This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the?CISSP exam (not included).
Led by an (ISC)² authorised instructor, this training course?provides?a comprehensive review of information security concepts and industry best practices, covering the?8?domains?of the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge.
This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the?CISSP exam (not included).
The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organisations from growing sophisticated attacks.?
Backed by (ISC)², the globally recognised, not-for-profit organisation dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.
C?ourse being held in Hybrid model for January 2023. In person in Sydney, or online - you choose how you would like to attend.
Course Content:
Security and Risk Management
Asset Security
Security Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security
Learning Outcomes:
Understand and apply the concepts of risk assessment, risk analysis, data classification, and security awareness.
Understand the structures, transmission methods, transport formats, and security measures used to provide confidentiality, integrity, and availability for transmissions over private and public communications networks.
Offer greater visibility into determining who or what may have altered data or system information.
Plan for technology development, including risk, and evaluate the system design against mission requirements.
Protect and control information processing assets in centralised and distributed environments.
Who should attend
Ideal for:
The CISSP is ideal for those working in positions such as, but not limited to: Security Consultant; Security Manager; IT Director/Manager; Security Auditor; Security Architect; Security Analyst; Security Systems Engineer; Chief Information Security Officer; Director of Security; Network Architect.
Pre-requisites:
It is recommended that participants have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP Common Body of Knowledge.
Holding a four-year university degree or an additional credential from the (ISC)² approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience
UNSW Sydney welcomed the opportunity to make a submission in response to the discussion paper released by the Australian Universities Accord Panel, furthering our involvement in ensuring that the Australian higher education sector is well prepared for the future.
The UNSW submission emphasised that the purpose of Australia’s public universities, including UNSW, is to support the prosperity, sustainability, security, and social and economic wellbeing of Australian society.
UNSW Sydney welcomed the opportunity to make a submission in response to the discussion paper released by the Australian Universities Accord Panel, furthering our involvement in ensuring that the Australian higher education sector is well prepared for the future.
The UNSW submission emphasized that the purpose of Australia’s public universities, including UNSW, is to support the prosperity, sustainability, security, and social and economic well-being of Australian society.
The Submission Made 25 Recommendations Spanning
This course is the most comprehensive review of information security concepts and industry best practices, and focuses on the eight domains of the CISSP CBK® (Common Body of Knowledge) that are covered in the CISSP exam. You will gain knowledge in information security that will increase your abili...
The COBIT framework addresses both business and IT functional areas across an enterprise and considers the IT-related interests of internal and external stakeholders. Enterprises of all sizes can benefit from COBIT, whether commercial, not-for-profit or in the public sector.
ISO 27001 is the international standard that provides the basis for effective management of confidential and sensitive information and the application of information security controls. It enables organizations to demonstrate excellence and prove best practice in information security management.
The COBIT certification course from Koenig Solutions provides a complete framework for the business governance and enterprise IT management. The candidates will be introduced to five basic principles to guide them through the process of implementing IT governance in an organization.
ISO/IEC 27001:2022 provides the framework to ensure your organisation has robust security processes and controls so you can meet supplier, customer, and regulatory expectations in data protection.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy