CISSP Training - Hybrid Course

by UNSW Sydney Claim Listing

This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the?CISSP exam (not included).

$4275

Contact the Institutes

Fill this form

Advertisement

UNSW Sydney Logo

img Duration

4 Days 8 Hours

Course Details

Led by an (ISC)² authorised instructor, this training course?provides?a comprehensive review of information security concepts and industry best practices, covering the?8?domains?of the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge.

This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the?CISSP exam (not included).

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organisations from growing sophisticated attacks.?

Backed by (ISC)², the globally recognised, not-for-profit organisation dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.

C?ourse being held in Hybrid model for January 2023. In person in Sydney, or online - you choose how you would like to attend.

 

Course Content:

  • Security and Risk Management

  • Asset Security

  • Security Engineering

  • Communications and Network Security

  • Identity and Access Management

  • Security Assessment and Testing

  • Security Operations

  • Software Development Security

 

Learning Outcomes:

  • Understand and apply the concepts of risk assessment, risk analysis, data classification, and security awareness.

  • Understand the structures, transmission methods, transport formats, and security measures used to provide confidentiality, integrity, and availability for transmissions over private and public communications networks.

  • Offer greater visibility into determining who or what may have altered data or system information.

  • Plan for technology development, including risk, and evaluate the system design against mission requirements.

  • Protect and control information processing assets in centralised and distributed environments.

 

Who should attend

Ideal for: 

The CISSP is ideal for those working in positions such as, but not limited to: Security Consultant; Security Manager; IT Director/Manager; Security Auditor; Security Architect; Security Analyst; Security Systems Engineer; Chief Information Security Officer; Director of Security; Network Architect.

 

Pre-requisites:

It is recommended that participants have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP Common Body of Knowledge.

Holding a four-year university degree or an additional credential from the (ISC)² approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience

  • Canberra Branch

    Defence Force Academy Northcott Drive ACT 2600, Canberra
  • Sydney Branch

    High St Kensington NSW 2052 , Sydney

Check out more CISSP courses in Australia

DDLS Sydney Logo

Certified Information Systems Security Professional

This course is the most comprehensive review of information security concepts and industry best practices, and focuses on the eight domains of the CISSP CBK® (Common Body of Knowledge) that are covered in the CISSP exam. You will gain knowledge in information security that will increase your abili...

by DDLS Sydney [Claim Listing ]
ALC Training Logo

COBIT® 2019 Foundation

The COBIT framework addresses both business and IT functional areas across an enterprise and considers the IT-related interests of internal and external stakeholders. Enterprises of all sizes can benefit from COBIT, whether commercial, not-for-profit or in the public sector.

by ALC Training [Claim Listing ]
Melbourne International Graduate College Logo

ISO 27001 (Foundation)

ISO 27001 is the international standard that provides the basis for effective management of confidential and sensitive information and the application of information security controls. It enables organizations to demonstrate excellence and prove best practice in information security management.

by Melbourne International Graduate College [Claim Listing ]
Koenig Solutions Logo

COBIT5 Foundation

The COBIT certification course from Koenig Solutions provides a complete framework for the business governance and enterprise IT management. The candidates will be introduced to five basic principles to guide them through the process of implementing IT governance in an organization.

by Koenig Solutions [Claim Listing ]
  • Price
  • Start Date
  • Duration
Pwc Auditor Training Logo

Information Security Management Systems Lead Auditor

ISO/IEC 27001:2022 provides the framework to ensure your organisation has robust security processes and controls so you can meet supplier, customer, and regulatory expectations in data protection.

by Pwc Auditor Training [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy