Curriculum
- 12 Sections
- 99 Lessons
- 12 Weeks
Expand all sectionsCollapse all sections
- Week 1Introduction & Security and Risk Management9
- 1.1Overview of CISSP Certification & ISC² Code of Ethics60 Minutes
- 1.2Understanding Information Security Governance
- 1.3Legal, Regulatory, and Compliance Frameworks
- 1.4Risk Management Concepts (Risk Analysis, Mitigation, and Assessment)
- 1.5Business Continuity (BC) & Disaster Recovery (DR) Planning
- 1.6Security Policies, Standards, Guidelines & Procedures
- 1.7Intellectual Property (IP) Protection & Privacy Laws
- 1.8Security Awareness, Training, and Education
- 1.9Professional Ethics and Security Responsibilities
- Week 2Security and Risk Management & Asset Security9
- 2.1Security Governance Principles & Compliance Requirements60 Minutes
- 2.2Threat Modeling, Threat Intelligence & Risk-Based Management
- 2.3Security Control Types: Preventive, Detective, Corrective, Deterrent
- 2.4Data Classification & Data Lifecycle Management
- 2.5Asset Management and Information Handling Requirements
- 2.6Data Retention, Storage, and Secure Disposal Techniques
- 2.7Privacy Protection Regulations (GDPR, HIPAA, PCI-DSS)
- 2.8Information and Data Ownership Responsibilities
- 2.9Handling Data Breaches & Incident Response Policies
- Week 3Asset Security & Security Architecture and Engineering9
- 3.1Security Models: Bell-LaPadula, Biba, Clark-Wilson60 Minutes
- 3.2Security Frameworks & Enterprise Security Architecture
- 3.3Secure Data Storage, Backup, and Recovery Mechanisms
- 3.4Cryptography Fundamentals: Symmetric vs. Asymmetric Encryption
- 3.5Public Key Infrastructure (PKI) and Digital Certificates
- 3.6Secure System Design and Security Engineering Principles
- 3.7Trusted Computing, TPM, and Hardware Security Modules (HSMs)
- 3.8Security Mechanisms in Cloud Computing & Virtualization
- 3.9IoT, Edge Computing, and Mobile Security Considerations
- Week 4Security Architecture and Engineering & Communications and Network Security9
- 4.1Secure Network Architecture and Design Principles
- 4.2Layered Defense Models (Defense in Depth)
- 4.3OSI & TCP/IP Models: Security Risks and Protocols
- 4.4Firewalls, IDS/IPS, and Network Segmentation Strategies
- 4.5VPNs, Proxy Servers, and Remote Access Security
- 4.6Wireless Network Security (WPA, WPA2, WPA3)
- 4.7Threats to Communication Networks (DoS, DDoS, Man-in-the-Middle)
- 4.8Secure Communication Techniques (TLS, SSL, IPSec)
- 4.9Securing Cloud-Based and Hybrid Network Environments
- Week 5Communications and Network Security & Identity and Access Management (IAM)9
- 5.1Network Security Protocols: SNMP, SSH, FTP, SFTP, RDP
- 5.2VOIP & Email Security Mechanisms (SPF, DKIM, DMARC)
- 5.3Biometric Authentication and Multi-Factor Authentication (MFA)
- 5.4Identity Management & Access Control Models (RBAC, ABAC, MAC, DAC)
- 5.5Authentication & Authorization: SSO, OAuth, OpenID, Kerberos
- 5.6Privileged Access Management (PAM) & Role-Based Security
- 5.7Identity Federation & Cloud IAM Solutions
- 5.8User Provisioning, Deprovisioning, and Lifecycle Management
- 5.9Security Best Practices in Identity Governance
- Week 69
- 6.1Identity Proofing & Digital Identity Assurance
- 6.2Identity-as-a-Service (IDaaS) & Cloud Access Security Brokers (CASB)
- 6.3Threats to Authentication Systems & Identity Theft Prevention
- 6.4Security Auditing, Compliance Testing & Penetration Testing
- 6.5Vulnerability Assessments & Risk-Based Security Testing
- 6.6Network Scanning, Enumeration, and System Hardening
- 6.7Security Testing Tools (Nmap, Nessus, Metasploit)
- 6.8Social Engineering Testing and Red Team vs. Blue Team Operations
- 6.9Cloud Security Testing Techniques & Tools
- Week 7Security Assessment and Testing & Security Operations9
- 7.1Continuous Monitoring & Security Auditing Techniques
- 7.2SIEM Solutions & Log Management (Splunk, ELK, Graylog)
- 7.3Incident Handling & Cybersecurity Incident Response Plan
- 7.4Forensics & Digital Evidence Collection Techniques
- 7.5Malware Analysis, Reverse Engineering, and Threat Hunting
- 7.6Cybersecurity Resilience and Attack Mitigation Strategies
- 7.7Threat Intelligence Platforms & Cybersecurity Frameworks
- 7.8Security Operations Center (SOC) Functions & Best Practices
- 7.9Cloud Security Monitoring & Threat Detection
- Week 8Security Operations & Software Development Security9
- 8.1Endpoint Security & Security Operations Best Practices
- 8.2Business Continuity Management (BCM) & Disaster Recovery Planning
- 8.3Incident Recovery, Backup Policies & Data Integrity Management
- 8.4Secure Software Development Lifecycle (SDLC)
- 8.5Software Security Best Practices & DevSecOps Integration
- 8.6Secure Coding Practices: OWASP Top 10 & Common Vulnerabilities
- 8.7Web Application Security: SQL Injection, XSS, CSRF Prevention
- 8.8Static & Dynamic Application Security Testing (SAST & DAST)
- 8.9API Security & Secure Software Containerization
- Week 9Software Development Security & Security Governance Recap8
- 9.1Secure Database Design & Database Security Practices
- 9.2Secure Software Deployment & Configuration Management
- 9.3Threat Modeling in Software Development
- 9.4Artificial Intelligence & Machine Learning in Security
- 9.5Understanding Zero Trust Security Model
- 9.6Recap of All Security Domains & Best Practices
- 9.7CISSP Exam Preparation Strategy & Study Plan
- 9.8Hands-On Security Labs & Real-World Case Studies
- Week 10Full CISSP Domain Review & Quick Revision Sessions5
- 10.1Comprehensive review of all eight CISSP domains
- 10.2Key concepts, best practices, and real-world applications
- 10.3Quick revision guides for important security frameworks and models
- 10.4Focus on high-weightage topics and frequently asked exam questions
- 10.5Understanding ISC² exam structure and scoring methodology
- Week 11Hands-on Case Studies & Practice Questions7
- 11.1Incident response and forensic investigations
- 11.2Security breaches and risk mitigation strategies
- 11.3Cloud security challenges and compliance case studies
- 11.4Threat modeling and vulnerability assessments
- 11.5Domain-wise practice sets with exam-style questions
- 11.6Real-world cybersecurity scenarios & problem-solving
- 11.7Time-based mock quizzes to build confidence and accuracy
- Week 12Exam-Taking Strategies & Final Exam Simulation7
- 12.1Techniques to answer multiple-choice & advanced innovative questions
- 12.2Eliminating wrong answers & logical deduction metho
- 12.3Managing time effectively during the 4-hour CISSP exam
- 12.4Full-length CISSP practice exam (125-175 questions)
- 12.5Detailed performance analysis & weak area identification
- 12.6One-on-One doubt-clearing sessions with instructors
- 12.7Personalized study plan for last-minute revisions