance
  • Standards/Manuals/Guidelines for Compliance
  • Computer Crimes
  • Introduction to Computer Crimes
  • Categories of Computer Crimes
  • Business Scenario
  • Major Legal Systems
  • Common Law and Civil Law
  • Customary Law and Religious Law
  • Mixed Law
  • Business Scenario
  • Introduction to Intellectual Property (IP) Law
  • Types of Intellectual Property (IP) Law
  • Business Scenario
  • Import or Export Controls and Trans - Border Data Flow
  • Introduction to Privacy
  • U.S. Privacy Laws
  • U.S. Guidelines for Managing Privacy
  • EU Council Directive (Law) on Data Protection
  • The U.S.-European Union Safe Harbor
  • Security Definitions
  • Information Risk Management
  • Business Scenario
  • Introduction to Risk Analysis
  • Goals of Risk Analysis
  • Risk Analysis Team
  • Steps for Risk Analysis
  • Information and Assets Valuation
  • Risk Analysis Types
  • Quantitative Risk Analysis - Steps
  • Quantitative Risk Analysis - Problem
  • Qualitative Risk Analysis
  • Delphi Technique
  • Quantitative vs. Qualitative
  • Hybrid Analysis
  • Countermeasure Selection - Problem
  • Countermeasure Selection - Other Factors
  • Handling Risk
  • Business Scenario
  • Threat Modeling
  • Need for Business Continuity Planning
  • Basic Concepts - Disruptive Events
  • Basic Concepts - Business Continuity Planning
  • Importance of Business Continuity Planning
  • Business Continuity Planning Phases
  • BCP/DRP Phase 1:  Project Initiation and Scoping
  • BCP/DRP Phase 2:  Business Impact Analysis (BIA)
  • BIAGoals
  • BIASteps
  • BIA Steps:  Business Unit Level
  • Maximum Tolerable Downtime (MTD)
  • Failure and Recovery Metrics
  • Stages of Failure and Recovery
  • BCP/DRP Phase 3:  Identify Preventive Controls
  • Importance of Managing Personnel Security
  • Managing Personnel Security:  Hiring Practices
  • Managing Personnel Security:  Employee Termination
  • Vendor, Contractors, and Consultant Controls
  • Best Work Practices
  • Business Scenario
  • Importance of Security Awareness Training
  • Security Awareness Training: Awareness, Training, and Education
  • Implementation of Security Awareness Training Program
  • Importance of Content Updates
  • Importance of Managing Security Function
  • Best Practices:  Budget and Establish Security Metrics
  • Best Practices:  Resources and Develop and Implement Strategies
  • Best Practices:  Completeness and Effectiveness of the Program
  • Business Scenario
  • (ISC)2 Code of Ethics
  • Quiz
  • Summary
  • Conclusion

Domain 02 - Asset Security
  • Objectives
  • Importance of Asset Security
  • Need for Information Classification
  • Information Classification Objectives
  • Government or Military Sector Classification
  • Commercial or Private Sector Classification
  • Information Classification Criteria
  • Data Classification Considerations
  • Role Responsible for Data Classification
  • Business Scenario
  • Data Management
  • Best Practices for Data Management
  • Data Policy
  • Data Ownership
  • Data Ownership:  Best Practices
  • Data Custodians
  • Data Quality
  • Data Quality:  Aspects
  • Data Quality Assurance and Quality Control
  • Data Documentation
  • Data Documentation Practices
  • Data Standards
  • Data Control Lifecycle
  • Data Specification and Modeling
  • Database Maintenance
  • Data Audit
  • Data Storage and Archiving
  • Data Security
  • Data Access, Sharing, and Dissemination
  • Data Publishing
  • Data Handling Requirements
  • Media Resource Protection
  • Data Remanence
  • Business Scenario
  • Asset Management
  • Software Licensing
  • Equipment Lifecycle
  • Protecting Privacy
  • Ensuring Appropriate Retention
  • Data Security Controls
  • Data in Transit:  Best Practices
  • Scoping and Tailoring
  • Standards Selection:  US DoD
  • Standards Selection:  International Standards
  • Standards Selection:  National Cyber Security Framework Manual
  • Standards Selection:  Center for Strategic and International Studies
  • Standards Selection:  Critical Security Controls
  • Standards Selection:  Security Content Automation Protocol
  • Framework for Improving Critical Infrastructure Cybersecurity
  • Business Scenario
  • Quiz
  • Summary
  • Conclusion

Domain 03 - Security Engineering
  • Objectives
  • Security Architecture and Design - Case Study
  • Security Engineering
  • Architecture Framework
  • Zachman Framework
  • TOGAF
  • ITIL
  • Creating a Security Architecture
  • Enterprise Security Architecture
  • Common Security Services in ESA
  • SABSA Framework
  • SABSA Matrix
  • Business Scenario
  • ISO/IEC 27001:  2013 Security Standards
  • ISO/IEC 27002:  Code of Practice for Information Security Management
  • Security Models
  • State Machine Model
  • Multilevel Security Models
  • Matrix-Based Model
  • Non-Interference Model
  • Information flow model
  • Examples of Security Models: BellLaPadula Confidentiality Model
  • Examples of Security Models: Biba Integrity Model
  • Examples of Security Models: ClarkWilson integrity model
  • BrewerNash, GrahamDenning, and HarrisonRuzzoUllman models
  • Business Scenario
  • Evaluation Criteria
  • CSEC
  • Information Technology Security Evaluation Criteria
  • Common Criteria
  • Common Criteria Evaluation Process
  • Common Criteria Levels
  • Payment Card Industry Data Security Standard
  • Certification and Accreditation
  • Certification and Accreditation Standards
  • SEICMMI
  • SEICMMI Levels
  • Business Scenario
  • System Security Architecture
  • Mainframes and Other Thin Client Systems
  • Middleware and Embedded Systems
  • Pervasive Computing and Mobile Computing Devices
  • System Components:  Processors
  • System Components:  Memory
  • System Components:  Storage
  • System Components:  Trusted Computing Base (TCB)
  • System Components:  Reference Monitor
  • System Components:  Trusted Platform Module (TPM)
  • System Components:  Peripherals and Other Input/Output Devices
  • System Components:  Operating System
  • System Components:  Ring Model
  • System Components:  System Kernel
  • Distributed Systems
  • Virtualization
  • Hypervisor
  • Cloud Computing
  • Service models
  • Grid Computing
  • Peer to Peer Networking (P2P)
  • Business Scenario
  • Security Threats and Countermeasures
  • Assessing and Mitigating Vulnerabilities and Threats
  • Best Practices
  • Best Practices:  Techniques and Technologies
  • Introduction to Cryptography
  • Cryptographic Lifecycle
  • Algorithm or Protocol Governance
  • Cryptography Terms
  • Strength of a Cryptosystem
  • Cryptography Methods:  Substitution Cipher
  • Cryptography Methods:  Transposition Cipher
  • Cryptography Methods:  Book or Running Key Cipher
  • Cryptography Methods:  Concealment Cipher
  • Cryptography Methods:  Steganography and DRM
  • Business Scenario
  • Introduction to Symmetric Cryptography
  • Symmetric Key Ciphers
  • Block Cipher
  • Stream Cipher
  • Block Cipher Designs
  • Data Encryption Standard (DES)
  • DES Algorithm
  • DES Operation Modes:  Electronic Code Book
  • DES Operation Modes:  Cipher Block Chaining
  • DES Operation Modes:  Cipher Feed Back
  • DES Operation Modes:  Output Feed Back
  • DES Operation Modes:  Counter
  • Triple DES
  • Advanced Encryption Standard (AES)
  • AES Algorithm
  • AES Algorithm:  Key Expansion and Initial Round
  • Advanced Encryption Standard (AES) Algorithm:  Rounds
  • AES Algorithm:  Final Round
  • Other Symmetric Systems
  • Business Scenario
  • Introduction to Asymmetric Cryptography
  • Introduction to Asymmetric Cryptography:  Diagram
  • Introduction to RSA Algorithm
  • RSA Algorithm Process
  • Other Types of Asymmetric Cryptography:  Elliptic Curve Cryptosystems
  • Other Types of Asymmetric Cryptography:  Diffie-Hellman Key Exchange
  • Public Key Cryptography
  • Symmetric vs. Asymmetric Cryptography
  • Advantages and Disadvantages
  • Introduction to Public Key Infrastructure
  • PKI Certification
  • PKI Steps:  Part 1
  • PKI Steps:  Part 2
  • One-Way Hash
  • Hashing Algorithms
  • Salting
  • Message Authentication Code (MAC)
  • Digital Signatures
  • Key Management
  • Key Management Principles
  • Escrowed Encryption
  • Business Scenario
  • Need for Physical and Environmental Security
  • Business Scenario
  • Site and Facility Design Criteria
  • Information Protection Environment
  • Crime Prevention Through Environmental Design (CPTED)
  • Site Location
  • Construction
  • Support Facilities
  • Business Scenario
  • Secure Operational Areas
  • Business Scenario
  • Environmental Controls
  • Fire Detection and Suppression
  • Power Supply
  • HVAC
  • Training and Awareness
  • Business Scenario
  • Quiz
  • Summary
  • Conclusion

Domain 04 - Communications and Network Security
  • Objectives
  • Importance of Communications and Network Security:  Case Study
  • Introduction to Secure Network Architecture and Design
  • Open Systems Interconnection
  • OSI Model Layers
  • Physical Layer
  • Data Link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer
  • Transmission Control Protocol/Internet Protocol (TCP/IP) Model
  • Network Access Layer and Internet Layer
  • Host-to-Host Layer and Application Layer
  • Comparison of OSI and TCP/IP Models
  • Introduction to IP Addressing
  • IPv4 and IPv6
  • Classful IP Addressing
  • Class A
  • Class B
  • Class C
  • Class D and Class E
  • Classless Inter-Domain Routing
  • Private Networks and Loopback Address
  • Types of IP Addressing
  • Routed and Routing Protocols
  • Types of Network Protocols
  • Transmission Control Protocol (TCP)
  • User Datagram Protocol (UDP)
  • Internet Protocol
  • Address Resolution Protocol
  • Internet Control Message Protocol (ICMP)
  • Hypertext Transfer Protocol (HTTP)
  • Implications of Multi-Layer Protocols
  • Distributed Network Protocol
  • LAN/Network Technologies
  • Transmission Media
  • Twisted Pair
  • Coaxial Cable Box
  • Fiber-Optic Cable Box
  • Network Topologies
  • Media Access Technologies
  • Carrier-Sense Multiple Access with Collision Detection
  • Carrier-Sense Multiple Access with Collision Avoidance
  • Flavors of LAN transmission methods
  • List of Networking Devices
  • VLANs
  • Gateways
  • Network Access Control Devices
  • Packet-Filtering and Application-Level
  • Circuit-Level and Stateful-Inspection
  • Firewall Architectures
  • Network Security Terms
  • Business Scenario
  • Networks
  • Types of Networks
  • WAN Technologies
  • WAN Switching and Devices
  • Network Address Translation and Frame Relay
  • Multi-Protocol Label Switching and VoIP
  • Fiber Channel over Ethernet and Internet Small Computer System Interface
  • Virtualized Networks
  • Introduction to Remote Access
  • VPN using PPTP and L2TP
  • Internet Security Protocol (IPsec)
  • Internet Security Protocol (IPsec) Modes of Operation
  • IPsec Security Protocols:  Authentication Header (AH)
  • IPsec Security Protocols:  Encapsulating Security Payload (ESP)
  • Components of the IPsec Process
  • IPsec Process
  • Secure Access Protocols
  • Remote Access Security Methods
  • Multimedia Collaboration
  • Wireless Technologies
  • IEEE Wireless Standards and Spread-Spectrum Technologies
  • Direct Sequence Spread Spectrum and Frequency-Hopping Spread Spectrum
  • WLAN Operational Modes
  • Bluetooth
  • Bluetooth Attack
  • Blue Jacking and Blue Snarfing
  • Blue Bugging, Backdoor Attacks, and Denial of Service Attacks
  • Wireless Security
  • Business Scenario
  • Network Attacks
  • Network Attacks:  Countermeasures
  • Quiz
  • Summary
  • Conclusion

Domain 05 - Identity and Access Management
  • Objectives
  • Importance of Identity and Access Management in Information Security
  • Controlling Physical and Logical Access to Assets
  • Access Subject Object and Access controls
  • Identity and Access Management Policy
  • Identification Authentication and Authorization
  • Identity Management
  • Identity and Access Provisioning Lifecycle
  • Guidelines for User Identification
  • Verifying Identification Information
  • Strong Authentication
  • Biometrics:  Characteristics
  • Types of Biometrics
  • FRR FAR CER
  • Passwords
  • Password Types
  • Tokens
  • Token Device:  Synchronous
  • Token Device:  Asynchronous
  • Memory Cards and Smart Cards
  • Attacks on Smart Cards:  Fault Generation and Micro-Probing
  • Access Criteria
  • Authorization Concepts
  • Identity Management Implementation
  • Password Management
  • Directory Management
  • Directory Technologies
  • Accounts Management
  • Profile Management
  • Web Access Management
  • Single Sign-On (SSO)
  • SSO Technologies
  • Kerberos
  • Kerberos Steps
  • Problems with Kerberos
  • Business Scenario
  • Access Control Types:  Security Layer
  • Access Control Types:  Functionality
  • Business Scenario
  • Access Control Models:  DAC
  • Access Control Models:  MAC
  • Access Control Models:  RBAC
  • Business Scenario
  • Access Control Concepts
  • Types of Access Control Administration
  • Remote Authentication Dial-In User Service (RADIUS)
  • TACACS and TACACS+
  • DIAMETER
  • Accountability
  • Session Management
  • Registration and Proof of Identity
  • Credential Management Systems
  • Credential Management Systems:  Risks and benefits
  • Federated Identity Management
  • Federated Identity Management Models
  • Identity as a Service
  • Identity as a Service:  Functionality
  • Identity as a Service:  Possible Issues
  • Integrate Third-Party Identity Services
  • Unauthorized Disclosure of Information
  • Threats to Access Control
  • Protection against Access Control Attacks
  • Access Control Best Practices
  • Quiz
  • Summary
  • Conclusion

Domain 06 - Security Assessment and Testing
  • Objectives
  • Security Assessment and Testing:  Introduction
  • Assessment and Test Strategies
  • Vulnerability Assessment
  • Penetration Testing
  • Log Management
  • Log Management:  Advantages and Challenges
  • Log Management:  Best Practices
  • Log Management:  Operational Process
  • Logged Events
  • Synthetic Transactions
  • Reasons to Use Synthetic Transactions
  • Code Review and Testing
  • Testing Techniques
  • Security Testing in the SDLC
  • Software Product Testing Levels
  • Misuse Case Testing
  • Misuse Case Testing:  Scenarios
  • Test Coverage Analysis
  • Interface Testing
  • API Testing
  • Interface Testing (contd.)
  • GUI Testing
  • Common Software Vulnerabilities
  • Business Scenario
  • Information Security Continuous Monitoring
  • Information Security Continuous Monitoring:  Strategy and Process
  • Risk Evaluation and Control:  Metrics
  • Security Controls Monitoring Frequencies
  • ISCM:  Benefits
  • Key Performance and Risk Indicators
  • Internal and Third Party Audits
  • Audit Frequency and Scope
  • Statement on Auditing Standards No. 70
  • Service Organization Controls
  • SOC 1 Report
  • SOC 2 Report
  • SOC 3 Report
  • SOC 1, SOC 2, and SOC 3 Comparison
  • Audit Process:  Audit Preparation Phase
  • Audit Process:  Audit Phase
  • Business Scenario
  • Quiz
  • Summary
  • Conclusion

Domain 07 - Security Operations
  • Objectives
  • Importance of Security Operations:  Case Study
  • Introduction to Investigations
  • Investigation Challenges
  • Investigations:  Primary Activities
  • Crime Scene
  • Forensic Investigation Guidelines
  • Incident Response Terminologies
  • Incident Response Goals
  • Incident Response Team
  • Incident Response Procedures
  • Business Scenario
  • Evidence
  • Evidence Lifecycle
  • Chain of Evidence
  • Types of Evidence
  • Computer Forensics Procedure
  • Requirements for Investigation Types
  • Logging and Monitoring Activities
  • Intrusion Detection System
  • Intrusion Prevention System
  • Security Information and Event Management (SIEM)
  • Security Information and Event Management (SIEM) Characteristics
  • Continuous Monitoring
  • Egress Filtering
  • Data Leak or Loss Prevention (DLP)
  • Steganography and Digital Watermarking
  • Business Scenario
  • Secure Provisioning of Resources through Configuration Management
  • Introduction to Security Operations
  • Security Operations Concepts
  • Security Operations
  • Effects of Operations Controls on C.I.A.
  • Business Scenario
  • Operational Resilience
  • Threats to Operations
  • Vulnerabilities
  • Controls
  • Business Scenario
  • Need for Controlling Privileged Accounts
  • Identity and Access Management
  • Types of Accounts
  • Commonly Used Roles
  • Monitoring Special Privileges
  • Service Level Agreements (SLAs)
  • Business Scenario
  • Protect Valuable Assets
  • Protecting Physical Assets
  • Protecting Information Assets
  • Protecting Resources
  • Controls for Protecting Assets:  Hardware Controls
  • Controls for Protecting Assets:  Software Controls
  • Controls for Protecting Assets:  Media Controls
  • Controls for Protecting Assets:  Administrative Controls
  • Cloud and Virtual Storage
  • Cloud and Virtual Storage Security Issues
  • Types of Virtualized Storage
  • Hard Copy Records
  • Business Scenario
  • Incident Management
  • Security Measurements, Metrics, and Reporting
  • Managing Security Technologies
  • Incident Management:  Detection Phase
  • Intrusion Detection System
  • Security Information Event Management (SIEM)
  • Anti-Malware Systems
  • Monitoring Techniques:  Violation Analysis
  • Incident Management:  Other Phases
  • Trusted Recovery and System Recovery
  • Problem Management
  • Operating and Maintaining Preventive Measures
  • Patch Management
  • Vulnerability Management
  • Change Management
  • Change Control Process
  • Configuration Management
  • Business Scenario
  • Develop a Recovery Strategy
  • Types of Recovery:  Business Recovery and Facility and Supply Recovery
  • Types of Recovery:  User Recovery
  • Types of Recovery:  Operational Recovery
  • Recovery Partners Strategy
  • Backup Sites
  • Backup Methods
  • Importance of Maintaining Resilient Systems
  • Redundancy and Fault Tolerance
  • Redundancy and Fault Tolerance Methods
  • Best Practices for Backup and Recovery
  • Business Scenario
  • Disaster Recovery:  Planning Design and Development
  • Planning Design and Development:  Step 1 and Step 2
  • Planning Design and Development:  Step 3 and Step 4
  • Disaster Recovery Phases:  Implementation, Testing, and Training
  • Importance of Testing
  • Types of Testing
  • Training
  • Disaster Recovery Phases:  Maintenance
  • Business Scenario
  • Perimeter Security
  • Barriers
  • Fences
  • Gates
  • Walls and Bollards
  • Perimeter Intrusion Detection
  • Business Scenario
  • Importance of Lighting
  • Types of Lighting Systems
  • Types of Lights
  • Access Control
  • Types of Access Control Systems
  • Business Scenario
  • Building and Inside Security
  • Personnel Security
  • Business Scenario
  • Quiz
  • Summary
  • Conclusion

Domain 08 - Software Development Security
  • Objectives
  • Importance of Software Development Security
  • System Environments
  • Distributed Environment
  • Client/Server Systems and Local Environment
  • Distributed Data Processing and Agents
  • Applets
  • Programming Concepts
  • Complier Vs Interpreter
  • Programming and Software
  • Threats in the Software Environment
  • Business Scenario
  • System Life Cycle and Systems Development
  • Systems Development Life Cycle
  • SDLC:  Operation and Maintenance
  • Integrated Product Team (IPT)
  • DevOps
  • Software Testing Methods
  • Software Testing Levels
  • Application Controls
  • Software Development Methods
  • Java Security
  • Secure Software Development Best Practices
  • Business Scenario
  • Object-Oriented Programming:  Terms
  • Object-Oriented Programming:  Definition
  • Distributed Object-Oriented Systems
  • Object Request Brokers
  • COM:  Component Object Model
  • DCOM:  Distributed Component Object Model
  • CORBA:  Common Object Request Broker Architecture
  • Software Security and Assurance
  • Software Security: XML and Security Assertion Markup Language
  • Software Security: SOA
  • Audit and Assurance Mechanisms
  • Assessing the Effectiveness of Software Security
  • Assessing the Security Impact of Acquired Software
  • Code Repositories and Application Programming Interfaces
  • Business Scenario
  • Database and Data Warehousing Environments
  • Database Terms
  • Types of Databases
  • Database Threats and Vulnerabilities
  • Introduction to Data Warehousing
  • Data Warehousing Concepts
  • Database Normalization
  • DBMS Controls
  • Business Scenario
  • Malware Types
  • Malware Protection
  • Business Scenario
  • Importance and Role of Knowledge Management
  • Knowledge-Based System/Artificial Intelligence
  • Knowledge-Based System:  Expert System
  • Knowledge-Based System:  Neural Network
  • Web Application Environment:  Threats and Vulnerabilities
  • Web Application Environment Security
  • The Ten Best Practices for Secure Software Development(ISC)2
  • Quiz
  • Summary
  • Conclusion
 

Prerequisites

This training is intended for professionals who want to acquire the credibility and mobility to advance within their current Information Security careers. To pursue training in CISSP, it is mandatory that you have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP - CBK 2015.

 

End of Course Instructions

The CISSP exam is a computer-based test (CBT) administered at Pearson VUE Testing centers around the world. Please follow these steps to register for the exam:
  • Go to www.pearsonvue.com/isc2 to register for a test appointment.
  • Select the most convenient test center.
  • Book an exam-slot and make the payment.

You will receive confirmation from Pearson VUE with the appointment details, test center location, and other relevant instructions, if any.

Please note that your registration information will be transferred to (ISC), and all communication about the testing process from (ISC) and Pearson VUE will be sent to you via email. Please refer to the exam outline for CISSP by (ISC) for more details: https://www.isc2.org/uploadedfiles/%28isc%292_public_content/exam_outlines/cissp-cib.pdf
 

Quiz Information

This course provides five simulation exams, each with 250 questions, and eight domain-specific test papers.

Got questions? Contact us below or call 877-881-2235

Why Choose 360training.com?

  • Fast and easy courses completion
  • Get an education faster than at traditional colleges!
  • 100% online - No classroom attendance required.
  • Unlimited 24x7 online customer support
  • Over 500,000+ certified nationwide.