
Duration 6 Weeks | Fee 20K+GST 18%
Our Certified Information Systems Security Professional (CISSP) training course aims to supply delegates with a theory-based approach to learning the Information Systems security process and how to apply this process practically to real-life scenarios. The course is based around teaching the eight fundamental domains of Information Security, which provide delegates with all the information they require to obtain a broad understanding of Information Security and pass the CISSP exam.
The CISSP certification is globally recognized as the best Information Systems Security certification for Security Professionals. Our trainers use a theory-based training strategy, allowing for a clear explanation of CISSP terminology and methodology.
Detailed Syllabus Covered
Security and Risk Management:
- Confidentiality, Integrity, and Availability Concepts
- Security Governance Principles
- Compliance
- Legal and Regulatory Issues
- Professional Ethics
- Security Policies, Standards, Procedures, and Guidelines
Asset Security:
- Information and Asset Classification
- Ownership
- Protect Privacy
- Appropriate Retention
- Data Security Controls
- Handling Requirements
Security Architecture and Engineering:
- Engineering Processes using Secure Design Principles
- Security Models Fundamental Concepts
- Security Evaluation Models
- Security Capabilities of Information Systems
- Security Architectures, Designs, and Solution Elements Vulnerabilities
- Web-based Systems Vulnerabilities
- Mobile Systems Vulnerabilities
- Embedded Devices and Cyber-Physical Systems Vulnerabilities
- Cryptography
- Site and Facility Design Secure Principles
- Physical Security
Communication and Network Security:
- Secure Network Architecture Design
- Secure Network Components
- Secure Communication Channels
- Network Attacks
Identity and Access Management (IAM):
- Physical and Logical Assets Control
- Identification and Authentication of People and Devices
- Identity as a Service
- Third-party Identity Services
- Access Control Attacks
- Identity and Access Provisioning Lifecycle
Security Assessment and Testing:
- Assessment and Test Strategies
- Security Process Data
- Security Control Testing
- Test Outputs
- Security Architectures Vulnerabilities
Security Operations:
- Investigations Support and Requirements
- Logging and Monitoring Activities
- Provisioning of Resources
- Foundational Security Operations Concepts
- Resource Protection Techniques
- Incident Management
- Preventative Measures
- Patch and Vulnerability Management
- Change Management Processes
- Recovery Strategies
- Disaster Recovery Processes and Plans
- Business Continuity Planning and Exercises
- Physical Security
- Personnel Safety Concerns
Software Development Security:
- Security in the Software Development Lifecycle
- Development Environment Security Controls
- Software Security Effectiveness
- Acquired Software Security Impact