SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
CISSP Introduction
Certified Information System Security Professional
https://www.udemy.com/introduction-to-the-cissp-security-
certification/
CISSP Introduction 2
CISSP Training Course Introduction
 Introductions
 (ISC)2 CISSP and other Certifications
 Course Objectives & Exam
 New Exam Questions
 Study Tips & Resources
Adrian Mikeliunas, Instructor
 Certified Information System Security Professional (CISSP)
 Certified Information Systems Auditor (CISA)
 30+ Years IT Experience, 15+ in Information Security
 Certified Linux Professional (LPI)
 Open Source Evangelist!
CISSP Introduction 3
CISSP Introduction 4
(ISC)2 and the CISSP
 The International Information Systems Security Certification Consortium
or (ISC)2 at https://www.isc2.org/
 Founded in 1989, (ISC)² issues Security Certifications & vendor-neutral
education products in more than 160 countries
 CISSP and SSCP meet the stringent requirements of ANSI/ISO/IEC
Standard 17024, a global benchmark for assessing and certifying
personnel
 International, not-for-profit leader in educating and certifying cyber,
information, software and infrastructure security professionals
CISSP Introduction 5
(ISC)2 Certification Programs
• Systems Security Certified Practitioner (SSCP)
• Certified Information Systems Security Professional (CISSP)
− Information Systems Security Architecture Professional (ISSAP)
− Information Systems Security Engineering Professional (ISSEP)
− Information Systems Security Management Professional (ISSMP)
• Certified Authorization Professional (CAP)
• Certified Secure Software Lifecycle Professional (CSSLP)
• Certified Cyber Forensics Professional (CCFP)
• HealthCare Information Security & Privacy Practitioner HCISPP
• Certified Cloud Security Professional (CCSP)
…
CISSP Introduction 6
Why Become a CISSP?
 Demonstrates a working knowledge of information security
 Confirms commitment to profession
 Offers a career differentiator, with enhanced credibility and
marketability
• Extra Compensation $$$
 Provides access to valuable resources, such as peer networking
and idea exchange
CISSP Introduction 7
Why Become a CISSP
 “The CISSP has emerged as one of the most prominent vendor-neutral
certifications.”
 “The CISSP provides a holistic approach to security, viewing it as a process,
not a product.”
 “At a basic minimum, an organization should have a CISSP on staff.”
 ISO/IEC Standard 17024 accredited
• DoD Directive 8570 Requirement
• http://iase.disa.mil/iawip/Pages/iabaseline.aspx
CISSP Introduction 8
Course Objectives
 At the end of this course students will:
• Be Familiar with the (ISC)2 Common Body of Knowledge (CBK)
including common terms, principles, lists, categories,
mechanisms, etc.
• Be familiar with the CISSP exam process
• Be able to develop a study plan for taking and passing the exam.
CISSP Introduction 9
Course Objectives
 THIS COURSE IS NOT:
• Security Engineering 101
− Not a basic course
− Knowledge is assumed
• Advanced Security Course
− Coverage of material is broad and not-in-depth
• Everything you need to pass the CISSP
− This course is a part of the strategy to pass the exam
− Home Study, Understanding Key Concepts,
and Memorization is required.
8 Domains, 8 Separate Courses!
 Security and Risk Management
 Asset Security
 Security Engineering
 Communication and Network Security
 Identity and Access Management
 Security Assessment and Testing
 Security Operations
 Software Development Security
CISSP Introduction 10
~1 domain per week…
Exam Preparation Plan
 Take the Pre-Course Assessment Exam in 60 minutes
 Plan on a minimum of 8 weeks to prepare for the Exam, more
depending on your level of proficiency
 Each week:
• 2 chapters (or about 1 domain)
 Practice Exam Questions
• www.cccure.org questions
CISSP Introduction 11
CISSP Introduction 12
CISSP Requirements
 https://www.isc2.org/cissp-how-to-certify.aspx
 Required Experience
• 5 Year of full time paid work experience in 2 or more of the 8 CBK
domains
− Or 4 years experience plus a college degree
 Pass the Exam
• Pass the CISSP exam with a scaled score of 700 points or greater
• Create an Account and Schedule your Exam
− http://www.vue.com/isc2/
CISSP Introduction 13
Associate of (ISC)2
 Can pass the CISSP examination, but lack
the years of practical work experience
• Must also subscribe to the (ISC)² Code of
Ethics and maintain their status in good
standing with (ISC)²
• After successfully passing the exam and
achieving the professional experience
requirements, Associate of (ISC)² status
can be converted to CISSP
CISSP Introduction 14
CISSP Exam
 Computer Based, Taken at Pearson’s Centers
BRING 2 Forms of ID!!!
• Pay $599
• 250 Total Questions, 225 are scored
• 25 are research questions
• Drawn from a pool of 10,000 questions
• Questions from all 10 domains of the CBK
• Multiple Choice, 4 choices
• Pass/Fail, 700 Points or greater
• 6 Hours
• Closed Book
• Results are sent via email within 2-6 weeks
After Passing the Exam
• Subscribe to the ISC2 Code of Ethics
• Submit a properly completed and executed Endorsement Form
− Signed by an active CISSP who has review your qualifications
− Must be submitted within 9 months of passing the exam
• Successfully pass an audit of their assertions regarding professional
experience, if the candidate is selected for audit
• Maintain your CISSP Certification
CISSP Introduction 15
CISSP Introduction 16
Continuing Professional Education (CPE)
 120 CPE credits every 3 years or retesting is required to maintain the
CISSP
• Attending educational courses or seminars
• Attending security conferences
• Member of an association / attending meetings
• Listening to vendor presentations
• Completing university/college courses
• Providing security training
• Publishing security articles or books
• Serving on industry boards
• Self-study
• volunteer work, (ISC)² volunteer committees
 20 CPEs must be posted during each calendar year!
 Yearly Fee of $85
2015 CBK: What’s New: Topics
 3rd Party Risk Management
 BYOD Risks (Bring Your Own Devices)
 IoT (Internet of Things)
 Software Defined Networks
 Cloud Identity Services (OAuth 2.0)
About 4% change…
CISSP Introduction 17
New Test Question Formats
 Majority: Multiple Choice, 4 candidate answers, you select one
correct one, occasionally more than one correct answer!
 New Questions:
• Scenario
• Drag and Drop
• Hot Box
CISSP Introduction 18
Scenario Questions
 Description:
• Situational: 1-2 paragraphs describing an environment, results of
an audit, etc.
• 3-5 questions on the scenario
 Tactics:
• Read the question first [to understand!]
• Consider “operational” issues (tradeoffs)
CISSP Introduction 19
Drag and Drop
CISSP Introduction 20
Which algorithms below are examples of
symmetric cryptography?
Advanced Encryption
Standard
Rivest Shamir
Adlemann
Diffie Hellman
El Gamal
Data Encryption
Standard
Hot Spot
CISSP Introduction 21
The diagram below is a design of a Public Key
Infrastructure to secure internet transactions. Within
the design is a Certificate Authority, a Registration
Authority, and a Validation Authority.
Click on the location of the registration authority.
CISSP Introduction 22
Resources
 ISC2: www.isc2.org
 Online Resources & Practice Exams www.cccure.org
 NIST Computer Security Resource Center http://csrc.nist.gov
 http://learncissp.com/resources/
 Shon Harris audio libraries & practice tests for EACH [old 10] Domains:
http://www.mhprofessional.com/sites/CISSPExams/
Books
 Sybex CISSP 2015
http://www.amazon.com/Certified-Information-
Security-Professional-Official/
 ISC2 Official CISSP
http://www.amazon.com/Official-Guide-CISSP-
Fourth-Press
CISSP Introduction 23
Questions?
CISSP Introduction 24
FREE Intro to CISSP course at
https://www.udemy.com/introduction-to-the-cissp-security-
certification/

Weitere ähnliche Inhalte

Was ist angesagt?

Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017FRSecure
 
Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4FRSecure
 
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017FRSecure
 
Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...master student
 
Item46763
Item46763Item46763
Item46763madunix
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Dilum Bandara
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Joshua Fonseca
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseShivamSharma909
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationShivamSharma909
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryInfosec
 
5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)Michael Man
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017FRSecure
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyShawn Riley
 
Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Outpost24
 
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
Slide Deck Class Session 11 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 11 – FRSecure CISSP Mentor Program
Slide Deck Class Session 11 – FRSecure CISSP Mentor ProgramFRSecure
 

Was ist angesagt? (20)

Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
 
Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4
 
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
 
Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...
 
Item46763
Item46763Item46763
Item46763
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)
 
CISSP Summary V1.1
CISSP Summary V1.1CISSP Summary V1.1
CISSP Summary V1.1
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident response
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 
5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 
Cissp certified information systems security professional - 27 th february ...
Cissp   certified information systems security professional - 27 th february ...Cissp   certified information systems security professional - 27 th february ...
Cissp certified information systems security professional - 27 th february ...
 
Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!
 
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
Slide Deck Class Session 11 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 11 – FRSecure CISSP Mentor Program
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
 

Andere mochten auch

Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6FRSecure
 
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramFRSecure
 
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor ProgramFRSecure
 
Slide Deck CISSP Class Session 3
Slide Deck CISSP Class Session 3Slide Deck CISSP Class Session 3
Slide Deck CISSP Class Session 3FRSecure
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1FRSecure
 
CISSP Week 6
CISSP Week 6CISSP Week 6
CISSP Week 6jemtallon
 
Slide Deck CISSP Class Session 7
Slide Deck CISSP Class Session 7Slide Deck CISSP Class Session 7
Slide Deck CISSP Class Session 7FRSecure
 
Maintaining PMP Credential
Maintaining PMP CredentialMaintaining PMP Credential
Maintaining PMP Credentialpritamdutt
 
Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2FRSecure
 
CISSP Information Systems Security Training Course
CISSP Information Systems Security Training CourseCISSP Information Systems Security Training Course
CISSP Information Systems Security Training CourseSalim Karim
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales DeckEvan Francen
 

Andere mochten auch (13)

5 Ways To Improve Cissp Exam Score Without Studying
5 Ways To Improve Cissp Exam Score Without Studying5 Ways To Improve Cissp Exam Score Without Studying
5 Ways To Improve Cissp Exam Score Without Studying
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
 
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
 
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
 
Slide Deck CISSP Class Session 3
Slide Deck CISSP Class Session 3Slide Deck CISSP Class Session 3
Slide Deck CISSP Class Session 3
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
 
CISSP Week 6
CISSP Week 6CISSP Week 6
CISSP Week 6
 
Slide Deck CISSP Class Session 7
Slide Deck CISSP Class Session 7Slide Deck CISSP Class Session 7
Slide Deck CISSP Class Session 7
 
Maintaining PMP Credential
Maintaining PMP CredentialMaintaining PMP Credential
Maintaining PMP Credential
 
Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2
 
CISSP Information Systems Security Training Course
CISSP Information Systems Security Training CourseCISSP Information Systems Security Training Course
CISSP Information Systems Security Training Course
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 

Ähnlich wie CISSP introduction 2016 Udemy Course

Certifications and Career Development for Security Professionals
Certifications and Career Development for Security ProfessionalsCertifications and Career Development for Security Professionals
Certifications and Career Development for Security ProfessionalsDan Houser
 
CISSP with Net Security Training
CISSP with Net Security Training CISSP with Net Security Training
CISSP with Net Security Training Drew Kahrs
 
How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?InfosecTrain
 
SSCP Certification Training in Dallas & Arlington, TX
SSCP Certification Training in Dallas & Arlington, TXSSCP Certification Training in Dallas & Arlington, TX
SSCP Certification Training in Dallas & Arlington, TXCCI Training Center
 
CCIE Service Provider
CCIE Service ProviderCCIE Service Provider
CCIE Service ProviderCisco Canada
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”Moshiul Islam, CISSP, CISA, CFE
 
Professional Designations IT Assurance
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurancea3virani
 
ISO 27001 Lead Auditor with Net Security Training
ISO 27001 Lead Auditor with Net Security Training ISO 27001 Lead Auditor with Net Security Training
ISO 27001 Lead Auditor with Net Security Training Drew Kahrs
 
Canberra Chapter Certification Information Session
Canberra Chapter Certification Information SessionCanberra Chapter Certification Information Session
Canberra Chapter Certification Information SessionDavid Berkelmans
 
Certified Information Systems Security Professional (CISSP) brochure
Certified Information Systems Security Professional (CISSP) brochureCertified Information Systems Security Professional (CISSP) brochure
Certified Information Systems Security Professional (CISSP) brochureKnowledgehut
 
Asis 2013 april updates
Asis 2013 april updatesAsis 2013 april updates
Asis 2013 april updatesPeggy OConnor
 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeMercury Solutions Limited
 
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptxssuserde23af
 

Ähnlich wie CISSP introduction 2016 Udemy Course (20)

Certifications and Career Development for Security Professionals
Certifications and Career Development for Security ProfessionalsCertifications and Career Development for Security Professionals
Certifications and Career Development for Security Professionals
 
CISSP with Net Security Training
CISSP with Net Security Training CISSP with Net Security Training
CISSP with Net Security Training
 
cissp.pdf
cissp.pdfcissp.pdf
cissp.pdf
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
Cissp classroom program ievision
Cissp classroom program ievisionCissp classroom program ievision
Cissp classroom program ievision
 
How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?
 
Cissp training program
Cissp training program Cissp training program
Cissp training program
 
CISSP Training Program
CISSP Training ProgramCISSP Training Program
CISSP Training Program
 
SSCP Certification Training in Dallas & Arlington, TX
SSCP Certification Training in Dallas & Arlington, TXSSCP Certification Training in Dallas & Arlington, TX
SSCP Certification Training in Dallas & Arlington, TX
 
CCIE Service Provider
CCIE Service ProviderCCIE Service Provider
CCIE Service Provider
 
ISACA Lietuva. Asociacija, sertifikacijos ir mokymai
ISACA Lietuva. Asociacija, sertifikacijos ir mokymaiISACA Lietuva. Asociacija, sertifikacijos ir mokymai
ISACA Lietuva. Asociacija, sertifikacijos ir mokymai
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
 
Professional Designations IT Assurance
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurance
 
ISO 27001 Lead Auditor with Net Security Training
ISO 27001 Lead Auditor with Net Security Training ISO 27001 Lead Auditor with Net Security Training
ISO 27001 Lead Auditor with Net Security Training
 
Canberra Chapter Certification Information Session
Canberra Chapter Certification Information SessionCanberra Chapter Certification Information Session
Canberra Chapter Certification Information Session
 
Certified Information Systems Security Professional (CISSP) brochure
Certified Information Systems Security Professional (CISSP) brochureCertified Information Systems Security Professional (CISSP) brochure
Certified Information Systems Security Professional (CISSP) brochure
 
Asis 2013 april updates
Asis 2013 april updatesAsis 2013 april updates
Asis 2013 april updates
 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First Time
 
CRISC sertifikacija
CRISC sertifikacijaCRISC sertifikacija
CRISC sertifikacija
 
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
 

Mehr von Adrian Mikeliunas

Office Hour Week 14 Adrian.pptx
Office Hour Week 14 Adrian.pptxOffice Hour Week 14 Adrian.pptx
Office Hour Week 14 Adrian.pptxAdrian Mikeliunas
 
Introduction to WordPress Class 6
Introduction to WordPress Class 6Introduction to WordPress Class 6
Introduction to WordPress Class 6Adrian Mikeliunas
 
Introduction to WordPress Class 5
Introduction to WordPress Class 5Introduction to WordPress Class 5
Introduction to WordPress Class 5Adrian Mikeliunas
 
Introduction to WordPress Class 4
Introduction to WordPress Class 4Introduction to WordPress Class 4
Introduction to WordPress Class 4Adrian Mikeliunas
 
Introduction to WordPress Class 3
Introduction to WordPress Class 3Introduction to WordPress Class 3
Introduction to WordPress Class 3Adrian Mikeliunas
 
Introduction to WordPress Class 2
Introduction to WordPress Class 2Introduction to WordPress Class 2
Introduction to WordPress Class 2Adrian Mikeliunas
 
Genymotion Android fast development
Genymotion Android fast development Genymotion Android fast development
Genymotion Android fast development Adrian Mikeliunas
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localAdrian Mikeliunas
 
Introduction to WordPress Class 1
Introduction to WordPress Class 1Introduction to WordPress Class 1
Introduction to WordPress Class 1Adrian Mikeliunas
 
Ii 1500-publishing your android application
Ii 1500-publishing your android applicationIi 1500-publishing your android application
Ii 1500-publishing your android applicationAdrian Mikeliunas
 
Ii 1300-java essentials for android
Ii 1300-java essentials for androidIi 1300-java essentials for android
Ii 1300-java essentials for androidAdrian Mikeliunas
 
Ii 1100-android development for fun and profit
Ii 1100-android development for fun and profitIi 1100-android development for fun and profit
Ii 1100-android development for fun and profitAdrian Mikeliunas
 
Cyber Security At The Cinema
Cyber Security At The CinemaCyber Security At The Cinema
Cyber Security At The CinemaAdrian Mikeliunas
 

Mehr von Adrian Mikeliunas (18)

Office Hour Week 14 Adrian.pptx
Office Hour Week 14 Adrian.pptxOffice Hour Week 14 Adrian.pptx
Office Hour Week 14 Adrian.pptx
 
WordPress Security 2018
WordPress Security 2018WordPress Security 2018
WordPress Security 2018
 
Introduction to WordPress Class 6
Introduction to WordPress Class 6Introduction to WordPress Class 6
Introduction to WordPress Class 6
 
Introduction to WordPress Class 5
Introduction to WordPress Class 5Introduction to WordPress Class 5
Introduction to WordPress Class 5
 
Introduction to WordPress Class 4
Introduction to WordPress Class 4Introduction to WordPress Class 4
Introduction to WordPress Class 4
 
Introduction to WordPress Class 3
Introduction to WordPress Class 3Introduction to WordPress Class 3
Introduction to WordPress Class 3
 
Introduction to WordPress Class 2
Introduction to WordPress Class 2Introduction to WordPress Class 2
Introduction to WordPress Class 2
 
Genymotion Android fast development
Genymotion Android fast development Genymotion Android fast development
Genymotion Android fast development
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
 
Linux introduction Class 03
Linux introduction Class 03Linux introduction Class 03
Linux introduction Class 03
 
Linux introduction Class 02
Linux introduction Class 02Linux introduction Class 02
Linux introduction Class 02
 
Linux introduction, class 1
Linux introduction, class 1Linux introduction, class 1
Linux introduction, class 1
 
Introduction to WordPress Class 1
Introduction to WordPress Class 1Introduction to WordPress Class 1
Introduction to WordPress Class 1
 
Task deck
Task deckTask deck
Task deck
 
Ii 1500-publishing your android application
Ii 1500-publishing your android applicationIi 1500-publishing your android application
Ii 1500-publishing your android application
 
Ii 1300-java essentials for android
Ii 1300-java essentials for androidIi 1300-java essentials for android
Ii 1300-java essentials for android
 
Ii 1100-android development for fun and profit
Ii 1100-android development for fun and profitIi 1100-android development for fun and profit
Ii 1100-android development for fun and profit
 
Cyber Security At The Cinema
Cyber Security At The CinemaCyber Security At The Cinema
Cyber Security At The Cinema
 

Kürzlich hochgeladen

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Kürzlich hochgeladen (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

CISSP introduction 2016 Udemy Course

  • 1. CISSP Introduction Certified Information System Security Professional https://www.udemy.com/introduction-to-the-cissp-security- certification/
  • 2. CISSP Introduction 2 CISSP Training Course Introduction  Introductions  (ISC)2 CISSP and other Certifications  Course Objectives & Exam  New Exam Questions  Study Tips & Resources
  • 3. Adrian Mikeliunas, Instructor  Certified Information System Security Professional (CISSP)  Certified Information Systems Auditor (CISA)  30+ Years IT Experience, 15+ in Information Security  Certified Linux Professional (LPI)  Open Source Evangelist! CISSP Introduction 3
  • 4. CISSP Introduction 4 (ISC)2 and the CISSP  The International Information Systems Security Certification Consortium or (ISC)2 at https://www.isc2.org/  Founded in 1989, (ISC)² issues Security Certifications & vendor-neutral education products in more than 160 countries  CISSP and SSCP meet the stringent requirements of ANSI/ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel  International, not-for-profit leader in educating and certifying cyber, information, software and infrastructure security professionals
  • 5. CISSP Introduction 5 (ISC)2 Certification Programs • Systems Security Certified Practitioner (SSCP) • Certified Information Systems Security Professional (CISSP) − Information Systems Security Architecture Professional (ISSAP) − Information Systems Security Engineering Professional (ISSEP) − Information Systems Security Management Professional (ISSMP) • Certified Authorization Professional (CAP) • Certified Secure Software Lifecycle Professional (CSSLP) • Certified Cyber Forensics Professional (CCFP) • HealthCare Information Security & Privacy Practitioner HCISPP • Certified Cloud Security Professional (CCSP) …
  • 6. CISSP Introduction 6 Why Become a CISSP?  Demonstrates a working knowledge of information security  Confirms commitment to profession  Offers a career differentiator, with enhanced credibility and marketability • Extra Compensation $$$  Provides access to valuable resources, such as peer networking and idea exchange
  • 7. CISSP Introduction 7 Why Become a CISSP  “The CISSP has emerged as one of the most prominent vendor-neutral certifications.”  “The CISSP provides a holistic approach to security, viewing it as a process, not a product.”  “At a basic minimum, an organization should have a CISSP on staff.”  ISO/IEC Standard 17024 accredited • DoD Directive 8570 Requirement • http://iase.disa.mil/iawip/Pages/iabaseline.aspx
  • 8. CISSP Introduction 8 Course Objectives  At the end of this course students will: • Be Familiar with the (ISC)2 Common Body of Knowledge (CBK) including common terms, principles, lists, categories, mechanisms, etc. • Be familiar with the CISSP exam process • Be able to develop a study plan for taking and passing the exam.
  • 9. CISSP Introduction 9 Course Objectives  THIS COURSE IS NOT: • Security Engineering 101 − Not a basic course − Knowledge is assumed • Advanced Security Course − Coverage of material is broad and not-in-depth • Everything you need to pass the CISSP − This course is a part of the strategy to pass the exam − Home Study, Understanding Key Concepts, and Memorization is required.
  • 10. 8 Domains, 8 Separate Courses!  Security and Risk Management  Asset Security  Security Engineering  Communication and Network Security  Identity and Access Management  Security Assessment and Testing  Security Operations  Software Development Security CISSP Introduction 10 ~1 domain per week…
  • 11. Exam Preparation Plan  Take the Pre-Course Assessment Exam in 60 minutes  Plan on a minimum of 8 weeks to prepare for the Exam, more depending on your level of proficiency  Each week: • 2 chapters (or about 1 domain)  Practice Exam Questions • www.cccure.org questions CISSP Introduction 11
  • 12. CISSP Introduction 12 CISSP Requirements  https://www.isc2.org/cissp-how-to-certify.aspx  Required Experience • 5 Year of full time paid work experience in 2 or more of the 8 CBK domains − Or 4 years experience plus a college degree  Pass the Exam • Pass the CISSP exam with a scaled score of 700 points or greater • Create an Account and Schedule your Exam − http://www.vue.com/isc2/
  • 13. CISSP Introduction 13 Associate of (ISC)2  Can pass the CISSP examination, but lack the years of practical work experience • Must also subscribe to the (ISC)² Code of Ethics and maintain their status in good standing with (ISC)² • After successfully passing the exam and achieving the professional experience requirements, Associate of (ISC)² status can be converted to CISSP
  • 14. CISSP Introduction 14 CISSP Exam  Computer Based, Taken at Pearson’s Centers BRING 2 Forms of ID!!! • Pay $599 • 250 Total Questions, 225 are scored • 25 are research questions • Drawn from a pool of 10,000 questions • Questions from all 10 domains of the CBK • Multiple Choice, 4 choices • Pass/Fail, 700 Points or greater • 6 Hours • Closed Book • Results are sent via email within 2-6 weeks
  • 15. After Passing the Exam • Subscribe to the ISC2 Code of Ethics • Submit a properly completed and executed Endorsement Form − Signed by an active CISSP who has review your qualifications − Must be submitted within 9 months of passing the exam • Successfully pass an audit of their assertions regarding professional experience, if the candidate is selected for audit • Maintain your CISSP Certification CISSP Introduction 15
  • 16. CISSP Introduction 16 Continuing Professional Education (CPE)  120 CPE credits every 3 years or retesting is required to maintain the CISSP • Attending educational courses or seminars • Attending security conferences • Member of an association / attending meetings • Listening to vendor presentations • Completing university/college courses • Providing security training • Publishing security articles or books • Serving on industry boards • Self-study • volunteer work, (ISC)² volunteer committees  20 CPEs must be posted during each calendar year!  Yearly Fee of $85
  • 17. 2015 CBK: What’s New: Topics  3rd Party Risk Management  BYOD Risks (Bring Your Own Devices)  IoT (Internet of Things)  Software Defined Networks  Cloud Identity Services (OAuth 2.0) About 4% change… CISSP Introduction 17
  • 18. New Test Question Formats  Majority: Multiple Choice, 4 candidate answers, you select one correct one, occasionally more than one correct answer!  New Questions: • Scenario • Drag and Drop • Hot Box CISSP Introduction 18
  • 19. Scenario Questions  Description: • Situational: 1-2 paragraphs describing an environment, results of an audit, etc. • 3-5 questions on the scenario  Tactics: • Read the question first [to understand!] • Consider “operational” issues (tradeoffs) CISSP Introduction 19
  • 20. Drag and Drop CISSP Introduction 20 Which algorithms below are examples of symmetric cryptography? Advanced Encryption Standard Rivest Shamir Adlemann Diffie Hellman El Gamal Data Encryption Standard
  • 21. Hot Spot CISSP Introduction 21 The diagram below is a design of a Public Key Infrastructure to secure internet transactions. Within the design is a Certificate Authority, a Registration Authority, and a Validation Authority. Click on the location of the registration authority.
  • 22. CISSP Introduction 22 Resources  ISC2: www.isc2.org  Online Resources & Practice Exams www.cccure.org  NIST Computer Security Resource Center http://csrc.nist.gov  http://learncissp.com/resources/  Shon Harris audio libraries & practice tests for EACH [old 10] Domains: http://www.mhprofessional.com/sites/CISSPExams/
  • 23. Books  Sybex CISSP 2015 http://www.amazon.com/Certified-Information- Security-Professional-Official/  ISC2 Official CISSP http://www.amazon.com/Official-Guide-CISSP- Fourth-Press CISSP Introduction 23
  • 24. Questions? CISSP Introduction 24 FREE Intro to CISSP course at https://www.udemy.com/introduction-to-the-cissp-security- certification/