Code: 
CISSP
Duration: 
0.5-5 Day(s)
Price: 
£1300-3500

Overview

The Certified Information Systems Security Professional (CISSP) training course helps you prepare for the CISSP exam and includes learning techniques to maximise retention of exam content. Your course tuition also includes the Official (ISC)2 Guide to the CISSP CBK , Third Edition. 

The CISSP certification is governed by the International Information Systems Security Certifications Consortium (ISC)2 and has gained importance as a key component in the selection process for management-level information security positions.

If you are ready to take your security career to the next level, our CISSP exam preparation course will help get you there. Get instruction from our experts with real-world experience as you cover all the material you need to be fully prepared for the (ISC) 2 CISSP exam.

Pre-Requisites

Students should have a fundamental understanding of local area networks as well as the functions of the seven layers in the open interconnect (OSI) reference model s outlined in the course: Understanding Networking Fundamentals 

Target Audience

IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers, and other security professionals who want to acquire CISSP certification.

Objectives

At the end of this course delegates will be able to:
  • In-depth coverage of the ten domains required to pass the CISSP exam:
  • Operations Security
  • Information Security and Risk Management
  • Physical (Environmental) SecurityCryptography
  • Access Control
  • Security Architecture and Design
  • Telecommunications and Network Security
  • Business Continuity and Disaster Recovery Planning
  • Application SecurityLegal, Regulations, Compliance, and Investigations

Content

The 10 CISSP Domains:

Access Control

A collection of mechanisms that work together to create security architecture to protect the assets of the information system.

  • Concepts/methodologies/techniques
  • Effectiveness
  • Attacks

Telecommunications and Network Security

Discusses network structures, transmission methods, transport formats and security measures used to provide availability, integrity and confidentiality.

  • Network architecture and design
  • Communication channels
  • Networking components
  • Network attacks

Information Security Governance and Risk Management

The identification of an organization's information assets and the development, documentation and implementation of policies, standards, procedures and guidelines.

  • Security governance and policy
  • Information classification/ownership
  • Contractual agreements and procurement processes
  • Risk management concepts
  • Personnel security
  • Security education, training and awareness
  • Certification and accreditation

Software Development Security

Refers to the controls that are included within systems and applications software and the steps used in their development

  • Systems development life cycle (SDLC)
  • Application environment and security controls
  • Effectiveness of application security

Cryptography

The principles, means and methods of disguising information to ensure its integrity, confidentiality and authenticity

  • Encryption concepts
  • Digital signatures
  • Cryptanalytic attacks
  • Public Key Infrastructure (PKI)
  • Information hiding alternatives

Security Architecture and Design

Contains the concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity and availability

  • Fundamental concepts of security models
  • Capabilities of information systems (e.g. memory protection, virtualization)
  • Countermeasure principles
  • Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)

Operations Security

Used to identify the controls over hardware, media and the operators with access privileges to any of these resources

  • Resource protection
  • Incident response
  • Attack prevention and response
  • Preventative measures against attacks
  • Patch and vulnerability management

Business Continuity and Disaster Recovery Planning

Addresses the preservation of the business in the face of major disruptions to normal business operations

  • Business impact analysis
  • Recovery strategy
  • Disaster recovery process
  • Provide training

Legal, Regulations, Investigations and Compliance

Addresses computer crime laws and regulations; the investigative measures and techniques which can be used to determine if a crime has been committed and methods to gather evidence

  • Legal issues
  • Investigations
  • Forensic procedures
  • Compliance requirements/procedures

Physical (Environmental) Security

 Addresses the threats, vulnerabilities and countermeasures that can be utilized to physically protect an enterprise's resources and sensitive information.

  • Site / facility design considerations
  • Perimeter security
  • Internal security
  • Facilities security

Examinations:

This course will assist delegates preparing for the following exam: CISSP Certified Information Systems Security Professional.

To book the CBT exam requires the candidate to acquire a Pearson VUE testing voucher. Please note, the price of the voucher may not be included in the RRP of this course, please check with your Account Manager

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. It's a cost effective option.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.

Upcoming Dates

Please click date to Enquire Now
Course Location Days Cost Date
Edinburgh5 2828 £2828 2018-05-14
London5 2828 £2828 2018-05-14
London5 2445 £2445 2018-04-23
London5 2828 £2828 2018-04-16
Birmingham5 2828 £2828 2018-04-09
London5 2828 £2828 2018-03-12
Leeds5 2828 £2828 2018-03-05
London5 2445 £2445 2018-03-05
Birmingham5 2828 £2828 2018-02-12
London5 2828 £2828 2018-02-12
London5 1895 £1895 2018-02-05
London5 2445 £2445 2018-01-15
London5 2828 £2828 2018-01-08
London5 1895 £1895 2017-12-26
London5 1895 £1895 2017-12-18
Manchester5 2828 £2828 2017-12-18
Edinburgh5 2828 £2828 2017-12-18
Birmingham5 1895 £1895 2017-12-18
Manchester5 1895 £1895 2017-12-11
Birmingham5 2828 £2828 2017-12-11
London5 1895 £1895 2017-12-11
Leeds5 2828 £2828 2017-12-11
Glasgow5 2828 £2828 2017-12-04
London5 1895 £1895 2017-12-04
Birmingham5 1895 £1895 2017-11-27
London5 1895 £1895 2017-11-20
Manchester5 1895 £1895 2017-11-13
London5 2828 £2828 2017-11-13
London5 1895 £1895 2017-11-06
Reading5 2500 £2500 2017-11-03
Belfast5 2500 £2500 2017-10-26
Birmingham5 1895 £1895 2017-10-23
London5 1895 £1895 2017-10-16
London5 2828 £2828 2017-10-09
Manchester5 2500 £2500 2017-10-09
Manchester5 1895 £1895 2017-10-09
London5 1895 £1895 2017-10-02
Edinburgh5 2828 £2828 2017-10-02
Birmingham5 1895 £1895 2017-09-25
London5 2828 £2828 2017-09-25
Cardiff5 2500 £2500 2017-09-25
London5 1895 £1895 2017-09-18
Leeds5 2828 £2828 2017-09-18
London5 1795 £1795 2017-09-11
Manchester5 1895 £1895 2017-09-11
London1 3500 £3500 2017-09-07
London5 1895 £1895 2017-09-04
Bath5 1300 £1300 2017-09-04
Manchester5 2828 £2828 2017-09-04
London5 2828 £2828 2017-08-21
Bath5 1300 £1300 2017-08-21
Birmingham5 1895 £1895 2017-08-21
Bath5 1300 £1300 2017-08-17
Bath5 1300 £1300 2017-08-14
London5 1895 £1895 2017-08-14
Birmingham5 2828 £2828 2017-08-14
Manchester5 1895 £1895 2017-08-14
Birmingham5 2500 £2500 2017-08-08
Exeter5 2500 £2500 2017-08-08
Bath5 1300 £1300 2017-07-31
London1 3500 £3500 2017-07-27
London5 2445 £2445 2017-07-24
Manchester5 2828 £2828 2017-07-24
Bath5 1300 £1300 2017-07-19
Bath5 1300 £1300 2017-07-17
London5 1895 £1895 2017-07-10
Bristol5 2500 £2500 2017-07-06