Certified Information Systems Security Professional

Overview

A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets the CISSP apart.
The CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. CISSP certification is not only an objective measure of excellence, but a also globally recognized standard of achievement.

Days:

Course Code:

5

CISSP

Pre-Requisites

The Seminar offers a high-level review of the main topics and identifies areas that students need to study and includes:

  • Post-Seminar Self-Assessment
  • 100% up-to-date material
  • An overview of the scope of the information security field
Content
  • Access Control – a collection of mechanisms that work together to create a security architecture to protect the assets of the information system.
  • Application Development Security – addresses the important security concepts that apply to application software development. It outlines the environment where software is designed and developed and explains the critical role software plays in providing information system security.
  • Business Continuity and Disaster Recovery Planning – for the preservation and recovery of business operations in the event of outages.
  • Cryptography – the principles, means, and methods of disguising information to ensure its integrity, confidentiality
    and authenticity.
  • Information Security Governance and Risk Management – the identification of an organization’s information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines. Management tools such as data classification and risk assessment/analysis are used to identify threats, classify assets, and to rate system vulnerabilities so that effective controls can be implemented.
  • Legal, Regulations, Investigations and Compliance
  • Computer crime laws and regulations
  • The measures and technologies used to investigate computer crime incidents
  • Operations Security – used to identify the controls over hardware, media, and the operators and administrators with access privileges to any of these resources. Audit and monitoring are the mechanisms, tools, and facilities that permit the identification of security events and subsequent actions to identify the key elements and report the pertinent information to the appropriate individual, group, or process.
  • Physical (Environmental) Security – provides protection techniques for the entire facility, from the outside perimeter to the inside office space, including all of the information system resources.
  • Security Architecture and Design – contains the concepts, principles, structures, and standards used to design, monitor, and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of availability, integrity, and confidentiality.
  • Telecommunications and Network Security
  • Network structures
  • Transmission methods
  • Transport formats
  • Security measures used to provide availability, integrity, and confidentiality
  • Authentication for transmissions over private and public communications networks and
Objectives

Best-practice information security management practices, including IS technical skills, risk management and business continuity planning.

  • Access control and physical security
  • Cryptography
  • Security architecture for applications and networks.
Target Audience

IT professionals seeking to enhance their careers and gain credibility as information security specialists

vendors Course Code Course Title Days Date
ISC2
CISSP Certified Information Systems Security Professional 5 View All Dates

This public courses are pre-scheduled throughout the year at our premises

Online, live and interactive training accessible from anywhere

We can deliver standard or customised training at any time and location that suits your employees

Guaranteed courses are confirmed to run on the specific dates shown