CISSP – Certified Information Systems Security Professional

by Elite Training Claim Listing

With today's complex and diverse enterprise networks, maintaining security is one of the greatest challenges organisations face. It is difficult to properly configure systems and networks for maximum security.

£1895

Contact the Institutes

Fill this form

Advertisement

Elite Training Logo

img Duration

5 Days

Course Details

With today's complex and diverse enterprise networks, maintaining security is one of the greatest challenges organisations face. It is difficult to properly configure systems and networks for maximum security.

Any weakness in the defence is enough to render the organisation vulnerable. The skill set required of the security team is very wide. In an effort to define the knowledgebase required for enterprise security (ISC)2 have defined the Common Body of Knowledge (CBK), which consists of ten test domains.

The Certified Information Systems Security Professional CISSP® exam is built from a pool of multiple-choice questions drawn from the CBK.

 

Prerequisites:

For CISSP ISC2 exam requires that candidates have work experience (4 years with degree or 5 years without degree) in two, or more of the ten test domains of the information systems [IS] security Common Body of Knowledge (CBK). Note that candidates for CISSP without the required work experience can still sit the exam and become an associate CISSP. 

 

Course Content

Security Management Practices

  • Identification of information assets

  • Policies, standards, procedures

  • Confidentiality, integrity, and availability.

  • Data classification,

  • Risk management, risk assessment, and risk analysis;

  • Countermeasure evaluation

  • Security roles

  • Security awareness training

  • Personnel policy

Security Architecture & Models

  • Computer architectures

  • Security models

  • Trusted Computer Base

  • ITSEC

  • TCSEC

  • Common Criteria

  • OS security components

  • IETF IPSEC

  • Certification and Accreditation

  • Security issues associated with system architectures

Access Control Systems & Methodology

  • Access Control techniques

  • Access Control Administration

  • Access Control Models

  • Identification and Authentication Techniques

  • Single Sign-On (SSO)

  • Access Control Methodologies and Implementation

  • File and Data Ownership and Custodianship

  • Methods of Attack

  • Monitoring

  • Penetration Testing 

Applications & Systems Development

  • Systems development management

  • Change Control

  • Certification

  • Accreditation

  • Security Control Architecture

  • Malicious Code

  • Virus writers Hackers, crackers, and phreaks

  • Virus protection, types of computer viruses

  • Mobile code security issues

Cryptography

  • Cryptographic basics

  • Comparison of cryptographic algorithms

  • Key management

  • Key Distribution Methods

  • Kerberos,

  • ISAKMP

  • Public Key Algorithms

  • Public Key Infrastructure (PKI)

  • Certificate Authorities

  • Smart cards and tokens

  • Methods of Attack

Telecommunications & Network Security

  • ISO/OSI Layers and Characteristics

  • Remote Access Dial-In User System/Terminal Access Control

  • RADIUS/TACACS

  • Internet/Intranet/Extranet

  • Secure communication protocols

  • Virtual Private Network (VPN)

  • Network Address Translation

  • E-mail security

  • Facsimile security

  • Secure Voice Communications

  • Security boundaries and how to translate security policy to controls

  • Network Attacks and Countermeasures

Operations Security

  • Administrative Management

  • Separation of Duties and Responsibilities

  • Backup of Critical information

  • Standards of Due Care/Due Diligence

  • Record retention

  • Control Types

  • Operations Controls

  • Resource Protection

  • Auditing

  • Reporting mechanisms

  • Monitoring tools and techniques

  • Failure recognition and response

  • Intrusion detection

  • Penetration testing techniques

  • Inappropriate activities

  • Internal threats and Countermeasures

  • Violations, Breaches, and Reporting

Physical Security

  • Physical site security controls

  • Electronic site access controls

  • Environment/Life Safety

  • Physical security threats and countermeasures

  • Fire (sensors, sprinklers, flooding systems, extinguishers)

  • Water (leakage and flooding)

  • Electrical (UPS and generators)

  • Environmental

Business Continuity & Disaster Recovery Planning

  • Business Continuity Planning

  • Cold/Warm/Hot/Mobile Sites

  • Recovery processes

  • Disaster Recovery Planning

  • Recovery Plan Development

  • Emergency Response

  • Reconstruction from Backups

  • Crisis Management

  • BCP/DRP Events

Law, Investigation & Ethics

  • Legal categories

  • Criminal Law

  • Civil Law

  • Administrative Law

  • Investigations

  • Rules of Evidence

  • Collection and preservation of evidence

  • Investigation Processes and Techniques

  • Major categories of computer crime

  • Incident Handling

  • Ethics

  • (ISC2) Code of Ethics 

  • Glasgow Branch

    1 Blythswood Square, Glasgow
  • Liverpool Branch

    Liverpool Science Park Innovation Centre 131 Mount Pleasant, Liverpool

Check out more CISSP courses in UK

AMP Information Systems Ltd Logo

Specialist IT Training

At AMP, we can give you the skills and confidence to use every part of your IT infrastructure properly and efficiently. We know just how important it is that you and your staff can get the most from your systems, so we offer courses that are developed with your needs in mind.

by AMP Information Systems Ltd [Claim Listing ]
Firebrand Logo

ISO 27001 Foundation (Information Security Management)

Learn the best practices for implementing and managing an Information Security Management System (ISMS) - as specified in ISO/IEC 27001:2013.

by Firebrand [Claim Listing ]
Datrix Training Logo

Certified Information Security Auditor course (CISA Training)

A Certified Information Security Auditor course (CISA Training) is ideal for anybody who wishes to have a career revolving around being an IT Auditor since it provides an insight into sound control and management of information security audit.

by Datrix Training [Claim Listing ]
BSI Training Academy Logo

Certified Information Systems Auditor (CISA®)

ou'll also get the knowledge, skills and best practices to successfully audit, control and secure your information system. This course will prepare you with the knowledge you need to complete the ISACA CISA multiple choice exam, which gives you Certified Information Systems Auditor status.

by BSI Training Academy [Claim Listing ]
NoblePRog (UK) Logo

Certified Information System Security Professional (CISSP) CBK Review

A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart.

by NoblePRog (UK) [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy