Certified Information Systems Security Professional

Price: Enquire Now
Code: CISSP
Duration: 5 days
Location: Virtual Classroom (AEST)
Schedule: Virtual Classroom (AEST)
  • 18/07/2022 - 22/07/2022
  • 22/08/2022 - 26/08/2022

Introduction

Our Certified Information Systems Security Professional (CISSP) training course aims to supply delegates with a theory-based approach to learning the Information Systems security process and how to apply this process practically to real-life scenarios. The course is based around teaching the eight fundamental domains of Information Security, which provide delegates with all the information they require to obtain a broad understanding of Information Security and pass the CISSP exam.

The CISSP certification is globally recognised as the best Information Systems Security certification for Security Professionals. Our trainers use a theory-based training strategy, allowing for a clear explanation of CISSP terminology and methodology.

Audience Profile

This CISSP training course is suitable for mid- and senior-level managers who are working towards or have already achieved a position such as:

  • Chief Information Security Officer (CISO)
  • Chief Security Officer (CSO)
  • Senior Security Engineer
  • Security Consultant
  • Security Manager
  • Security Auditor
  • Security Architect
  • Network Architect

Outcomes

This CISSP course will include:

  • Exam Pass Guarantee
  • Certificate
  • Experienced Instructor

Prerequisites

No prior certifications are required, but delegates will thrive if they possess experience or knowledge of IS Security

 

Delegates should purchase the following book which will be used during the course: The Official (ISC)2 Guide to the CISSP CBK Reference, 5th Edition, by John Warsinske.
It might also prove useful to briefly read over some of this guide prior to starting the course to supplement your learning and prepare you for your CISSP training

  • Welcome and Administrivia
  • Course Overview
  • Review and Revision Techniques
  • References
  • Specialised References and Additional Reading
  • Other Resources
  • The “CISSP World-View”
  • The Exam
  • On the Day of the Exam
  • Exam Technique
  • After the Exam
  • CISSP Concentrations
  • Blended Learning Follow-up
  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines
  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements
  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security
  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks
  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle
  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities
  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns
  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact

Reviews

There are no reviews yet.

Enquire now

Enquire now

    Cart
    Unfortunately, Your Cart Is Empty
    Please Add Something In Your Cart