Workday HCM Demo New Batches Starting from Tuesday... 01-11-2016
Search Course Here

Live Chat



Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the International Information Systems Security Certification Consortium, also known as (ISC)².The CISSP curriculum covers subject matter in a variety of Information Security topics. The CISSP examination is based on what (ISC)² terms the Common Body of Knowledge (or CBK). According to (ISC)², "the CISSP CBK is a taxonomy – a collection of topics relevant to information security professionals around the world. The CISSP CBK establishes a common framework of information security terms and principles that allow information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession with a common understanding."
  • None
  • It is a 16 days program and extends up to 2hrs each.
  • The format is 40% theory, 60% Hands-on.

  • It is a 4 days program and extends up to 8hrs each.
  • The format is 40% theory, 60% Hands-on.
    Private Classroom arranged on request and minimum attendies for batch is 4.
course content
  • Access Control
    • Effectiveness
    • Attacks
  • Telecommunications and Network Security
    • Network architecture and design
    • Communication channels
    • Network components
    • Network attacks
  • Information Security Governance and Risk Management
    • Security governance and policy
    • Information classification/ownership
    • Contractual agreements and procurement processes
    • Risk management concepts
    • Personnel security
    • Security education, training and awareness
    • Certification and accreditation
  • Software Development Security
    • Systems development life cycle (SDLC)
    • Application environment and security controls
    • Effectiveness of application security
  • Cryptography
    • Encryption concepts
    • Digital signatures
    • Cryptanalytic attacks
    • Public Key Infrastructure (PKI)
    • Information hiding alternatives
  • Security Architecture and Design
    • Fundamental concepts of security models
    • Capabilities of information systems (e.g. memory protection, virtualization)
    • Countermeasure principles
    • Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)
  • Operations Security
    • Resource protection
    • Incident response
    • Attack prevention and response
    • Patch and vulnerability management
  • Business Continuity and Disaster Recovery Planning
    • Business impact analysis
    • Recovery strategy
    • Disaster recovery process
    • Provide training
  • Legal, Regulations, Investigations and Compliance
    • Legal issues
    • Investigations
    • Forensic procedures
    • Compliance requirements/procedures
  • Physical (Environmental) Security
    • Site/facility design considerations
    • Perimeter security
    • Internal security
    • Facilities security
For Videos Click Here Videos

Flash News

AngularJS New Batch Start From 28th OCT & 29th OCT.

Hadoop Dev New Batch Start From 29th OCT & 30th OCT.

IBM COGNOS TM New Batch Start From 30th OCT & 31th OCT.

Informatica Dev New Batch Start From 31th OCT & 01st Nov.

Mean Stack New Batch Start 01st Nov & 02nd Nov.

SAP BODS new Batch Starting From 02nd Nov & 03rd Nov.

SAP S/4 HANA New Batch Start From 03rd Nov & 04th Nov

Tableau New Batch Start From 04th Nov & 05th Nov


Workday HCM Demo Training

Demo Schedule : 09:30P.M EST / 08:30P.M CST / 06:30P.M PST on 31st OCT & 07:00A.M IST on 01st NOV
Email :
Rediff Bol :
Google Talk :
MSN Messenger :
Yahoo Messenger :
Skype Talk :