Certified Information Systems Security Professional (CISSP) Practice Exam
Certified Information Systems Security Professional (CISSP) Practice Exam
Certified Information Systems Security Professional (CISSP) Practice Exam
The Certified Information Systems Security Professional (CISSP) is widely known as the top certification in the field of information security worldwide. It confirms that a person has extensive technical and managerial expertise to properly plan, create, and oversee an organization's overall security measures. The wide range of subjects covered in the CISSP Common Body of Knowledge (CBK®) ensures that it remains important in all areas of information security.
Who should take the exam?
The CISSP is suitable for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those working as:
Chief Information Security Officer
Chief Information Officer
Director of Security
IT Director/Manager
Security Systems Engineer
Security Analyst
Security Manager
Security Auditor
Security Architect
Security Consultant
Network Architect
Experience Requirements for the Exam
To qualify, candidates need at least five years of paid work experience in two or more of the eight CISSP CBK domains. Having a four-year college degree or an approved credential from ISC2 can substitute for one year of experience, but education credit only counts for one year.
Exam Details of Certified Information Systems Security Professional (CISSP)
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional
Exam Languages: English
Exam Questions: 125-175 Questions
Time Duration: 4 hours
Passing Score: 700 out of 1000 points
CISSP Exam Course Outline
The Certified Information Systems Security Professional (CISSP) Exam covers the given topics -
Domain 1: Understand Security and Risk Management
Understanding, adhering to, and promoting professional ethics
Applying security concepts
Evaluating and applying security governance principles
Determining compliance and other requirements
Understanding legal and regulatory issues that pertain to information security in a holistic context
Understanding requirements for investigation types (i.e., administrative, criminal, civil, regulatory, and industry standards)
Developing, documenting, and implementing security policy, standards, procedures, and guidelines
Discovering, analyzing, and prioritizing Business Continuity (BC) requirements
Contributing to and enforcing personnel security policies and procedures
Applying risk management concepts
Implementing threat modeling concepts and methodologies