Certified Information Systems Security Professional (CISSP)Courses > Cyber Security > Certified Information Systems Security Professional (CISSP)

  • strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.
  • strict warning: Declaration of views_handler_argument::options_validate() should be compatible with views_handler::options_validate($form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_argument.inc on line 917.
  • strict warning: Declaration of views_handler_argument::query() should be compatible with views_handler::query($group_by = false) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_argument.inc on line 917.
  • strict warning: Declaration of views_handler_sort::options_validate() should be compatible with views_handler::options_validate($form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_sort.inc on line 165.
  • strict warning: Declaration of views_handler_sort::options_submit() should be compatible with views_handler::options_submit($form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_sort.inc on line 165.
  • strict warning: Declaration of views_handler_sort::query() should be compatible with views_handler::query($group_by = false) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_sort.inc on line 165.
  • strict warning: Declaration of views_handler_filter::options_validate() should be compatible with views_handler::options_validate($form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_filter.inc on line 587.
  • strict warning: Declaration of views_handler_filter::query() should be compatible with views_handler::query($group_by = false) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_filter.inc on line 587.
  • strict warning: Declaration of views_handler_filter_node_status::operator_form() should be compatible with views_handler_filter::operator_form(&$form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/modules/node/views_handler_filter_node_status.inc on line 13.
  • strict warning: Declaration of views_plugin_argument_validate::options_submit() should be compatible with views_plugin::options_submit($form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/plugins/views_plugin_argument_validate.inc on line 87.
  • strict warning: Declaration of views_plugin_argument_validate_taxonomy_term::options_submit() should be compatible with views_plugin_argument_validate::options_submit(&$form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/modules/taxonomy/views_plugin_argument_validate_taxonomy_term.inc on line 165.
  • strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.
  • strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.
  • strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.
  • strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.
  • strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.
  • strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.
  • strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.
  • warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.
  • warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.
  • warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.
  • warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.
  • warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.
  • warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.
  • warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.
  • warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.
Duration: 
5 Days - £2295
Course ID: 
CISSP

Led by an (ISC)² authorized instructor, this training seminar provides a comprehensive review of information security concepts and industry best practices, covering the  8 domains  of the CISSP CBK.

Certified Information Systems Security Professional (CISSP)
 
 
Duration
 
5 days
 
 
Course Overview
 
The CISSP course covers all relevant concepts, case studies, and workshops for key technical areas across the eight domains. ISC2 has recently introduced the new ‘drag and drop’ questions; these form part of the course. If you do not pass first time, then attend our exam preparation again, free of charge. All our Trainers have extensive experience in delivering CISSP training around the world. They are Industry Certified Professionals who deliver our events with pride and passion.
 
Workshop activities include:
•   Various Workshop/Labs allowing delegates to gain practical knowledge and reinforce understanding of the CISSP technical domains.
•   Daily doubt clearing sessions and CISSP questions and discussions in evenings regarding discussed concepts
•   Demonstrations and real world experience highlighting key points.
 
 
Course Objectives
 
Upon successful completion of this course, students will have the skills necessary to:
•   Use the knowledge gained in a practical manner beneficial to your organisation.
•   Protect your organisational assets using access control techniques and strengthen confidentiality and integrity controls from the world of cryptography.
•   Secure your network architecture and design (implement Cyber security).
•   Achieve your organisational objectives such as legal & compliance, Information assurance, security and data governance.
•   Enhance IT services secure delivery via Security operations, architecture and design principles.
•   Implement business resiliency via Business Continuity Plan.
•   You will gain a thorough understanding of the 8 domains as prescribed by (ISC)2®.
 
The Main Goal:
The ultimate goal is to pass your CISSP examination first time.
 
 
Target Audience
 
This is the course for you if you are aspiring to pass the CISSP examination!
Professionals needing to be CISSP Certified
Anyone who is required to develop a broad and deep knowledge and understanding of IT Security Principles and implementation
 
 
Course Contents
 
The 8 CISSP Domains:
 
Security and Risk Management
•   Understand and apply concepts of confidentiality, integrity and availability
•   Establish and manage information security education, training, and awareness
•   Apply security governance principles
•   Understand legal and regulatory issues that pertain to information security in a global context
•   Understand professional ethics
•   Develop and implement documented security policy, standards, procedures, and guidelines
•   Understand business continuity requirements
•   Contribute to personnel security policies
•   Understand and apply risk management concepts
•   Understand and apply threat modelling
•   Integrate security risk considerations into acquisition strategy and practice
 
Asset Security
•   Classify information and supporting assets (e.g., sensitivity, criticality)
•   Determine and maintain ownership (e.g., data owners, system owners, business/mission owners)
•   Protect privacy
•   Ensure appropriate retention (e.g., media, hardware, personnel)
•   Determine data security controls (e.g., data at rest, data in transit)
•   Establish handling requirements (markings, labels, storage, destruction of sensitive information)
 
Security Engineering
•   Implement and manage engineering processes using secure design principles
•   Understand the fundamental concepts of security models (e.g., Confidentiality, Integrity, and Multi-level Models)
•   Select controls and countermeasures based upon systems security evaluation models
•   Understand security capabilities of information systems (e.g., memory protection, virtualization, trusted platform module, interfaces, fault tolerance)
•   Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
 
Communications and Network Security
•   Apply secure design principles to network architecture (e.g., IP & non-IP protocols, segmentation)
•   Secure network components
•   Design and establish secure communication channels
•   Prevent or mitigate network attacks
 
Identity and Access Management
•   Control physical and logical access to assets
•   Manage identification and authentication of people and devices
•   Integrate identity as a service (e.g., cloud identity)
•   Integrate third-party identity services (e.g., on premise)
•   Implement and manage authorization mechanisms
•   Prevent or mitigate access control attacks
•   Manage the identity and access provisioning lifecycle (e.g., provisioning, review)
 
Security Assessment and Testing
•   Design and validate assessment and test strategies
•   Conduct security control testing
•   Collect security process data (e.g., management and operational controls)
•   Analyse and report test outputs (e.g., automated, manual)
•   Conduct or facilitate internal and third party audits
 
Security Operations
•   Understand and support investigations
•   Understand requirements for investigation types
•   Conduct logging and monitoring activities
•   Secure the provisioning of resources
•   Understand and apply foundational security operations concepts
•   Employ resource protection techniques
•   Conduct incident management
 
Software Development Security
•   Understand and apply security in the software development lifecycle
•   Enforce security controls in development environments
•   Assess the effectiveness of software security
•   Assess security impact of acquired software

Course dates

From: 
Monday, 11 June 2018 - Friday, 15 June 2018
Venue: 
Glasgow
From: 
Monday, 10 December 2018 - Friday, 14 December 2018
Venue: 
Glasgow