CISSP

by Pentagon Training Limited Claim Listing

The Certified Information Systems Security Professional course is for candidates looking to gain knowledge and skills over 5 days. This course will help candidates gain professional qualifications.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Pentagon Training Limited Logo

img Duration

5 Days

Course Details

The Certified Information Systems Security Professional course is for candidates looking to gain knowledge and skills over 5 days. This course will help candidates gain professional qualifications. Certified Information systems is for those working in information security design focused environments looking to gain new attributes.

Candidates will learn how to apply appropriate retention and security controls. The trainer will give candidates an insight in how to handle requirements with markings and labels.

 

Pre-Requisites:

  • Candidates attending this course should have the following experience:
  • Five years full-time paid work experience
  • Or
  • Four years’ experience with an information security university degree in 2 or more of the following domains in CISSP:
  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

 

Who Should Attend?

  • This course should be attended by candidates interested in Information security.

 

What Will You Learn?

  • How to apply appropriate retention and security controls
  • How to handle requirements with markings and labels
  • How to use the correct protection principles
  • How to evaluate security models
  • How to manage web-based and mobile system vulnerable
  • How to embed system vulnerabilities

 

Course Outline:

  • Introduction
  • Security and Risk Management
  • Availability concepts
  • Governance principles
  • Compliance
  • Legal issues
  • Regulatory issues
  • Professional ethic
  • Security policies
  • Standards
  • Procedures
  • Guidelines
  • Asset Security
  • Information classification
  • Asset classification
  • Ownership
  • Privacy protecting
  • Retention
  • Data security controls
  • Handling requirements
  • Security Engineering
  • Engineering processes
  • Design principles
  • Fundamental concepts
  • Evaluation models
  • Information systems
  • Security capabilities
  • Security architecture
  • Mobile systems
  • Embedded devices
  • System vulnerabilities
  • Cryptography
  • Site design
  • Facility design
  • Physical security
  • Communication and network security
  • Secure network architecture
  • Network components
  • Communication channels
  • Network attacks
  • Identity and access management
  • Logical asset control
  • Identification
  • Authentication
  • Service identity
  • Third-party identity services
  • Control attacks
  • Identity lifecycle
  • Access lifecycle
  • Security assessment
  • Assessment strategies
  • Test strategies
  • Process data
  • Control testing
  • Test outputs
  • Security architectures
  • Security Operations
  • Investigating support and requirements
  • Logging and monitoring activities
  • Provisioning of resources
  • Foundational security concepts
  • Resource protection techniques
  • Incident management
  • Preventative measures
  • Vulnerability management
  • Change management processes
  • Recovery strategies
  • Disaster recovery processes
  • Business continuity planning
  • Physical security
  • Personnel safety concerns
  • Reading Branch

    1 Bell Street, Maidenhead, Berkshire, SL6 1BU, Reading

Check out more CISSP courses in UK

Net Security Training Logo

ISO/IEC 27001 Lead Implementer

This five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques.

by Net Security Training [Claim Listing ]
Learning Tree Logo

CISSP® Training and Certification Prep Course

The CISSP Training and Certification Prep Course is a comprehensive training course aimed at preparing individuals for the CISSP Certified Information Systems Security Professional exam.

by Learning Tree [Claim Listing ]
BIT Training Logo

ISACA CRISC

ISACA’s Certified in Risk and Information Systems Control (CRISC) certification indicates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls.

by BIT Training [Claim Listing ]
MSP Training Logo

CISA Certified Information Systems Auditor

Issued by ISACA, CISA is designed especially for those who are involved in managing, monitoring and protecting IT operations via audit. This training will enable the delegates to go through all the concepts and terminologies used in the exam so that the exam can be cleared easily.

by MSP Training [Claim Listing ]
London IT Training (LIT) Logo

Certified Information System Security Professional (CISSP)

Certified Information System Security Professional (CISSP) is a well-reputed recognition for any Cyber Security professional. This training program’s subject matter will make you ready to effectively design, deploy, and configure an enterprise-level Computer network.

by London IT Training (LIT)

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy