CISSP Training and Certification Exam Preparation

Certified Information Systems Security Professional

In this (ISC)2® official certification training course, you gain the foundational knowledge to fully prepare for the (ISC)2® Certified Information Systems Security Professional (CISSP®) exam, including a comprehensive understanding of the CISSP® CBK® 8 domains. Your course tuition includes the current Official (ISC)2® Guide to the CISSP® CBK®, and a voucher that allows you to take the exam at any Pearson VUE Test Center.

COURSE TYPE

Intermediate

NUMBER

0120

DURATION

5 Days

You Will Learn How To

  • Strategically focus your preparation for CISSP Certification
  • Protect resources using access control methods and cryptography
  • Plan a secure environment aligned with organizational objectives, compliance requirements, and industry-standard architectures
  • Develop operational security and continuity through preventive and recovery mechanisms

Important Course Information

Requirements:

Exam Information:

  • This course includes a voucher for the (ISC)2® CISSP® CBK® exam
  • CISSPs are required by (ISC)2 to earn 120 Continuing Professional Education (CPE) credits every three years

Certification Information:

  • This is an (ISC)2 certification prep course.

Course Outline

Security and Risk Management

Aligning security and risk to organizational objectives

  • Employing confidentiality, integrity, and availability security principles
  • Managing security policies, standards and procedures
  • Applying compliance

Applying risk management concepts

  • Assessing threats and vulnerabilities
  • Performing risk analysis and control
  • Defining qualitative and quantitative analysis

Preserving the business

  • Adhering to Business Continuity Management Code of Practice and Specifications
  • Performing a business impact analysis

Investigating legal measures and techniques

  • Reviewing intellectual property, liability and law, and compliance
  • Differentiating traditional and computer crime
  • Addressing ethical behavior and compliance

Asset Security

Identifying, categorizing and prioritizing assets

  • Applying security controls and asset classification
  • Protecting data through proper handling, markings, labeling, and storage
  • Addressing PII, privacy, and appropriate retention

Communication and Network Security

Defining a secure network architecture

  • TCP/IP and other protocol models
  • Protecting from network attacks
  • Reviewing secure network components and communication channels

Examining secure networks and components

  • Identifying wired and wireless technologies
  • Implementing firewalls, secure communications, proxies, and tunnels

Identity and Access Management

Controlling access to protect assets

  • Defining administrative, technical and physical controls
  • Implementing centralized and decentralized approaches
  • Investigating biometric and multi-factor authentication
  • Identifying common threats
  • Reviewing cloud services and architecture

Security Assessment and Testing

Designing and conducting security assessment strategies

  • Leveraging the role of testing and auditing to analyze the effectiveness of security controls
  • Differentiating detection and protection systems

Conducting logging and monitoring activities

  • Distinguishing between the roles of internal and external audits
  • Defining secure account management

Security Operations

Maintaining operational resilience

  • Managing security services effectively
  • Leveraging and supporting investigations and incident response
  • Differentiating detection and protection systems
  • Implementing logging and monitoring

Developing a recovery strategy

  • Designing a disaster recovery plan
  • Implementing test and maintenance processes
  • Provisioning of resources

Software Development Security

Securing the software development life cycle

  • Applying software development methods and security controls
  • Highlighting threats: Cross-Site Scripting (XSS), XCRF, JavaScript attacks, and Buffer Overflow
  • Addressing database security concepts and issues
  • Reviewing software security effectiveness and security impact

How to Attend This Instructor Led Training

Free-Enrollment – No advance payment is required to book your seat for this training. Payment can be made 3 day before the training commences.

In the Classroom

Private/Team

0809 210 2900

hi@vsonetedu.com

Training Schedules

January 2018: Jan 22 to Jan 26 – 9 am to 5.30 pm

February 2018: Feb 12 to Feb 16 – 9 am to 5.30 pm

Tuition

Standard: Was ₦ 1,200,000 Now ₦ 700,000

Corporate: Contact Us >>

What You Will Get

  • Course Ware
  • Daily Lunch
  • Free Course Exam