ISC2 Certified Information Systems Security Professional (CISSP)

Reference : ISC CISSP-001

Educational objectives

At the end of the training, participants should be able to:

  • Understand and apply fundamental concepts and methods related to the fields of information technology and security.
  • Align overall organizational operational goals with security functions and implementations
  • Understand how to protect assets of the organization as they go through their lifecycle.
  • Understand the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability.
  • Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures.
  • Understand the importance of cryptography and the security services it can provide in today’s digital and information age.
  • Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections.
  • Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function.

Course programme

This course will help you earning the Certified Information Systems Security Professional (CISSP) certification, teaching you to effectively design, implement, and manage a best-in-class cybersecurity program. The CISSP certification is compliant with U.S. DoD Directive 8140/8570.01-M and validates your expertise for many different cybersecurity roles.

Who is this course for?

Public
CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles. This course is best suited for a wide range of professionals, including Security Consultants, Security Managers, Security Analysts, Risk Management Specialists, Network Architects, and Compliance Officers.
Prerequisites

Before attending this course, candidates must have experience in two or more of:

  • Domain 1. Security and Risk Management
  • Domain 2. Asset Security
  • Domain 3. Security Architecture and Engineering
  • Domain 4. Communication and Network Security
  • Domain 5. Identity and Access Management (IAM)
  • Domain 6. Security Assessment and Testing
  • Domain 7. Security Operations
  • Domain 8. Software Development Security

List of scheduled sessions

There is no session for this course

Further information