CISSP - Certified Information System Security Professional

Apply now for our CISSP Course



  • Learn control access to information systems
  • Design security architecture
  • Handle physical security and operations security.
  • Learn about Cryptography and Ciphers
  • Plan for disaster recover and business continuity.


Course Details


Instructor Led Learning


  Duration: 5 Days

  Learning Material : All included.

  Registration Open Now!

Video Learning


  Duration: 5 Days

  Registration Open Now!

Call us : 0861 111 460

CISSP (Certified Information System Security Professional) Training

Our CISSP courses enable you to control access to information systems, design security architecture, develop information security programs, plan for disaster recover and business continuity.


CISSP Course overview

The Certified Information System Security Professional (CISSP) training courses program addresses the essential elements of the 10 domains that comprise a Common Body of Knowledge.


It offers a job-related approach to the security process, and provides basic skills required to prepare for CISSP certification and to pass the CISSP exam.


It is the perfect option for those seeking to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.


pastel training course cape town

Is this course for you?

Our CISSP courses is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career


cissp training cape town,cissp training, Security courses

Available CISSP Exams


Average Salary: 45,000 per month

Job Opportunities

The CISSP is ideal for those working in positions such as, but not limited to:

  • Security Engineer, Information Systems
  • Information Security Analyst
  • Security Consultant, (Computing / Networking / Information Technology)
  • Information Security Manager
  • Information Security Officer
  • Average Salary: R418,000.00

    3 Steps to Master CISSP

    01

    Take a
    course

    02

    Write an
    Exam

    03

    Get
    Certified

    What you will learn
    CISSP (Certified Information System Security Professional) Training Course

    • Lesson 1: Information Systems Access Control
    • Lesson 2: Security Architecture and Design
    • Lesson 3: Network and Telecommunications Security
    • Lesson 4: Information Security Management Goals
    • Lesson 5: Information Security Classification and Program Development
    • Lesson 6: Risk Management and Ethics
    • Lesson 7: Application Security
    • Lesson 8: Cryptography
    • Lesson 9: Physical Security
    • Lesson 10: Operations Security
    • Lesson 11: Business Continuity and Disaster Recovery Planning
    • Lesson 12: Legal, Regulations, Compliance and Investigation

    Full course outline
    CISSP (Certified Information System Security Professional) Training Course

    Lesson 1: Information Systems Access Control

    • Data Access Principles
    • System Access and Authentication
    • Penetration Tests

    Lesson 2: Security Architecture and Design

    • Security Models
    • Security Modes
    • System Assurance

    Lesson 3: Network and Telecommunications Security

    • Data Network Design
    • Remote Data Access
    • Data Network Security
    • Data Network Management

    Lesson 4: Information Security Management Goals

    • Organizational Security
    • The Application of Security Concepts

    Lesson 5: Information Security Classification and Program Development

    • Information Classification
    • Security Program Development

    Lesson 6: Risk Management and Ethics

    • Risk Management
    • Ethics

    Lesson 7: Application Security

    • Software Configuration Management
    • Software Controls
    • Database System Security

    Lesson 8: Cryptography

    • Ciphers and Cryptography
    • Symmetric-Key Cryptography
    • Asymmetric-Key Cryptography
    • Hashing and Message Digests
    • Email, Internet, and Wireless Security
    • Cryptographic Weaknesses

    Lesson 9: Physical Security

    • Physical Access Control
    • Physical Access Monitoring
    • Physical Security Methods
    • Facilities Security

    Lesson 10: Operations Security

    • Major Legal Systems
    • Legal Concepts
    • Regulatory Issues
    • Investigation
    • Computer Forensics

    Lesson 11: Business Continuity and Disaster Recovery Planning

    • Business Continuity Plan Fundamentals
    • Business Continuity Plan Implementation
    • Disaster Recovery Plan Fundamentals
    • Disaster Recovery Plan Implementation

    Lesson 12: Legal, Regulations, Compliance, and Investigations

    • Computer Crime Laws and Regulations
    • Computer Crime Incident Response

    Related Courses

    Are you ready to become a Certified Information System Security Professional?