products:ict:security:cissp:cissp_course_outline
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
products:ict:security:cissp:cissp_course_outline [2024/03/30 16:06] – [2. **Asset Security:**] wikiadmin | products:ict:security:cissp:cissp_course_outline [2024/03/30 20:20] (current) – [5. Identity and Access Management (IAM):] wikiadmin | ||
---|---|---|---|
Line 4: | Line 4: | ||
The Certified Information Systems Security Professional (CISSP) certification is one of the most recognized and prestigious certifications in the field of cybersecurity. The CISSP exam covers a broad range of topics related to information security, and CISSP courses typically follow an extensive curriculum to prepare candidates for the exam. Here's a typical course outline for a CISSP training program: | The Certified Information Systems Security Professional (CISSP) certification is one of the most recognized and prestigious certifications in the field of cybersecurity. The CISSP exam covers a broad range of topics related to information security, and CISSP courses typically follow an extensive curriculum to prepare candidates for the exam. Here's a typical course outline for a CISSP training program: | ||
- | ===== 1. **Introduction to Information Security and Risk Management:** ===== | + | ===== 1. Introduction to Information Security and Risk Management: ===== |
Line 75: | Line 75: | ||
3.1. **Security Models and Frameworks: | 3.1. **Security Models and Frameworks: | ||
- | | + | |
- | - Understanding security frameworks such as the OSI model, TCP/IP model, and NIST Cybersecurity Framework. | + | [[products: |
- | | + | |
- | - Frameworks for designing and implementing security controls (e.g., COBIT, ITIL, ISO 27001/ | + | [[products: |
+ | |||
+ | [[products: | ||
+ | |||
+ | |||
+ | [[products: | ||
3.2. **Security Engineering Principles: | 3.2. **Security Engineering Principles: | ||
Line 111: | Line 116: | ||
- | 1. **Network Architecture and Design:** | + | 4.1. **Network Architecture and Design:** |
- Understanding network architecture principles and components. | - Understanding network architecture principles and components. | ||
- Different types of network topologies (e.g., star, mesh, ring). | - Different types of network topologies (e.g., star, mesh, ring). | ||
Line 119: | Line 124: | ||
- Virtual private network (VPN) architectures and implementations. | - Virtual private network (VPN) architectures and implementations. | ||
- | 2. **Secure Communication Channels:** | + | 4.2. **Secure Communication Channels:** |
- | - Secure communication protocols (e.g., SSL/TLS, HTTPS, SSH) and their role in ensuring confidentiality, | + | |
- | - Implementing secure email protocols (e.g., S/MIME, PGP) for secure email communication. | + | |
- | - Secure file transfer protocols (e.g., SFTP, FTPS) for secure file transfers. | + | |
- | - Principles of secure instant messaging and collaboration tools. | + | |
- | 3. **Network Security Protocols: | + | [[products: |
+ | |||
+ | [[products: | ||
+ | |||
+ | |||
+ | [[products: | ||
+ | |||
+ | [[products: | ||
+ | |||
+ | 4.3. **Network Security Protocols: | ||
- Common network security protocols (e.g., IPsec, SSL/TLS, SNMP, SSH) and their roles in securing network communication and management. | - Common network security protocols (e.g., IPsec, SSL/TLS, SNMP, SSH) and their roles in securing network communication and management. | ||
- Understanding the purpose and implementation of intrusion detection and prevention systems (IDS/IPS). | - Understanding the purpose and implementation of intrusion detection and prevention systems (IDS/IPS). | ||
Line 132: | Line 142: | ||
- Secure DNS (Domain Name System) protocols and techniques. | - Secure DNS (Domain Name System) protocols and techniques. | ||
- | 4. **Wireless Security:** | + | 4.4. **Wireless Security:** |
- Wireless networking fundamentals (e.g., Wi-Fi standards, frequency bands). | - Wireless networking fundamentals (e.g., Wi-Fi standards, frequency bands). | ||
- Wireless security threats and vulnerabilities. | - Wireless security threats and vulnerabilities. | ||
Line 162: | Line 172: | ||
3. **Authentication and Authorization Mechanisms: | 3. **Authentication and Authorization Mechanisms: | ||
- Authentication fundamentals (e.g., factors of authentication - something you know, something you have, something you are). | - Authentication fundamentals (e.g., factors of authentication - something you know, something you have, something you are). | ||
- | | + | |
+ | [[products: | ||
- Single-factor vs. multi-factor authentication. | - Single-factor vs. multi-factor authentication. | ||
- Federation and trust models for authentication (e.g., SAML, OAuth, OpenID Connect). | - Federation and trust models for authentication (e.g., SAML, OAuth, OpenID Connect). | ||
Line 168: | Line 180: | ||
4. **Identity Federation and Single Sign-On:** | 4. **Identity Federation and Single Sign-On:** | ||
- | | + | |
- | - Single sign-on (SSO) principles and benefits. | + | [[products: |
- | - Federation standards and protocols (e.g., SAML, OAuth, OpenID Connect). | + | |
- | - Implementing SSO solutions across multiple domains and applications. | + | [[products: |
- | - Federated identity management considerations for cloud-based services and hybrid environments. | + | |
+ | [[products: | ||
+ | |||
+ | [[products: | ||
+ | |||
+ | [[products: | ||
This section covers key concepts and practices related to identity and access management, including access control fundamentals, | This section covers key concepts and practices related to identity and access management, including access control fundamentals, |
products/ict/security/cissp/cissp_course_outline.1711796776.txt.gz · Last modified: 2024/03/30 16:06 by wikiadmin