Certified Information Systems Security Professional

Inquire now

Duration 5 days – 35 hrs

 

Overview.

 

The Certified Information Systems Security Professional (CISSP) Training Course is designed to prepare participants for the CISSP certification exam by covering the comprehensive domains of information security. This course provides in-depth knowledge and practical skills required to effectively design, implement, and manage cybersecurity programs within organizations. Participants will learn from experienced instructors and engage in hands-on exercises and discussions to understand the principles, practices, and technologies encompassed by the CISSP Common Body of Knowledge (CBK).

 

Objectives

 

  • Understand the fundamental principles and best practices of information security management.
  • Learn how to effectively assess and manage risks within an organization.
  • Gain skills to develop, implement, and manage a security architecture.
  • Master techniques to protect critical assets and manage access to information.
  • Prepare thoroughly for the CISSP certification exam with a focus on real-world application.

 

Audience

  • Senior Security Managers
  • IT Security Consultants
  • Chief Information Security Officers (CISOs)
  • IT Directors/Managers responsible for security
  • Information Security Analysts
  • Network Security Engineers
  • Professionals preparing for the CISSP exam

Pre- requisites 

  • Minimum of 5 years of work experience in two or more of the CISSP CBK domains.
  • Basic understanding of information security principles and risk management.
  • Knowledge of security policies and frameworks is beneficial but not required.

 

Course Content

 

Day 1: Security and Risk Management

  • Security Governance Principles
  • Compliance and Legal Issues
  • Professional Ethics
  • Risk Management Concepts and Practices

Day 2: Asset Security

  • Information and Asset Classification
  • Data Privacy Controls
  • Secure Asset Management

Day 3: Security Architecture and Engineering

  • Security Models and Frameworks
  • System and Component Security
  • Cryptography and Public Key Infrastructure (PKI)

Day 4: Communication and Network Security

  • Secure Network Architecture Design
  • Secure Communication Channels
  • Network Attacks and Countermeasures

Day 5: Identity and Access Management (IAM)

  • Physical and Logical Access Controls
  • Identity Management Lifecycle
  • Identity and Access Provisioning
Inquire now

Best selling courses

We use cookies on our website to personalize your experience by storing your preferences and recognizing repeat visits. By clicking “Accept”, you agree to the use of all cookies. You can also select “Cookie Settings” to adjust your preferences and provide more specific consent. Cookie Policy