CISSP Bootcamp

Level
Logo Focus on Training

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.

Focus on Training offers this product as a default in the following regions: N/A

Description

Experienced security professionals who want to expand their knowledge and gain one of the most sought after security accreditations.

Those who prefer an intensive residential CISSP course inclusive of exam.

The goal of this seven-day accelerated course is to provide information security professionals a fully-immersed, zero-distraction, all-inclusive CISSP CBK training and certification experience.

• Establishes a standard of best practices• Offers a solutions-orientation, not specialization, based on the broader understanding of the (ISC)² CBK
• Allows access to a network of global industry and subject matter/domain experts
• Makes broad-based security information resources readily available
•…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: CISSP, Business Information Systems, Cisco, Programming (general), and Software / System Engineering.

Experienced security professionals who want to expand their knowledge and gain one of the most sought after security accreditations.

Those who prefer an intensive residential CISSP course inclusive of exam.

The goal of this seven-day accelerated course is to provide information security professionals a fully-immersed, zero-distraction, all-inclusive CISSP CBK training and certification experience.

• Establishes a standard of best practices• Offers a solutions-orientation, not specialization, based on the broader understanding of the (ISC)² CBK
• Allows access to a network of global industry and subject matter/domain experts
• Makes broad-based security information resources readily available
• Adds to credibility with the rigor and regimen of the certification examinations
• Provides a business and technology orientation to risk management

The CISSP certification is governed by the International Information Systems Security Certifications Consortium (ISC)2 and has gained importance as a key component in the selection process for management-level information security positions.

The key advantage of authorized (ISC)2 Institute Training is fundamental: The institute's goal is to provide an extensive overview of the Common Body of Knowledge (CBK), the compendium of information security practices and standards compiled and continually updated by (ISC)2 and used as the basis for the CISSP exam.

This CISSP bootcamp encompasses the (ISC)2 CISSP CBK Review Seminar, value-added instruction, on-site examination delivery, meals, and accommodation.

The following topics are presented during our CISSP Program:


Information Security and Risk Management

Security management entails the identification of an organisation's information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines.

Management tools such as data classification and risk assessment/analysis are used to identify threats, classify assets, and to rate system vulnerabilities so that effective controls can be implemented.

Security Architecture and Design

The Security Architecture and Design domain contains the concepts, principles, structures, and standards used to design, monitor, and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of availability, integrity, and confidentiality.

Access Control

Access controls are a collection of mechanisms that work together to create a security architecture to protect the assets of the information system.

Application Security

This domain addresses the important security concepts that apply to application software development. It outlines the environment where software is designed and developed and explains the critical role software plays in providing information system security.

Operations Security

Operations Security is used to identify the controls over hardware, media, and the operators and administrators with access privileges to any of these resources. Audit and monitoring are the mechanisms, tools, and facilities that permit the identification of security events and subsequent actions to identify the key elements and report the pertinent information to the appropriate individual, group, or process.

Physical (Environmental) Security
The Physical (Environmental) Security domain provides protection techniques for the entire facility, from the outside perimeter to the inside office space, including all of the information system resources.

Cryptography
The cryptography domain addresses the principles, means, and methods of disguising information to ensure its integrity, confidentiality and authenticity.


Telecommunications, Network, and Internet Security

The telecommunications, network, and Internet security domain discusses the:

•Network Structures•Transmission methods
•Transport formats
•Security measures used to provide availability, integrity, and confidentiality
•Authentication for transmissions over private and public communications networks and media
Business Continuity and Disaster Recovery Planning
The Business Continuity Plan (BCP) domain addresses the preservation and recovery of business operations in the event of outages.

Law, Investigations, and Ethics


The Law, Investigations, and Ethics domain addresses

•Computer crime laws and regulations
•The measures and technologies used to investigate computer crime incident

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.