Duration 5 days – 35 hrs
Overview.
The Certified Information Systems Security Professional (CISSP) Training Course is designed to prepare participants for the CISSP certification exam by covering the comprehensive domains of information security. This course provides in-depth knowledge and practical skills required to effectively design, implement, and manage cybersecurity programs within organizations. Participants will learn from experienced instructors and engage in hands-on exercises and discussions to understand the principles, practices, and technologies encompassed by the CISSP Common Body of Knowledge (CBK).
Objectives
- Understand the fundamental principles and best practices of information security management.
- Learn how to effectively assess and manage risks within an organization.
- Gain skills to develop, implement, and manage a security architecture.
- Master techniques to protect critical assets and manage access to information.
- Prepare thoroughly for the CISSP certification exam with a focus on real-world application.
Audience
- Senior Security Managers
- IT Security Consultants
- Chief Information Security Officers (CISOs)
- IT Directors/Managers responsible for security
- Information Security Analysts
- Network Security Engineers
- Professionals preparing for the CISSP exam
Pre- requisites
- Minimum of 5 years of work experience in two or more of the CISSP CBK domains.
- Basic understanding of information security principles and risk management.
- Knowledge of security policies and frameworks is beneficial but not required.
Course Content
Day 1: Security and Risk Management
- Security Governance Principles
- Compliance and Legal Issues
- Professional Ethics
- Risk Management Concepts and Practices
Day 2: Asset Security
- Information and Asset Classification
- Data Privacy Controls
- Secure Asset Management
Day 3: Security Architecture and Engineering
- Security Models and Frameworks
- System and Component Security
- Cryptography and Public Key Infrastructure (PKI)
Day 4: Communication and Network Security
- Secure Network Architecture Design
- Secure Communication Channels
- Network Attacks and Countermeasures
Day 5: Identity and Access Management (IAM)
- Physical and Logical Access Controls
- Identity Management Lifecycle
- Identity and Access Provisioning