Lecture-1 Understand and Apply Concepts of Confidentiality, Integrity and Availability
· Information Security Fundamentals
· Interactive Exercise: Security Fundamentals
· Practical Exercise
Lecture-2 Evaluate and Apply Security Governance Principles
· Frameworks, Benchmarks, and Guidelines
· Leadership Roles and Responsibilities
· Interactive Exercise: Governance Roles and Responsibilities
· Practical Exercise
Lecture-3 Determine Compliance Requirements
· Regulatory and Contractual Obligations
· Privacy and Data Protection
· Practical Exercise
Lecture-4 Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context
· Cybercrime and Data Breaches
· Licensing and Intellectual Property Law
· Practical Exercise
Lecture-5 Understand, Adhere to and Promote Professional Ethics
· Organizational and Professional Ethics
· Practical Exercise
Lecture-6 Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines
· Information Security Policy
· Practical Exercise
Lecture-7 Identify, Analyze, and Prioritize Business Continuity (BC) Requirements
· Business Continuity Planning
· Business Impact Analysis
· Interactive Exercise: Business Impact Analysis Metrics_From AR (LMS)
· Practical Exercise
Lecture-8 Contribute to and Enforce Personnel Security Policies and Procedures
· Personnel Policies and Agreements
· Practical Exercise
Lecture-9 Understand and Apply Risk Management Concepts
· Risk Management Concepts
· Risk Assessment
· Interactive Exercise: Quantitative Assessment
· Countermeasure Selection
· Interactive Exercise: Identifying Control Categories
· Practical Exercise
Lecture-10 Understand and Apply Threat Modeling Concepts and Methodologies
· Threat Modeling
· Attack Vectors
· Exercise: Threats, Vulnerabilties and Exploits
· Practical Exercise
Lecture-11 Apply Risk Management Concepts to the Supply Chain
· Supply Chain Risk Management
· Practical Exercise
Lecture-12 Establish and Maintain a Security Awareness, Education, and Training Program
· ETA Principles and Practices
· Social Engineering Training
· Interactive Exercise: Social Engineering
· Practical Exercise
Lecture-13 Identify and Classify Information and Assets
· Classification Frameworks
· Interactive Exercise: Classification
· Practical Exercise
Lecture-14 Determine and Maintain Information and Asset Ownership
· Asset Ownership and Management
· Practical Exercise
Lecture-15 Protect Privacy
· Privacy Principles
· Interactive Exercise: Privacy Principles
· Practical Exercise
Lecture-16 Ensure Appropriate Asset Retention
· Data Retention and Destruction
· Interactive Exercise: Retention and Destruction
· Practical Exercise
Lecture-17 Determine Data Security Controls
· Data Security Standards and Selection
· Practical Exercise
Lecture-18 Establish Information and Asset Handling Requirements
· Labeling and Handling Standards
· Practical Exercise
Lecture-19 Implement and Manage Engineering Processes Using Secure Design Principles
· Security Design Principles
· Practical Exercise
Lecture-20 Understand the Fundamental Concepts of Security Models
· Information Security Models
· Interactive Exercise: Security Models
· Practical Exercise
Lecture-21 Select Controls Based Upon Systems Security Requirements
· Security Evaluation Models
· Practical Exercise
Lecture-22 Understand Security Capabilities of Information Systems
· Information Systems Security Capabilities
· Practical Exercise
Lecture-23 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
· Traditional Computing Environments
· Cloud Computing
· Interactive Exercise: Cloud Delivery Models
· Practical Exercise
Lecture-24 Assess and Mitigate Vulnerabilities in Web-based Systems
· Web Vulnerabilities
· Interactive Exercise: Web Vulnerabilities
· Practical Exercise
Lecture-25 Assess and Mitigate Vulnerabilities in Mobile Systems
· Mobile Systems Vulnerabilities
· Practical Exercise
Lecture-26 Assess and Mitigate Vulnerabilities in Embedded Systems
· Embedded Systems Vulnerabilities
· Practical Exercise
Lecture-27 Apply Cryptography
· Cryptographic Fundamentals
· Symmetric Encryption
· Interactive Exercise: Encryption Ciphers
· Asymmetric Encryption
· Hashing and Digital Signatures
· Interactive Exercise: Digital Signatures
· PKI and Digital Certificates
· Cryptographic Attacks and Vulnerabilities
· Interactive Exercise: Crypto Attacks
· Practical Exercise
Lecture-28 Apply Security Principles to Site and Facility Design
· Physical Security Principles
· Practical Exercise
Lecture-29 Implement Site and Facility Security Controls
· Site and Facility Security Controls
· Environmental Issues and Controls
· Practical Exercise
Lecture-30 Implement Secure Design Principles in Network Architectures
· Network Models and IP Convergence
· Interactive Execise: OSI & TCP/IP Models
· Non-IP Multilayer Protocols
· Wireless Networks
· Interactive Exercise: Wireless Networks
· Practical Exercise
Lecture-31 Secure Network Components
· Transmission and Connectivity
· Network Access Control Devices
· Endpoint Security
· Practical Exercise
Lecture-32 Implement Secure Communication Channels According to Design
· Voice and Multimedia
· Remote Access
· Interactive Exercise: IPsec
· Data Communications
· Virtualization and Software-defined Networks
· Interactive Exercise: Virtualization
· Practical Exercise
Lecture-33 Control Physical and Logical Access to Assets
· Access Control Fundamentals
· Practical Exercise
Lecture-34 Manage Identification and Authentication of People, Devices, and Services
· Identification and Authentication
· Interactive Exercise: Authentication
· Identity and Access Services
· Practical Exercise
Lecture-35 Integrate Identify as a Third-party Service
· Identity Management (IdM)
· Interactive Exercise: IdM
· Practical Exercise
Lecture-36 Implement and Manage Authorization Mechanisms
· Access Control Models
· Interactive Exercise: Access Control
· Practical Exercise
Lecture-37 Manage the Identity and Access Provisioning Lifecycle
· Identity and Access Management (IAM)
· Practical Exercise
Lecture-38 Design and Validate Assessment, Test, and Audit Strategies
· Assessment and Testing Overview
· Planning Engagements
· Practical Exercise
Lecture-39 Conduct Security Control Testing
· Infrastructure Assessments
· Interactive Exercise: Pen Testing
· Code Testing and Analysis
· Interactive Exercise: Code Testing
· Practical Exercise
Lecture-40 Collect Security Process Data
· Activity and Error Reporting
· Information Security Continuous Monitoring
· Practical Exercise
Lecture-41 Analyze Test Output and Generate Report
· Metrics, KPIs, and Business Intelligence
· Practical Exercise
Lecture-42 Conduct or Facilitate Security Audits
· Managing Third-party Audits and Examinations
· Interactive Exercise: Audits & Examinations
· Practical Exercise
Lecture-43 Understand and Support Investigations
· Evidence Handling
· Forensic Investigative Techniques
· Interactive Exercise: Forensics
· Practical Exercise
Lecture-44 Understand Requirements for Investigation Types
· Investigation Objectives and Requirements
· Practical Exercise
Lecture-45 Conduct Logging and Monitoring Activities
· Logging and Analysis
· Interactive Exercise: Logging & Analysis
· Practical Exercise
Lecture-46 Securely Provisioning Resources
· Configuration Management
· Practical Exercise
Lecture-47 Understand and Apply Foundational Security Operations Concepts
· Security Operations
· Practical Exercise
Lecture-48 Apply Resource Protection Techniques
· Media Management
· Mobile Device Management
· Interactive Exercise: Mobile Device Management
· Practical Exercise
Lecture-49 Conduct Incident Management
· Incident Management Planning
· Incident Response
· Interactive Exercise: Incident Response
· Practical Exercise
Lecture-50 Operate and Maintain Detective and Preventative Measures
· Detective and Preventative Solutions
· Firewalls and Filters
· IDS/IPS
· Interactive Exercise: Decision Engines
· Anti-Malware Techniques
· Practical Exercise
Lecture-51 Implement and Support Patch and Vulnerability Management
· Vulnerability Management
· Patch Management
· Threat Intelligence and Information Sharing
· Practical Exercise
Lecture-52 Understand and Participate in Change Management Processes
· Change Management
· Practical Exercise
Lecture-53 Implement Recovery Strategies
· Site Recovery Strategies
· Interactive Exercise: Site Recovery
· Data Backup and Restoration
· Resiliency and Fault Tolerance
· Interactive Exercise: Resiliency
· Practical Exercise
Lecture-54 Implement Disaster Recovery (DR) Processes
· DR Planning and Response
· Practical Exercise
Lecture-55 Test Disaster Recovery Plans (DRP)
· DRP Training and Testing
· Interactive Exercise: DR Exercises & Testing
· Practical Exercise
Lecture-56 Participate in Business Continuity (BC) Planning and Exercises
· BCP Relationship
· Practical Exercise
Lecture-57 Implement and Manage Physical Security
· Perimeter and Internal Security Controls
· Practical Exercise
Lecture-58 Address Personnel Safety and Security Concerns
· Personnel and Workplace Safety
· Practical Exercise
Lecture-59 Understand and Integrate Security in the Software Development Life Cycle (SDLC)
· Software Development Life Cycle
· Interactive Exercise: Software Development
· Secure DevOps
· Practical Exercise
Lecture-60 Identify and Apply Security Controls in Development Environments
· Staging and Deployment Strategies
· Interactive Exercise: Staging & Deployment
· Practical Exercise
Lecture-60 Identify and Apply Security Controls in Development Environments
· Staging and Deployment Strategies
· Interactive Exercise: Staging & Deployment
· Practical Exercise
Lecture-61 Assess the Effectiveness of Software Security
· Assessing the Effectiveness of Software Security
· Interactive Exercise: Assessment Options
· Practical Exercise
Lecture-62 Assess Security Impact of Acquired Software
· Software Procurement and Acquisition
· Practical Exercise
Lecture-63 Define and Apply Secure Coding Guidelines and Standards
· Source Code Weaknesses
· Interactive Exercise: Source Code Flaws
· Secure Coding Techniques
· Practical Exercise
Lecture-64 Acing Your Exam
· Understanding the Exam Structure
· Test Taking Strategies
· Preparing for Test Day
· Practical Exercise
Lecture-65 Certification Process
· What to Expect at the Testing Center
· Attaining and Maintaining Your CISSP Certification
· Practical Exercise