This 5-day CISSP Prep concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. The course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in 2021.
This 5-day CISSP Prep concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. The course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in 2021.
The course will broaden and deepen your understanding of the domains and give you full preparation for the ISC2 CISSP accreditation examination.
Learning Outcomes
This 5-day training program is designed to fully prepare you for the CISSP certified information systems security profession exam. It focuses on the 8 Common Body of Knowledge CBK areas designated by ISC2:
This course is designed to best prepare participants to pass the CISSP exam. Also, attending this information system security certification, based on the CISSP common body of knowledge CBK you are also eligible for continuing professional education hours. CPE credits can be gained based on the hours of professional development you achieve allowing current ics members and more to maintain their credentials.
Who Should Attend
The CISSP prep course is designed for experienced security professionals who want to expand their knowledge and gain an internationally recognised certification. It is ideal for those working in positions such as, but not limited to:
Security Consultant
Security Manager
IT Director/Manager
Security Auditor
Security Architect
Security Analyst
Security Systems Engineer
Chief Information Security Officer
Director of Security
Network Architect
Prerequisities
Whilst anyone can attend the course, please note that the CISSP accreditation is only available to those who meet the ISC2 entry requirements.
To attain the CISSP certification candidates must have a minimum of 5 years of direct, full-time security professional work experience in 2 or more of the domains of the CISSP CBK. One year of work experience may be waived by ISC2 if the candidate holds a four-year or higher college or university degree or approved credential. Candidates who do not meet these criteria may be given Associate status until conditions are met.
Unsure if you have adequate experience?
If you are unsure whether you meet the requisite experience criteria, please refer to the (ISC)2 web site pages dealing with Professional Experience Requirement and becoming an Associate of ISC2.
Contents
This course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in 2021. All topics of the new CBK are fully covered and the course provides full prep for the CISSP exam.
Introduction
Course Overview
Review and Revision Techniques
The Exam, On the Day of the Exam, Exam Technique, After the Exam
Domain 1: Security and Risk Management
Understand, adhere to, and promote professional ethics
Understand and apply security concepts
Evaluate and apply security governance principles
Determine compliance and other requirements
Understand legal and regulatory issues that pertain to information security in a holistic context
Understand requirements for investigation types
Develop, document, and implement security policy, standards, procedures, and guidelines
Identify, analyse, and prioritize Business Continuity (BC) requirements
Contribute to and enforce personnel security policies and procedures
Understand and apply risk management concepts
Understand and apply threat modelling concepts and methodologies
Apply Supply Chain Risk Management (SCRM) concepts
Establish and maintain a security awareness, education, and training program
Domain 2: Asset Security
Identify and classify information and assets
Establish information and asset handling requirements
Provision resources securely
Manage data lifecycle
Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))
Determine data security controls and compliance requirements
Domain 3: Security Architecture and Engineering
Research, implement and manage engineering processes using secure design principles
Understand the fundamental concepts of security models
Select controls based upon systems security requirements
Understand security capabilities of Information Systems (IS)
Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
Select and determine cryptographic solutions
Understand methods of cryptanalytic attacks
Apply security principles to site and facility design
Design site and facility security controls
Domain 4: Communications and Network Security
Assess and implement secure design principles in network architectures
Secure network components
Implement secure communication channels according to design
Secure network components
Implement secure communication channels according to design
Domain 5: Identity and Access Management
Control physical and logical access to assets
Manage identification and authentication of people, devices, and services
Federated identity with a third-party service
Implement and manage authorization mechanisms
Manage the identity and access provisioning lifecycle
Implement authentication systems
Manage the identity and access provisioning lifecycle
Implement authentication systems
Domain 6: Security Assessment and Testing
Design and validate assessment, test, and audit strategies
Conduct security control testing
Collect security process data (e.g., technical and administrative)
Analyse test output and generate report
Conduct or facilitate security audits
Domain 7: Security Operations
Understand and comply with investigations
Conduct logging and monitoring activities
Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)
Apply foundational security operations concepts
Apply resource protection
Conduct incident management
Operate and maintain detective and preventative measures
Implement and support patch and vulnerability management
Understand and participate in change management processes
Implement recovery strategies
Implement Disaster Recovery (DR) processes
Test Disaster Recovery Plans (DRP)
Participate in Business Continuity (BC) planning and exercises
Implement and manage physical security
Address personnel safety and security concerns
Domain 8: Software Development Security
Understand and integrate security in the Software Development Life Cycle (SDLC)
Identify and apply security controls in software development ecosystems
Assess the effectiveness of software security
Assess security impact of acquired software
Define and apply secure coding guidelines and standards
Who We Are And What We Do
ALC is a leading Australia-based provider of quality training for business and government, since 1994. Our focus is on best-practice methods and frameworks that help ensure you get the most out of your investment.
With offices in Sydney, Melbourne, Brisbane, Singapore and Kuala Lumpur, our courses are held regularly throughout Australia, New Zealand and South-East Asia. More than 55,000 people have trained with ALC.
Company Announcement
We are pleased to advise that as of 17 March 2023, ALC Training has become a part of the Tesserent Group of companies as the first key step of the new Tesserent Academy initiative.
The mission statement of the Tesserent Academy is to be the pre-eminent provider of cyber security education in the Asia-Pacific region. ALC, with its very strong background of nearly 30 years in information and cyber security training will provide Tesserent Academy with an immediate and commanding position in this sector.
By joining Tesserent, ALC will have access to a much greater range of resources which will lead to many new opportunities and significantly increased growth potential.
The focus will be on portfolio expansion, the development of new skills-based programs, and the creation of new certifications relevant to our region.
Why Choose Alc?
There are many providers of training, just as there are many providers of most services. So how do you choose?
Well, for starters, training for us is not a sideline activity – it is all that we do. And we have been doing it since March 1994. In that time, we have seen many training companies come and go. To be a market leader all this time, we must be doing something right.
We are a team of dedicated and capable people who care about what we do. We give it single-minded focus. We offer commitment, professionalism, and enthusiasm.
When You Train With ALC You Get:
COBITĀ® is a framework for the enterprise governance and management of information and technology (I&T) that supports enterprise goal achievement. This foundation course is intended for those new to COBIT who are interested in achieving the latest foundation certificate as well as current COBIT 5
This Certified ISO27001 Practitioners training course will provide delegates with the requirements and principles of ISO/IEC 27001, with an awareness of the issues and challenges involved in implementing an information security management system.
This course will provide attendees with an introduction to IT auditing, emphasising the concepts through exercises and case studies. Internal audit professionals will develop knowledge of basic IT audit concepts that can be used to facilitate integrated audit efforts within their organisation.
Certified Information Systems Security Professional (CISSP)Ā is an independent information security certification governed by the International Information System Security Certification Consortium, also known asĀ (ISC)Ā².
ISO/IEC 27001:2022 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001:2022.
Ā© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy