Certified Information Systems Security Professional

by Indicia Training Claim Listing

The CISSP course covers all relevant concepts, case studies, and workshops for key technical areas across the eight domains. ISC2 has recently introduced the new ‘drag and drop’ questions; these form part of the course.

£3195

Contact the Institutes

Fill this form

Advertisement

Indicia Training Logo

img Duration

5 Days

Course Details

Overview:

The CISSP course covers all relevant concepts, case studies, and workshops for key technical areas across the eight domains. ISC2 has recently introduced the new ‘drag and drop’ questions; these form part of the course. All of our instructors have extensive experience in delivering CISSP training around the world. They are Industry Certified Professionals who deliver our events with pride and passion.

 

Course Contents

The 8 CISSP Domains:

Security and Risk Management
•   Understand and apply concepts of confidentiality, integrity and availability
•   Establish and manage information security education, training, and awareness
•   Apply security governance principles
•   Understand legal and regulatory issues that pertain to information security in a global context
•   Understand professional ethics
•   Develop and implement documented security policy, standards, procedures, and guidelines
•   Understand business continuity requirements
•   Contribute to personnel security policies
•   Understand and apply risk management concepts
•   Understand and apply threat modelling
•   Integrate security risk considerations into acquisition strategy and practice

 

Asset Security
•   Classify information and supporting assets (e.g., sensitivity, criticality)
•   Determine and maintain ownership (e.g., data owners, system owners, business/mission owners)
•   Protect privacy
•   Ensure appropriate retention (e.g., media, hardware, personnel)
•   Determine data security controls (e.g., data at rest, data in transit)
•   Establish handling requirements (markings, labels, storage, destruction of sensitive information)

 

Security Engineering
•   Implement and manage engineering processes using secure design principles
•   Understand the fundamental concepts of security models (e.g., Confidentiality, Integrity, and Multi-level Models)
•   Select controls and countermeasures based upon systems security evaluation models
•   Understand security capabilities of information systems (e.g., memory protection, virtualization, trusted platform module, interfaces, fault tolerance)
•   Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements

 

Communications and Network Security
•   Apply secure design principles to network architecture (e.g., IP & non-IP protocols, segmentation)
•   Secure network components
•   Design and establish secure communication channels
•   Prevent or mitigate network attacks

 

Identity and Access Management
•   Control physical and logical access to assets
•   Manage identification and authentication of people and devices
•   Integrate identity as a service (e.g., cloud identity)
•   Integrate third-party identity services (e.g., on premise)
•   Implement and manage authorization mechanisms
•   Prevent or mitigate access control attacks
•   Manage the identity and access provisioning lifecycle (e.g., provisioning, review)

 

Security Assessment and Testing
•   Design and validate assessment and test strategies
•   Conduct security control testing
•   Collect security process data (e.g., management and operational controls)
•   Analyse and report test outputs (e.g., automated, manual)
•   Conduct or facilitate internal and third party audits

 

Security Operations
•   Understand and support investigations
•   Understand requirements for investigation types
•   Conduct logging and monitoring activities
•   Secure the provisioning of resources
•   Understand and apply foundational security operations concepts
•   Employ resource protection techniques
•   Conduct incident management

 

Software Development Security
•   Understand and apply security in the software development lifecycle
•   Enforce security controls in development environments
•   Assess the effectiveness of software security
•   Assess security impact of acquired software

  • Glasgow Branch

    5th Floor, Baltic Chambers, 50 Wellington Street, Glasgow

Check out more Information System courses in UK

Datrix Training Logo

COBIT® Foundation Training

Over the course of two days, delegates who are taking the COBIT® training course will learn a series of skills. They will provided with thorough knowledge of the course during their first day, given to them by experienced trainers who are of a very high quality.

by Datrix Training [Claim Listing ]
Unichrone Ltd Logo

COBIT 2019 Foundation Certification Training

The COBIT 2019 Foundation Certification in United Kingdom is awarded to professionals pursuing a career in the governance of enterprise IT. COBIT 2019 Foundation Certification is one of the entry-level certifications awarded by the Information Systems Audit and Control Association.

by Unichrone Ltd [Claim Listing ]
Pink Elephant Logo

COBIT® 2019 Foundation

From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance.

by Pink Elephant [Claim Listing ]
Fox IT Logo

COBIT5 Foundation Training Course

This COBIT®5 Foundation training course enables delegates to gain knowledge and understanding of the COBIT5 guidance, understand the enterprise governance and management of enterprise IT, and create awareness with their business executives and senior IT management.

by Fox IT [Claim Listing ]
Silicon Beach Training Logo

COBIT® Foundation

Control Objectives for Information and Related Technology (COBIT®) 5 is a framework that guides end-to-end IT enterprise governance and management - centred strongly around thoughtful leadership and guidance from a myriad of global industry experts, in order to meet stakeholder demands.

by Silicon Beach Training [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy