WhatsApp/Call (Singapore) +65-90815973
WhatsApp/Call (India) +91-9323860056
WhatsApp/Call (UAE) +971-552092909


Certified Information Systems Security Professional (CISSP) Training in Singapore

Be the first to review this product

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.

Email sales@myfastlearn.com or
Call / Whatsapp
us on +65-90815973 for special price of SGD 900

Availability: In stock

Regular Price: USD 1,400.00

Now only: USD 850.00

* Required Fields



The CISSP exam tests one's competence in the 8 domains of the CISSP CBK, which cover:

  • Security and Risk Management
  • Asset Security
  • Security Architecture & Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Outline - Click to Collapse

# Course Module (Learning Outcome) Module Topics Module Sub Topics ~Hrs
1 Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity) Security Governance Through Principles and Policies
  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability Apply Security Governance Principles
  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability Apply Security Governance Principles
  • Develop and Implement Documented Security Policy, Standards, Procedures and Guidelines
  • Understand and Apply Threat Modeling
  • Integrate Security Risk Considerations into Acquisition Strategy and Practice
  • Summary
Personnel Security and Risk Management Concepts
  • Contribute to Personnel Security Policies
  • Security Governance
  • Understand and Apply Risk Management Concepts
  • Establish and Manage Information Security Education, Training, and Awareness
  • Manage the Security Function
  • Summary
Business Continuity Planning
  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Assessment
  • Continuity Planning
  • BCP Documentation
  • Summary
Laws, Regulations, and Compliance
  • Categories of Laws
  • Laws
  • Compliance
  • Contracting and Procurement
  • Summary
2 Asset Security (Protecting Security of Assets) Protecting Security of Assets
  • Classifying and Labeling Assets
  • Identifying Data Roles
  • Protecting Privacy
  • Summary
3 Security Architecture and Engineering (Engineering and Management of Security) Cryptography and Symmetric Key Algorithms
  • Historical Milestones in Cryptography
  • Cryptographic Basics
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Life Cycle
  • Summary
PKI and Cryptographic Applications
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Applied Cryptography
  • Cryptographic Attacks
  • Summary
Principles of Security Models, Design, and Capabilities
  • Implement and Manage Engineering Processes Using Secure Design Principles
  • Understand the Fundamental Concepts of Security Models
  • Select Controls and Countermeasures Based on Systems Security Evaluation Models
  • Understand Security Capabilities of Information Systems
  • Summary
Security Vulnerabilities, Threats, and Countermeasures
  • Assess and Mitigate Security Vulnerabilities
  • Client-Based
  • Server-Based
  • Database Security
  • Distributed Systems
  • Industrial Control Systems
  • Assess and Mitigate Vulnerabilities in Web-Based Systems
  • Assess and Mitigate Vulnerabilities in Mobile Systems
  • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Essential Security Protection Mechanisms
  • Common Architecture Flaws and Security Issues
  • Summary
Physical Security Requirements
  • Apply Secure Principles to Site and Facility Design
  • Design and Implement Physical Security
  • Implement and Manage Physical Security
  • Summary
4 Communications and Network Security (Designing and Protecting Network Security) Secure Network Architecture and Securing Network Components
  • OSI Model
  • TCP/IP Model
  • Converged Protocols
  • Wireless Networks
  • General Wi-Fi Security Procedure
  • Cabling, Wireless, Topology, and Communications Technology
  • Summary
Secure Communications and Network Attacks
  • Network and Protocol Security Mechanisms
  • Secure Voice Communications
  • Multimedia Collaboration
  • Manage Email Security
  • Remote Access Security Management
  • Virtual Private Network
  • Virtualization
  • Network Address Translation
  • Switching Technologies
  • WAN Technologies
  • Miscellaneous Security Control Characteristics
  • Security Boundaries
  • Prevent or Mitigate Network Attacks
  • Summary
5 Identity and Access Management (Controlling Access and Managing Identity) Managing Identity and Authentication
  • Controlling Access to Assets
  • Comparing Identification and Authentication
  • Implementing Identity Management
  • Managing the Identity and Access Provisioning Life Cycle
  • Summary
Controlling and Monitoring Access
  • Comparing Access Control Models
  • Understanding Access Control Attacks
  • Summary
6 Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) Security Assessment and Testing
  • Building a Security Assessment and Testing Program
  • Performing Vulnerability Assessments
  • Testing Your Software
  • Implementing Security Management Processes
  • Summary
7 Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery) Managing Security Operations
  • Applying Security Operations Concepts
  • Provisioning and Managing Resources
  • Managing Configuration
  • Managing Change
  • Managing Patches and Reducing Vulnerabilities
  • Summary
Preventing and Responding to Incidents
  • Managing Incident Response
  • Implementing Preventive Measures
  • Logging, Monitoring, and Auditing
  • Summary
Disaster Recovery Planning
  • The Nature of Disaster
  • Understand System Resilience and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance
  • Summary
Incidents and Ethics
  • Investigations
  • Major Categories of Computer Crime
  • Incident Handling
  • Ethics
  • Summary
8 Software Development Security (Understanding, Applying, and Enforcing Software Security) Software Development Security
  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehousing
  • Storing Data and Information
  • Understanding Knowledge-Based Systems
  • Summary
Malicious Code and Application Attacks
  • Malicious Code
  • Password Attacks
  • Application Attacks
  • Web Application Security
  • Reconnaissance Attacks
  • Masquerading Attacks
  • Summary

Additional Info

Additional Info

Blended Mode In-person
Location Singapore
Course Leader Venugopal Maddukuri
Credit Hours 40
Package Includes
  • 1) 40 hours of Instructor led Interactive & Intensive CISSP learning sessions.
  • 2) Comprehensive Courseware covering all aspects of CISSP exam preparation.
  • 3) 1000+ Sample quiz to prepare for CISSP exam.
  • 4) Multiple Classroom Activities based on CISSP including a case-scenario on real life information security incident with RCA to baseline participant knowledge.
  • 5) Post training VOIP / Email support to respond to CISSP questions.
Target Audience The CISSP is ideal for those handling information security responsibility within the organisation. The course is also highly relevant for consultants & IS auditors.
Eligibility As per ISC2 requirements
Time Zone UTC+08:00 (SGT)
From Time 9:00 hrs
To Time 18:00 hrs


Write Your Own Review

You're reviewing: Certified Information Systems Security Professional (CISSP) Training in Singapore

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars