CISSP Certification Training

 

Want to sharpen your information security skills? Learn to shrink haystacks and recognize needles with Greycampus’ new CISSP training course that prepares you for excellence in the CISSP certification exam held by (ISC)².

Discover some of the most amazing hacks that will help you to master the CISSP architecture and be fluent across security domains for all smart devices. Start your immersive learning journey with the CISSP certified professionals today.

Advance your security career. Get the world’s premier cybersecurity certification.

   Learning Experience

 

Simulated Exams

This course comes with access to a mock exam that mimics the real thing, followed by exam analytics to spot and work on your weaknesses.

Live Bootcamp

Building on our self-paced courseware, the boot camps will enhance your learning strategy. Additionally, there are workbooks, and cheat sheets to help you solve problems with ease.

Study Plan

From tutorial videos and gamified learning modules to keep you engaged with the study material and study material for offline use, take the path of least resistance to acing CISSP Exam.

Support System

Get access to the dedicated instructor helpline and clear all your subject-related doubts. For other queries, our customer support team is available round the clock.

Course Completion Certificate

GreyCampus will provide you with a Course Completion Certificate which you can add to your resume to stand out in the competition.

Mentorship

From interactive exam-solving sessions to employing tricks and strategies, ace the CISSP exam. Additionally, receive assistance with the application process from our experts.

Program Curriculum

• Introduction to the course

• Introduction

• CISSP Certification Goals

• Security Professional Certification Value

• Exam Common Body of Knowledge

• Becoming a CISSP

  • • Introduction

    • Cryptography Concepts Part1

    • Cryptography Concepts Part2

    • History of Cryptography

    • Cryptosystem Features

    • Encryption Systems Part1

    • Encryption Systems Part2

    • Substitution Ciphers

    • Symmetric Algorithms Part1

    • Symmetric Algorithms Part2

    • Asymmetric Algorithms

    • Message Integrity

    • Digital Signatures

    • Public Key Infrastructure Part1

    • Public Key Infrastructure Part2

    • Trusted Platform Module

    • Encryption Communication Levels

    • E-Mail Security

    • Internet Security

    • Cryptography Attacks

• Introduction

• Threat Mitigation Techniques

• Geographical-Man Made and Political Threats

• Site and Facility Design

• Perimeter Security

• Building and Internal Security

• Secure Data Centers and Fire Detection Systems

• Types of Power Issues

• HVAC Guidelines

• Equipment Security and Personal Security

• Introduction

• Security Model Concepts

• System Architecture

• Computing Platforms

• Virtual Computing and Security Services

• System Components

• Memory Concepts

• Enforcing Process Security and Multitasking

• System Security Architecture

• Security Models and Modes Part1

• Security Models and Modes Part2

• System Evaluation and Ass…

• Certification and Accreditation

• Security Architecture Threats

• Database Security and Distributed Systems Security

• Introduction

• Access Control Concepts

• Identification and Authentication

• Password Types and Management

• Ownership-Character-Physiological-Behavioral Factors

• Biometric Considerations

• Authorization Concepts Part1

• Authorization Concepts Part2

• User Accountability

• Vulnerability Assessment

• Penetration Testing and Threat Modeling

• Access Control Categories-Types-Models and Administration

• Provisioning Life Cycle and Access Control Monitoring

• Access Control Threats

• Introduction

• System Development Life Cycle

• Software Testing and Validation

• Software Development Security Best Practices

• Software Development Methods

• Programming Languages

• Database Architecture and Models

• Database Interface Languages

• Data Warehouse-Mining and Threats

• Database and Application Access Control

• Monitoring for Problems

• Software Threats and Security

• Introduction

• Principles and Terms

• Security Frameworks & Methodologies Part1

• Security Frameworks & Methodologies Part2

• Risk Assessment

• Asset Values-Vulnerabilities and Threats

• Quantitative Risk Analysis

• Safeguard Selection

• Risk Management

• Security Governance Components

• Security Policies

• Classification Life Cycle

• Responsibilities and Roles

• Personnel Security

• Security Awareness Training

• Introduction

• OSI and TCIP Models Part1

• OSI and TCIP Models Part2

• IP Addressing

• Transmission Methods

• Types of Cabling

• Network Topologies

• Network Protocols and Services

• Network Routing and Devices

• Network Connection Types Part1

• Network Connection Types Part2

• Network Authentication

• Wireless Technologies

• WLAN Security Methods

• Network Threats and Cabling Behaviors

• Introduction

• Operation Security Concepts

• Protecting Tangible and Intangible Assets

• Asset and Media Management

• Storage Options

• Network and Resource Management

• Incident Response and Change Management

• Patch Management-Audit and Review

• Threats and Preventative Measures

• Trusted Paths-Trusted Recovery and System Hardening

• Monitoring and Reporting

• Introduction

• Business Continuity and Disaster Recovery Concepts Part1

• Business Continuity and Disaster Recovery Concepts Part2

• BIA Development

• Business Continuity Planning

• Preventive Controls

• Recovery Strategies Part1

• Recovery Strategies Part2

• Data Backup Types

• Data Recovery Terms

• Critical Teams and Duties

• BCP Testing

• Introduction

• Digital Crime

• Computer Crime Concepts

• Major Legal Systems

• Intellectual Property Law

• Privacy Part1

• Privacy Part2

• Liability

• Incident Response

• Forensic and Digital Investigations Part1

• Forensic and Digital Investigations Part2

• Evidence Part1

• Evidence Part2

• Security Professional Ethics

• Course Outro

Program Benefits

Boost Career Prospects: According to a Cyber Security workforce study conducted by the (ISC)², there is a global workforce shortage of 2.9 million certified professionals. That’s why it is the best time to master your cybersecurity skills and land your dream job.

Amplify Earning Potential: Growth-driven industries across the globe consider professionals with hands-on cybersecurity experience indispensable. That’s why a CISSP certification is necessary for maximizing your earning potential. According to (ISC)², the average salary for CISSP certified professionals stands at US$131,030 per year.

Master Cybersecurity Landscape: With a deeper understanding of Cyber Security fundamentals and information security environment, CISSP certified professionals significantly contribute to the organizational ecosystem.

Where some of
our global
alumni work

Student
Experiences

 

View All  angle right

Star

Yas

I’ve had a great experience with greycampus. Coordination was very smooth and communication was flexible. I do appreciate that the instructor was such highly qualified. Bravo!

Star

John Riff

The Greycampus portal is very good, and resources are abundant.

Certificate

Frequently Asked Questions

A: Eligibility criteria for CISSP

  • Applicants must have at least five years of paid work experience acquired in 2 or more domains of the CISSP Common Body of Knowledge. Obtaining a 4-year college degree or regional equivalent or an additional credential from the list approved by (ISC)² will serve as 1 year of the experience required. Education credit will satisfy only 1 year of experience.
  • An applicant who does not have the experience required to become a CISSP can become an Associate of (ISC)² by passing the CISSP exam successfully. Then, the candidate will have 6 years to earn the 5 years experience required.

A:  Certified Information Systems Security Professional. Not to be confused with CISSP Program Concentrations.

A:  Intermediate – Professional. Base certification isAssociate of (ISC)2

A: 1. Exam Duration: 6 hours.

    2. Number of questions: 250.

    3. Question format: Multiple choice and advanced innovative questions.

A:  ISC2(www.isc2.org)

A:  Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Hardcover, iTunes, Kindle versions. Kindle version @ $56 (Amazon)

A: Industry sector(s): 

  • Information Technology
  • Information Security Designations
  • Security Consultant
  • Security Analyst
  • Security Manager
  • Security Systems Engineer
  • Security Auditor
  • Security Architect
  • Network Architect
  • Director of Security
  • IT Director/Manager
  • Chief Information Security Officer

A: 8 Domain Areas –

  • Security & Risk Management
  • Asset Security
  • Security Engineering
  • Communications & Network Security
  • Identity & Access Management
  • Security Assessment & Testing
  • Security Operations
  • Software Development Security

Note: CBK = Common Body of Knowledge

A: The additional aids endorsed by (ISC)²

  • Official (ISC)² CISSP Study Guide (Wiley). – Hardcover, e-Book. Kindle eBook @ $7.76
  • Official (ISC)² CISSP Practice Tests (Wiley). – Hardcover, e-Book. Kindle eBook @ $8.0 
  • CISSP for Dummies (Wiley). Paperback, Kindle. Kindle version @ $5.0 
  • Official CISSP Study App. Android, iOS versions. Individually @ <$10

A: For both Bootcamp and Without Bootcamp:

As soon as you register, an automated email with your receipt and your access credentials for audio-video lectures is sent to your registered email ID.

For Bootcamp*

  • Within 24 hours you will receive a welcome email directly from the training coordinator managing the specific workshop batch you’ve opted for.
  • 3 working days before the batch start date: You will receive a reminder from the training coordinator about the upcoming training.
  • On the workshop start date (1 hour before starting off): Your training coordinator will reach you to check if you’re having issues with logging online.
  • Last day of the workshop: Your training coordinator will ask you to share your feedback for the training.
  • 1 working day from the last day of the workshop: Your training coordinator will reach out to you with the next steps, like how to download your certificate(s) and how to avail of the post-training helpline (as applicable).

A: The process of getting a CISSP certification is:

Step 1: Register with Pearson Vue and book an exam ((ISC)² membership recommended).

Step 2: Review background questions, Agree to the Code of Ethics, and Pass the exam.

Step 3: Complete the Endorsement process (membership required). A current & active (ISC)² certified professional (any certification) must complete an online Endorsement Form. This needs to be done within 9 months from the exam date. After this, the exam needs to be re-taken. Alternatively, a candidate can opt for theAssociate of (ISC)2within this period.

Step 4 (Optional): On submission of the endorsement form, the candidate may be selected randomly for an audit. If so, the candidate needs to submit additional information as required before certification is granted.

A:  Recertification process for CISSP credential

  • Requirement: 40 Continuing Professional Education (CPE) credits each year for 3 years, and a total of 120 CPE credits for the 3 year period.
  • Fee payable: US $85 each year, billed at the end of a 3-year cycle. Failure to meet CPE requirements results in a ‘suspension’ status for 90 days. Failure to meet CPE requirements within the Suspension period results in decertification.

A:  Mode: CBT (Pearson Vue) No. of questions: 250 Duration: 6 hours Question type: Multiple choice, Drag & Drop, Hotspot Scoring pattern: Scaled 0 – 1000 similar to standardized tests. No. of questions correctly answered in an exam by an expert panel is given a scaled score of 700. Candidates’ scores are derived based on this. Results: Pass/ Fail. Failed candidates get extra details (rank order of domains by the percentage of questions answered correctly). Domain weightage:Security&Risk Management(16%), Asset Security (10%), Security Engineering (12%), Communication & Network Security (12%), Identity & Access Management (13%), Security Assessment & Testing (11%), Security Operations (16%), Software Development Security (10%)

A:  Online Self-Learning courses have a 3-day refund policy. If you are not satisfied with the course and report this over an email to elearning@greycampus.com within 3 days from the date of purchase, we will refund the entire amount.

This guarantee is considered void in any of the following cases. If the candidate has-

  • Completed more than 30% of the course
  • Downloaded any of the offline materials
  • Attempted one or more mock exams
  • Used exam vouchers

If any participant is not satisfied with the bootcamp session, he/she needs to inform us within 24 hours of the first session. We will refund the entire amount. Participants should communicate the same to us via email to support@greycampus.com.

The guarantee is valid for participants who have paid the entire enrollment fee.

A:  The average salary of CISSP certification holders ranges between $78,788 and $119,184 in the US (according to resources.infosecinstitute.com). 

  • The most common job positions for CISSP holders include the following:

  • Chief information security officer

  • Security systems administrator

  • Information assurance analyst

  • IT security engineer

  • Senior IT security consultant

and many more. 

A: No, this course does not include the exam.

A: GreyCampus provides exam registration services for learners across the training courses offered. Below are the exam registration terms and conditions that the delegates must comply with.

  • All exams are scheduled within 3 months from the date on which the learner registers for the course.
  • Registrants are not eligible for a refund of examination services’ registration fees.