Certified Information Systems Security Professional

Inquire now

Duration 5 days – 35 hrs

 

Overview.

 

The Certified Information Systems Security Professional (CISSP) Training Course is designed to prepare participants for the CISSP certification exam by covering the comprehensive domains of information security. This course provides in-depth knowledge and practical skills required to effectively design, implement, and manage cybersecurity programs within organizations. Participants will learn from experienced instructors and engage in hands-on exercises and discussions to understand the principles, practices, and technologies encompassed by the CISSP Common Body of Knowledge (CBK).

 

Objectives

 

  • Understand the fundamental principles and best practices of information security management.
  • Learn how to effectively assess and manage risks within an organization.
  • Gain skills to develop, implement, and manage a security architecture.
  • Master techniques to protect critical assets and manage access to information.
  • Prepare thoroughly for the CISSP certification exam with a focus on real-world application.

 

Audience

  • Senior Security Managers
  • IT Security Consultants
  • Chief Information Security Officers (CISOs)
  • IT Directors/Managers responsible for security
  • Information Security Analysts
  • Network Security Engineers
  • Professionals preparing for the CISSP exam

Pre- requisites 

  • Minimum of 5 years of work experience in two or more of the CISSP CBK domains.
  • Basic understanding of information security principles and risk management.
  • Knowledge of security policies and frameworks is beneficial but not required.

 

Course Content

 

Day 1: Security and Risk Management

  • Security Governance Principles
  • Compliance and Legal Issues
  • Professional Ethics
  • Risk Management Concepts and Practices

Day 2: Asset Security

  • Information and Asset Classification
  • Data Privacy Controls
  • Secure Asset Management

Day 3: Security Architecture and Engineering

  • Security Models and Frameworks
  • System and Component Security
  • Cryptography and Public Key Infrastructure (PKI)

Day 4: Communication and Network Security

  • Secure Network Architecture Design
  • Secure Communication Channels
  • Network Attacks and Countermeasures

Day 5: Identity and Access Management (IAM)

  • Physical and Logical Access Controls
  • Identity Management Lifecycle
  • Identity and Access Provisioning
Inquire now

Best selling courses

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.