CISSP - Certified Information System Security Professional

Apply now for our CISSP Training Course



 
  • Learn control access to information systems
  • Design security architecture
  • Handle physical security and operations security
  • Learn about Cryptography and Ciphers
  • Plan for disaster recover and business continuity

 

Course Details and Pricing


Instructor Led Learning


  Duration: 5 Days

  Registration Open Now!

Video Learning


  Duration: 5 Days

  Registration Open Now!

 

Call us : 021 419 3213

Windows 7 overview

CISSP Course Overview


The Certified Information System Security Professional (CISSP) training courses program addresses the essential elements of the 10 domains that comprise a Common Body of Knowledge. It offers a job-related approach to the security process, and provides basic skills required to prepare for CISSP certification and to pass the CISSP exam. It is the perfect option for those seeking to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.

 

Is this course for you?


Our CISSP courses is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career

 

About This Course

Our CISSP courses enable you to control access to information systems, design security architecture, develop information security programs, plan for disaster recover and business continuity

3 Steps to Master CISSP Training Course

01

Take a
course

02

Write an
Exam

03

Get
Certified

What you will learn

CISSP (Certified Information System Security Professional) Training Course
  • Course Overview Full course outline
    • Module 1:Security Governance Through Principles and Policies
    • Module 2:Personnel Security and Risk Management Concepts
    • Module 3:Business Continuity Planning
    • Module 5:Laws, Regulations, and Compliance
    • Module 5:Protecting Security of Assets
    • Module 6:Cryptography and Symmetric Key Algorithms
    • Module 7:PKI and Cryptographic Applications
    • Module 8:Principles of Security Models, Design, and Capabilities
    • Module 9:Security Vulnerabilities, Threats, and Countermeasures
    • Module 10:Physical Security Requirements
    • Module 11:Secure Network Architecture and Securing Network Components
    • Module 12:Secure Communications and Network Attacks
    • Module 13:Managing Identity and Authentication
    • Module 14:Controlling and Monitoring Access
    • Module 15:Security Assessment and Testing
    • Module 16:Managing Security Operations
    • Module 17:Preventing and Responding to Incidents
    • Module 18:Disaster Recovery Planning
    • Module 19:Incidents and Ethics
    • Module 20:Software Development Security
    • Module 21:Malicious Code and Application Attacks

Full course outline

CISSP (Certified Information System Security Professional) Training Course
 

Module 1: Security Governance Through Principles and Policies

  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
  • Apply Security Governance Principles
  • Develop and Implement Documented Security Policy, Standards,Procedures, and Guidelines
  • Understand and Apply Threat Modelling
  • Integrate Security Risk Considerations into Acquisition Strategy and Practice

Module 2: Personnel Security and Risk Management Concepts

  • Contribute to Personnel Security Policies
  • Security Governance
  • Understand and Apply Risk Management Concepts
  • Establish and Manage Information Security Education, Training, and Awareness
  • Manage the Security Function

Module 3: Business Continuity Planning

  • Project Scope and Planning
  • Business Impact Assessment
  • Continuity Planning
  • BCP Documentation

Module 5: Laws, Regulations, and Compliance

  • Categories of Laws
  • Laws
  • Compliance
  • Contracting and Procurement

Module 5: Protecting Security of Assets

  • Classifying and Labeling Assets
  • Identifying Data Roles
  • Protecting Privacy

Module 6: Cryptography and Symmetric Key Algorithms

  • Historical Milestones in Cryptographys
  • Cryptographic Basics
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Life Cycle

Module 7: PKI and Cryptographic Applications

  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Applied Cryptography
  • Cryptographic Attacks

Module 8: Principles of Security Models, Design, and Capabilities

  • Implement and Manage Engineering Processes Using Secure Design Principles
  • Understand the Fundamental Concepts of Security Models
  • Select Controls and Countermeasures Based on Systems Security Evaluation Models
  • Understand Security Capabilities of Information Systems

Module 9: Security Vulnerabilities, Threats, and Countermeasures

  • Assess and Mitigate Security Vulnerabilities
  • Client-Based
  • Server-Based
  • Database Security
  • Distributed Systems
  • Industrial Control Systems
  • Assess and Mitigate Vulnerabilities in Web-Based Systems
  • Assess and Mitigate Vulnerabilities in Mobile Systems
  • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Essential Security Protection Mechanisms
  • Common Architecture Flaws and Security Issues

Module 10: Physical Security Requirements

  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
  • Apply Security Governance Principles
  • Develop and Implement Documented Security Policy, Standards,Procedures, and Guidelines
  • Understand and Apply Threat Modelling
  • Integrate Security Risk Considerations into Acquisition Strategy and Practice

Module 11: Secure Network Architecture and Securing Network Components

  • OSI Model
  • TCP/IP Model
  • Converged Protocols
  • Wireless Networks
  • General Wi-Fi Security Procedure
  • Cabling, Wireless, Topology, and Communications Technology

Module 12: Secure Communications and Network Attacks

  • Network and Protocol Security Mechanisms
  • Secure Voice Communications
  • Multimedia Collaboration
  • Manage Email Security
  • Remote Access Security Management
  • Virtual Private Network
  • Virtualization
  • Network Address Translation
  • Switching Technologies
  • WAN Technologies
  • Miscellaneous Security Control Characteristics
  • Security Boundaries
  • Prevent or Mitigate Network Attack

Module 13: Managing Identity and Authentication

  • Controlling Access to Assets
  • Comparing Identification and Authentication
  • Implementing Identity Management
  • Managing the Identity and Access Provisioning Life Cycle

Module 14: Controlling and Monitoring Access

  • Comparing Access Control Models
  • Understanding Access Control Attacks

Module 15: Security Assessment and Testing

  • Building a Security Assessment and Testing Program
  • Performing Vulnerability Assessments
  • Testing Your Software
  • Implementing Security Management Processes

Module 16: Managing Security Operations

  • Applying Security Operations Concepts
  • Provisioning and Managing Resources
  • Managing Configuration
  • Managing Change
  • Managing Patches and Reducing Vulnerabilities

Module 17: Preventing and Responding to Incidents

  • Managing Incident Response
  • Implementing Preventive Measures
  • Logging, Monitoring, and Auditing

Module 18: Disaster Recovery Planning

  • The Nature of Disaster
  • Understand System Resilience and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance

Module 19: Incidents and Ethics

  • Investigations
  • Major Categories of Computer Crime
  • Incident Handling

Module 20: Software Development Security

  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehousing
  • Storing Data and Information
  • Understanding Knowledge-Based Systems

Module 21: Malicious Code and Application Attacks

  • Malicious Code
  • Password Attacks
  • Application Attacks
  • Web Application Security
  • Reconnaissance Attacks
  • Masquerading Attacks