CISSP Certified Information Systems Security Professional

by NILC Training Claim Listing

CISSP (Certified Information Systems Security Professional) draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards and practices.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

NILC Training Logo

img Duration

5 Days

Course Details

CISSP (Certified Information Systems Security Professional) draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards and practices.

This CISSP exam preparation course deals with the security concepts to be mastered in order to obtain CISSP certification. In an accelerated but rigorous manner, this training prepares the student for the CISSP examination, covering the entirety of the Common Body of Knowledge about security (CBK) as defined by the ISC2®.

 

Outline:

  • CISSP Certified Information Systems Security Professional
  • Module 1. Security and Risk Management
  • Aligning security and risk to organisational objectives
  • Evaluate and apply security governance principles
  • Implement policies, standards and procedures
  • Applying compliance
  • Applying risk management concepts
  • Assessing threats and vulnerabilities
  • Performing risk analysis and control
  • Defining qualitative and quantitative analysis
  • Preserving the business
  • Adhering to Business Continuity Management Code of Practise and Specifications
  • Performing a business impact analysis
  • Investigating legal measures and techniques
  • Reviewing intellectual property, liability and law, and compliance
  • Differentiating traditional computer crime
  • Establish information and asset handling requirements
  • Module 2. Asset Security
  • Examining security models and frameworks
  • The Information Security Triad and multi-level models
  • Investigating industry standards: ISO 27001/27002
  • Evaluating security model fundamental concepts
  • Exploring system and component security concepts
  • Certification and accreditation criteria and models
  • Reviewing mobile system/cloud/IoT vulnerabilities
  • Protecting information by applying cryptography
  • Detailing symmetric and asymmetric encryption systems
  • Ensuring message integrity through hashing
  • Uncovering threats to cryptographic systems
  • Safeguarding physical resources
  • Designing environments to resist hostile acts and threats
  • Designing environments to resist hostile acts and threats
  • Module 3. Communication & Network Security
  • Defining a secure network architecture
  • TCP/IP and other protocol models
  • Protecting from network attacks
  • Reviewing secure network components and communication channels
  • Examining secure networks and components
  • Identifying wired and wireless technologies
  • Implementing firewalls, secure communications, proxies, and tunnels
  • Module 4. Identity & Access Management
  • Controlling access to protect assets
  • Defining administrative, technical and physical controls
  • Implementing centralised and decentralised approaches
  • Investigating biometric and multi-factor authentication
  • Identifying common threats
  • Manage the identity and access provisioning lifecyle
  • Module 6. Security Assessment & Testing
  • Designing and conducting security assessment strategies
  • Leveraging the role of testing and auditing to analyse the effectiveness of security controls
  • Differentiating detection and protection systems
  • Conducting logging and monitoring activities
  • Distinguishing between the roles of internal and external audits
  • Conduct or facilitate security audits
  • Module 7. Security Operations
  • Maintaining operational resilience
  • Managing security services effectively
  • Leveraging and supporting investigations and incident response
  • Differentiating detection and protection systems
  • Securely provisioning resources
  • Developing a recovery strategy
  • Designing a disaster recovery plan
  • Implementing test and maintenance processes
  • Provisioning of resources
  • Module 8. Software Security Development
  • Securing the software development life cycle
  • Applying software development methods and security controls
  • Addressing database security concepts and issues
  • Define and apply secure coding guidelines and standards
  • Reviewing software security effectiveness and security impact
  • Cardiff Branch

    Temple Court, 13a Cathedral Road, Cardiff

Check out more CISSP courses in UK

Learning Tree Logo

Certified Risk and Information Systems Control (CRISC) Training

This official ISACA CRISC training provides you with in-depth coverage on the four CRISC domains: risk identification; IT risk assessment; risk response and mitigation; risk and control monitoring and reporting.

by Learning Tree [Claim Listing ]
Pearce Mayfield Logo

CISA Certified Information Systems Auditor

The CISA Certified Information Systems Auditor course is delivered by expert CISA trainers. After completing this course, the delegates will able to get higher salaries in the IT industry. Pearce Mayfield’s CISA course is accredited by ISACA.

by Pearce Mayfield [Claim Listing ]
Silicon Beach Training Logo

COBIT® Foundation

Control Objectives for Information and Related Technology (COBIT®) 5 is a framework that guides end-to-end IT enterprise governance and management - centred strongly around thoughtful leadership and guidance from a myriad of global industry experts, in order to meet stakeholder demands.

by Silicon Beach Training [Claim Listing ]
TSG Training Logo

Certified in Risk and Information Systems Control (CRISC)

CRISC is the only certification that prepares and enables IT professionals for the unique challenges of? IT and enterprise risk management and positions them to become strategic partners to the enterprise, helping enterprises accomplish business objectives by designing, implementing, monitoring

by TSG Training [Claim Listing ]
Batalas Logo

ISO/IEC 27001:2022 Internal Auditor

A highly interactive 2-day ISO/IEC 27001:2022 Internal Auditor ISMS (Information Security Management System) training course that will teach you the tools and techniques of how to be an internal auditor in your own organisation.

by Batalas [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy