CISSP Certified Information Systems Security Professional

Level:
Costs:
Total time:
Provider rating: 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)
Logo Perpetual Solutions

Tip: Receive more information about the programme, starting dates & price. Or request a proposal from multiple providers for in-house training.

Overview

Your experience of this course?

Did you attend the course CISSP Certified Information Systems Security Professional at Perpetual Solutions? Help other people by submitting your review at Springest!

Springest will donate £1.- to the Edukans Foundation as a thank you for each review

 
Schedule:
Daytime
Run time:
5 Days
Location type:
Open

completion, maximum participants, and starting dateplaces are unknown for this course.

Prerequisites:

Delegates should have experience of at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant certifications, e.g., MCSE).
Delegates must ensure that they have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
Current requirements for the CISSP examination are to be found at ISC2.org.

Course Description:

Aimed at seasoned security professionals, this course surveys the entire information security landscape and the technologies involved.

The course addresses the ten knowledge domains that comprise the Common Body of Knowledge (CBK) for information systems security profes…

Read the complete description

Description

Prerequisites:

Delegates should have experience of at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant certifications, e.g., MCSE).
Delegates must ensure that they have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
Current requirements for the CISSP examination are to be found at ISC2.org.

Course Description:

Aimed at seasoned security professionals, this course surveys the entire information security landscape and the technologies involved.

The course addresses the ten knowledge domains that comprise the Common Body of Knowledge (CBK) for information systems security professionals and prepares delegates for CISSP certification. The course offers a job-related approach to the security process, demonstrating the immediate application of concepts and techniques described in the CBK and providing a basic introduction to security management, architecture and engineering.

The course comprises ten sessions that map directly to the (CBK)®, each one is theory based with instructor led discussions, there are no hands on labs. The work completed in the classroom should be complimented by extra reading, references to internet resources will be provided by the instructor.

This course includes the following modules:

Access to Information Systems

  • Control Data Access
  • Control System Access
  • Determine an Access Control Administration Method
  • Perform a Penetration Test

Networking Systems and Telecommunications

  • Design Data Networks
  • Provide Remote Access to a Data Network
  • Secure a Data Network
  • Manage a Data Network

Security Management

  • Determine Security Management Goals
  • Classify Information
  • Develop a Security Program
  • Manage Risk

Applications Security

  • Perform Software Configuration Management
  • Implement Software Controls
  • Secure Database Systems

Cryptography

  • Apply a Basic Cipher
  • Select a Symmetric Key Cryptography Method
  • Select an Asymmetric Key Cryptography Method
  • Determine Email Security
  • Determine Internet Security

Securing System Architecture

  • Evaluate Security Models
  • Choose a Security Mode
  • Provide System Assurance

Operations Security

  • Control Operations Security
  • Audit and Monitor Systems
  • Handle Threats and Violations

Business Continuity Planning

  • Sustain Business Processes
  • Perform Business Impact Analysis
  • Define Disaster Recovery Strategies
  • Test the Disaster Recovery Plan

Physical Security

  • Control Physical Access
  • Monitor Physical Access
  • Establish Physical Security Methods
  • Design Secure Facilities

Law, Investigations, and Ethics

  • Interpret Computer Crime Laws and Regulations
  • Apply the Evidence Life Cycle
  • Perform an Investigation
  • Identify Codes of Conduct

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

Reviews

There are no reviews yet. Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

More courses within this subject:

Compare 32,279 training courses in subjects like CISSP

Sign up to create your own Learning Lists.

Not for humans