CISSP D-1 Security & Risk Management

Course Brochure

File size: 658 kb

CISSP Exam Outline May 2021

File size: 406 kb

Become a CISSP: Certified Information Systems Security Professional

Accelerate your cybersecurity career with the CISSP certification. Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities. Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career

What is cover in this Domain (1)?

  1. CIA Triad
  2. Security Governance principles
  3. Determine Compliance Requirements
  4. Global Legal & Regulatory Issues
  5. Professional Ethics
  6. Policy, Procedure, Standards & Guidelines
  7. Business Continuity
  8. Personal Policies & Procedures
  9. Risk Management
  10. Threat Modeling
  11. Supply Chain Risk Management
  12. Security Awareness, Education, & Training Program

What is the target audience?

This course is intended for absolute beginners and IT professionals looking to make the move into the Cyber Security field. No programming experience or prior security knowledge is required. A basic understanding of networking and TCP/IP is helpful. This course is intended for anyone who is interested in a career in Cyber Security CISSP concepts teach many professionals to plan for and address Cyber Security issues on a daily basis using free open source software tools.

Information security Principles

CIA Triad

This lesson covers the fundamental information security principles or goals such as confidentiality, integrity and availability. CISSP candidates are expected to master these fundamental principles.

Information security Governance

Enterprise Governance of IT
Security Governance
What is Security Governance? The collection of practices related to supporting, defining, & directing the security efforts of an organization.
Security Management
Organisational Processes
Organizational Roles & Responsibilities
Security Control Frameworks

Compliance Requirements

Types of Laws
Compliance Requirements Legal Compliance Many compliance expectations come from statutory or regulatory expectations........
Intellectual Property Protection

Global Legal & Regulatory Issues

Cyber Crimes and Data Breaches
Privacy Issues
Privacy Regulations
Professional Ethics
Organisational Documents – Policy, Standards & Baseline, Procedure, Guideline

Business Continuity Management (BCM)

What is Business Continuity Management – BCM?
Business Continuity – BC Standards & Frameworks

Business Continuity Planning - BCP Processes

Overview of BCP Four Main Steps
1.0 Project scope and planning  
2.0 Business Impact Assessment (BIA)
3.0 Continuity Planning
4.0 Plan Approval and Implementation
Personnel Security

Risk Management

Risk Management Overview

Risk Management is the processes of identifying, analyzing, assessing, mitigating, or transferring risk.

  • It’s main goal is the reduction of probability or impact of a risk to acceptable levels
  • Eliminating risk to zero is impossible, however, significant risk reduction is possible

Risk Management Processes
Quantitative Risk Analysis
Risk Response
Threat modeling
Supply Chain Risk Management (SCRM)
Security Education, Training, and Awareness (SETA) program
We offer classroom instructor-led and Live Online courses delivery options. Contact us for more information
While there are no mandatory requirements to attend this course, please be aware that this is an exam preparation course and all attendees are expected to have a basic understanding of the information technology/security concepts.
Security and Risk Management comprises about 15% of the CISSP exam. This is the largest domain in CISSP, providing a comprehensive overview of the things you need to know about information systems management. It covers: • The confidentiality, integrity and availability of information; • Security governance principles; • Compliance requirements; • Legal and regulatory issues relating to information security; • IT policies and procedures; and • Risk-based management concepts.

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Enrolled: 12 students
Duration: 8 hours
Lectures: 29
Level: Advanced


Working hours

Monday 8:00 am - 4.30 pm
Tuesday 8:00 am - 4.30 pm
Wednesday 8:00 am - 4.30 pm
Thursday 8:00 am - 4.30 pm
Friday 8:00 am - 4.30 pm
Saturday Closed
Sunday Closed
CISSP D-1 Security & Risk Management
This website uses cookies and asks your personal data to enhance your browsing experience.