Certified Information Systems Security Professional Training
- Our CISSP training courses include everything required to pass the CISSP exam and master the Common Body of Knowledge
- Boost your information security career with a CISSP qualification, the gold standard in vendor-neutral information security certification
- Certified CISSPs are highly respected for their skills and knowledge of information security and can earn high salaries
- Enrol today and receive expert tuition from trusted CISSP trainers with years of industry experience
Course | Date | Venue | Duration | Price | Book Online |
---|---|---|---|---|---|
CISSP Certified Information Systems Security ProfessionalHome Virtual deal - 20% off | 02/12/2024 | Home Virtual | 5 days | £1995 | Book OnlineEnquire |
CISSP Certified Information Systems Security ProfessionalHome Virtual deal - 20% off | 16/12/2024 | Home Virtual | 5 days | £1995 | Book OnlineEnquire |
FAQs
What time shall I arrive at the venue?
Please arrive at the venue for 08:45am
What are the pre-requisites?
Candidates attending this course should have the following experience: Five years full-time paid work experience Or Four years’ experience with an information security university degree in 2 or more of the following domains in CISSP: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security
What is the duration of the course?
5 days
Do I need to bring anything with me to the course?
Note pad and pen
How long until I receive the course confirmation details?
Once your booking has been placed and confirmed, you will receive an email which contains your course location, course overview, pre-course reading material (if required), course agenda and payment receipts
What is the experience of the instructor(s) delivering my course?
All of our instructors are fully accredited and have over ten years of experience
Overview
Introduction
The Certified Information Systems Security Professional course is for candidates looking to gain knowledge and skills over 5 days. This course will help candidates gain professional qualifications. Certified Information systems is for those working in information security design focused environments looking to gain new attributes.
Candidates will learn how to apply appropriate retention and security controls. The trainer will give candidates an insight in how to handle requirements with markings and labels.
Pre-Requisites
Candidates attending this course should have the following experience:
- Five years full-time paid work experience
Or
- Four years’ experience with an information security university degree in 2 or more of the following domains in CISSP:
- Security and Risk Management
- Asset Security
- Security Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
Who should attend?
- This course should be attended by candidates interested in Information security.
Course structure
- Classroom training (5 days)
(Exam is separate from this course)
Exam Structure
- The exam is booked separately and is taken at a Pearson Vue Test Centre
- Multiple choice
- 6 hours
- 250 questions
- Computer-based
- Pass mark 700/1000
What will you learn?
- How to apply appropriate retention and security controls
- How to handle requirements with markings and labels
- How to use the correct protection principles
- How to evaluate security models
- How to manage web-based and mobile system vulnerable
- How to embed system vulnerabilities
Course Outline
Introduction
Security and Risk Management
- Availability concepts
- Governance principles
- Compliance
- Legal issues
- Regulatory issues
- Professional ethic
- Security policies
- Standards
- Procedures
- Guidelines
Asset Security
- Information classification
- Asset classification
- Ownership
- Privacy protecting
- Retention
- Data security controls
- Handling requirements
Security Engineering
- Engineering processes
- Design principles
- Fundamental concepts
- Evaluation models
- Information systems
- Security capabilities
- Security architecture
- Mobile systems
- Embedded devices
- System vulnerabilities
- Cryptography
- Site design
- Facility design
- Physical security
Communication and network security
- Secure network architecture
- Network components
- Communication channels
- Network attacks
Identity and access management
- Logical asset control
- Identification
- Authentication
- Service identity
- Third-party identity services
- Control attacks
- Identity lifecycle
- Access lifecycle
Security assessment
- Assessment strategies
- Test strategies
- Process data
- Control testing
- Test outputs
- Security architectures
Security Operations
- Investigating support and requirements
- Logging and monitoring activities
- Provisioning of resources
- Foundational security concepts
- Resource protection techniques
- Incident management
- Preventative measures
- Vulnerability management
- Change management processes
- Recovery strategies
- Disaster recovery processes
- Business continuity planning
- Physical security
- Personnel safety concerns
Software Development Security
- Security in the software development lifecycle
- Development environment security controls
- Software security effectiveness
- Acquired software security impact
Conclusion
What's Included
- Courseware Book
- Certificate
- Experienced instructor
- Refreshments
Testimonials
There hasn't been any testimonials submitted to this topic
Video
We do not currently have a video for this topic
Social
Introduction
The Certified Information Systems Security Professional course is for candidates looking to gain knowledge and skills over 5 days. This course will help candidates gain professional qualifications. Certified Information systems is for those working in information security design focused environments looking to gain new attributes.
Candidates will learn how to apply appropriate retention and security controls. The trainer will give candidates an insight in how to handle requirements with markings and labels.
Pre-Requisites
Candidates attending this course should have the following experience:
- Five years full-time paid work experience
Or
- Four years’ experience with an information security university degree in 2 or more of the following domains in CISSP:
- Security and Risk Management
- Asset Security
- Security Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
Who should attend?
- This course should be attended by candidates interested in Information security.
Course structure
- Classroom training (5 days)
(Exam is separate from this course)
Exam Structure
- The exam is booked separately and is taken at a Pearson Vue Test Centre
- Multiple choice
- 6 hours
- 250 questions
- Computer-based
- Pass mark 700/1000
What will you learn?
- How to apply appropriate retention and security controls
- How to handle requirements with markings and labels
- How to use the correct protection principles
- How to evaluate security models
- How to manage web-based and mobile system vulnerable
- How to embed system vulnerabilities
Course Outline
Introduction
Security and Risk Management
- Availability concepts
- Governance principles
- Compliance
- Legal issues
- Regulatory issues
- Professional ethic
- Security policies
- Standards
- Procedures
- Guidelines
Asset Security
- Information classification
- Asset classification
- Ownership
- Privacy protecting
- Retention
- Data security controls
- Handling requirements
Security Engineering
- Engineering processes
- Design principles
- Fundamental concepts
- Evaluation models
- Information systems
- Security capabilities
- Security architecture
- Mobile systems
- Embedded devices
- System vulnerabilities
- Cryptography
- Site design
- Facility design
- Physical security
Communication and network security
- Secure network architecture
- Network components
- Communication channels
- Network attacks
Identity and access management
- Logical asset control
- Identification
- Authentication
- Service identity
- Third-party identity services
- Control attacks
- Identity lifecycle
- Access lifecycle
Security assessment
- Assessment strategies
- Test strategies
- Process data
- Control testing
- Test outputs
- Security architectures
Security Operations
- Investigating support and requirements
- Logging and monitoring activities
- Provisioning of resources
- Foundational security concepts
- Resource protection techniques
- Incident management
- Preventative measures
- Vulnerability management
- Change management processes
- Recovery strategies
- Disaster recovery processes
- Business continuity planning
- Physical security
- Personnel safety concerns
Software Development Security
- Security in the software development lifecycle
- Development environment security controls
- Software security effectiveness
- Acquired software security impact
Conclusion