CISSP is the Certified Information Systems Security Professional certification of (ISC)2. In a world full of security threats, the need for skilled, knowledgeable information security professionals has never been greater. Your experience in the field is an important component of your value to both your organization and your community. But experience isn’t enough anymore. Employers need something quantifiable and verifiable to show them you have the necessary expertise. Certification by a respected accreditation organization is becoming indispensable to the Information Security professional. CISSP is the stepping stone towards quantifying and verifying one’s skills in the field of Information Security.
NIMIS is proud to organize trainings for this world renowned certification on regular basis. The experienced and certified instructors of NIMIS present the difficult concepts of CISSP in organized and understandable manner
Domain 1 –Information Security Governance & Risk Management
Identification of an organization’s information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines.
Domain 2 – Security Architecture & Design
Concepts, principles, structures, and standards used to design, monitor, and secure operating systems, equipment, networks, applications and controls used to enforce various levels of availability, integrity, and confidentiality.
Domain 3 – Access Control Systems & Methodology
A collection of mechanisms that work together to create security architecture to protect the assets of the information system.
Domain 4 – Applications Development & Security
Outlines the environment where software is designed and developed and explains the critical role software plays in providing security to the information system.
Domain 5 – Operations Security
Used to identify the controls over hardware, media, and operators and administrators with access privileges to any of these resources.
Domain 6 – Cryptography
The principles, means, and methods of disguising information to ensure its integrity, confidentiality and authenticity.
Domain 7 – Physical (Environmental) Security
Protection techniques for the entire facility, including all of the information system resources.
Domain 8 – Telecommunications & Network Security
Includes network structures, transmission methods, transport formats, security measures, and authentication.
Domain 9 – Business Continuity & Disaster Recovery Planning
Addresses the preservation of the business in the event of outages to normal business operations.
Domain 10 – Legal, Regulations, Investigation & Compliance
Addresses computer crime laws and regulations, investigative measures and techniques, and forensic evidence gathering.
Enhanced Knowledge and Skills
Demonstrate a working knowledge of information security
Offers international differentiator, solid credibility and undisputable marketability to career.
To obtain credentials that employers seek
To enhance your professional image
Benefits to the Enterprise
Who Should Attend?
This interactive training course is intended for the security administrator, Security professionals, internal and external auditors as well as practitioners of IS field who are increasingly involve in auditing and assessment of organization and have impact on the corporate decisions, business goals and customer services.
A standardized mock exam at the end of the training is also a part of the program which helps the participants passing the final certification exam.