Certified Information Systems Security Professional (CISSP)

DATE

Duration

LOCATION

FEES

Book Now

27 Oct
- 31 Oct 2024

5 Days

Dubai

$3,500

19 May
- 23 May 2024

5 Days

Dubai

$3,500

4 Aug
- 8 Aug 2023

5 Days

Virtual Online

$1,990

5 Feb
- 9 Feb 2024

5 Days

Virtual Online

$1,990

The Certified Information Systems Security Professional (CISSP) is an information security certification for security analysts. It was created by the International Information Systems Security Certification Consortium (ISC). The certification was created to ensure professionals in computer security have standardized knowledge of the field. Earning a Certified Information Systems Security Professional certificate can help you have a successful career as a computer security professional.

 

By the end of the course, you‘ll be able to:

  • Comprehensive understanding of information security aspects of an organization
  • Defining the architecture, design and management of IT security
  • The skills needed to become a CISSP Certified Professional
  • Gain a comprehensive understanding of all eight domains set out in the ISC2 CISSP Joint Body of Knowledge (CBK)
  • Cryptography
  • Security architecture for applications and networks
  • Improve security operations in the organization
  • Access control and physical security

This course is made for:

  • Network Architects
  • Security Consultants
  • Security Architects
  • Security Auditors
  • Security Managers
  • CIOs
  • Directory of Security
  • Security Analysts
  • Security Systems Engineers
  • Anybody who wants to gain knowledge of globally-recognized CISSP information security standards
  • Anybody who is looking to clear their CISSP Certification Exam
  • IT professionals seeking to enhance their careers and gain credibility as information security specialists

Day One :

  • Access Control – a collection of mechanisms that work together to create a security architecture to protect the assets of the information system.
  • Application Development Security – addresses the important security concepts that apply to application software development. It outlines the environment where software is designed and developed and explains the critical role software plays in providing information system security.
  • Business Continuity and Disaster Recovery Planning – for the preservation and recovery of business operations in the event of outages.

Day Two:

  • Cryptography – the principles, means, and methods of disguising information to ensure its integrity, confidentiality
    and authenticity.
  • Information Security Governance and Risk Management – the identification of an organization’s information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines. Management tools such as data classification and risk assessment/analysis are used to identify threats, classify assets, and to rate system vulnerabilities so that effective controls can be implemented.
  • Legal, Regulations, Investigations and Compliance

Day Three:

  • Computer crime laws and regulations
  • The measures and technologies used to investigate computer crime incidents
  • Operations Security – used to identify the controls over hardware, media, and the operators and administrators with access privileges to any of these resources. Audit and monitoring are the mechanisms, tools, and facilities that permit the identification of security events and subsequent actions to identify the key elements and report the pertinent information to the appropriate individual, group, or process.

Day Four:

  • Physical (Environmental) Security – provides protection techniques for the entire facility, from the outside perimeter to the inside office space, including all of the information system resources.
  • Security Architecture and Design – contains the concepts, principles, structures, and standards used to design, monitor, and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of availability, integrity, and confidentiality.
  • Telecommunications and Network Security
  • Network Structures

Day Five:

  • Transmission Methods
  • Transport Formats
  • Security measures used to provide availability, integrity, and confidentiality
  • Authentication for transmissions over private and public communications networks and media
Training Subject
Training Location