CISSP Training

Duration 6 Weeks | Fee 20K+GST 18%

Best Seller

Bangalore and Noida Campus

CISSP Training

Course Fee

$850

Course Duration

40 Hours

Course Mode

Classroom     Online

Our Certified Information Systems Security Professional (CISSP) training course aims to supply delegates with a theory-based approach to learning the Information Systems security process and how to apply this process practically to real-life scenarios. The course is based around teaching the eight fundamental domains of Information Security, which provide delegates with all the information they require to obtain a broad understanding of Information Security and pass the CISSP exam.

The CISSP certification is globally recognized as the best Information Systems Security certification for Security Professionals. Our trainers use a theory-based training strategy, allowing for a clear explanation of CISSP terminology and methodology.

Chapter 1: Setting Up the BIG-IP System

  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools

Chapter 2: Reviewing Local Traffic Configuration

  • Reviewing Nodes, Pools, and Virtual Servers
  • Reviewing Address Translation
  • Reviewing Routing Assumptions
  • Reviewing Application Health Monitoring
  • Reviewing Traffic Behavior Modification with Profiles
  • Reviewing the TMOS Shell (TMSH)
  • Reviewing Managing BIG-IP Configuration Data

Chapter 3: Load Balancing Traffic with LTM

  • Exploring Load Balancing Options
  • Using Priority Group Activation and Fallback Host
  • Comparing Member and Node Load Balancing

Chapter 4: Modifying Traffic Behavior with Persistence

  • Reviewing Persistence
  • Introducing SSL Persistence 
  • Introducing SIP Persistence 
  • Introducing Universal Persistence
  • Introducing Destination Address Affinity Persistence
  • Using Match Across Options for Persistence

Chapter 5: Monitoring Application Health

  • Differentiating Monitor Types
  • Customizing the HTTP Monitor
  • Monitoring an Alias Address and Port
  • Monitoring a Path vs. Monitoring a Device
  • Managing Multiple Monitors
  • Using Application Check Monitors
  • Using Manual Resume and Advanced Monitor Timer Settings

Chapter 6: Processing Traffic with Virtual Servers

  • Understanding the Need for Other Virtual Server Types
  • Forwarding Traffic with a Virtual Server
  • Understanding Virtual Server Order of Precedence
  • Path Load Balancing

Chapter 7: Processing Traffic with SNATs

  • Overview of SNATs
  • Using SNAT Pools
  • SNATs as Listeners
  • SNAT Specificity
  • VIP Bounceback
  • Additional SNAT Options
  • Network Packet Processing

Chapter 8: Configuring High Availability

  • Introducing Device Service Clustering (DSC)
  • Preparing to Deploy a DSC Configuration
  • Configuring DSC Communication Settings
  • Establishing Device Trust
  • Establishing a Sync-Failover Device Group
  • Synchronizing Configuration Data
  • Exploring Traffic Group Behavior
  • Understanding Failover Managers and Triggers
  • Achieving Stateful Failover with Mirroring

Chapter 9: Modifying Traffic Behavior with Profiles

  • Profiles Overview
  • TCP Profile Settings
  • TCP Express Optimization
  • Performance Improvements
  • Configuring and Using Profiles
  • HTTP Profile Options
  • OneConnect
  • Offloading HTTP Compression to BIG-IP
  • HTTP Caching
  • Stream Profiles
  • F5 Acceleration Technologies

Chapter 10: Selected Topics

  • VLAN, VLAN Tagging, and Trunking
  • Restricting Network Access
  • SNMP Features

Chapter 11: Deploying Application Services with iApps

  • Simplifying Application Deployment with iApps
  • Using iApps Templates
  • Deploying an Application Service
  • Reconfiguring an Application Service
  • Leveraging the iApps Ecosystem on DevCentral

Chapter 12: Customizing Application Delivery with iRules and Local Traffic Policies

  • Getting Started with iRules
  • Triggering an iRule
  • Introducing iRule Constructs
  • Leveraging the DevCentral Ecosystem
  • Deploying and Testing iRules
  • Getting Started with Local Traffic Policies
  • What Can You Do with a Local Traffic Policy?
  • How Does a Local Traffic Policy Work?
  • Understanding Local Traffic Policy Workflow
  • Introducing the Elements of a Local Traffic Policy
  • Specifying the Matching Strategy
  • What Are Rules?
  • Understanding Requires and Controls
  • Configuring and Managing Policy Rules
  • Configuring a New Rule
  • Including Tcl in Certain Rule Settings

Chapter 13: Final Lab Project

  • About the Final Lab Project
  • Possible Solution to Lab 13.1

Chapter 14: Additional Training and Certification

  • Getting Started Series Web-Based Training
  • F5 Instructor Led Training Curriculum
  • F5 Professional Certification Program

Detailed Syllabus Covered


Security and Risk Management:

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security:

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering:

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security:

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM):

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing:

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations:

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security:

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact