Telephone: 020 8840 4496

CISSP Training Course for (ISC)2 Examination

 

Course: CISSP Training – Fast Track

Duration: 5 Days

Code: CISSP/082

See Course Schedule:
More Details
COURSE TITLE (COURSE CODE) No. of Days Jul 2015 Aug 2015 Sep 2015 Oct 2015 Nov 2015 Dec 2015
CISSP – CISSP Fast Track 5 10-14 14-18 12-16 09-13 07-11
Overview:
More Details

Description:

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.

The CISSP certification was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024 – Backed by ISC2, the globally recognized, not-for-profit organization dedicated to advancing the information security field. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement. That is one of the greatest reasons why the ISC2 CISSP exam must underlie a suitable CISSP exam prep for any individual looking for passing the ISC2 exam with a positive result.

Our CISSP training course is competitive, comprehensive and exam focused programme for any individual who wants to broaden his expertise and become an Information Systems Security Professional. With experience of delivering more than 200 CISSP training events in Europe and around the world, training more than 1800+ CISSP delegates, the Net Security’s CISSP training material has been developed in house with the highest priority of ensuring CISSP aspirants pass the ISC2 ® CISSP Exam. The CISSP manual covers all relevant concepts, case studies, and workshops for key technical areas across the eight domains. We provide online e-learning which we recommend attending delegates to complete before they attend the course. ISC2 has recently introduced the new ‘drag and drop’ questions; these form part of the course. Furthermore, the Trainer shares key CISSP supporting material like books, question dumps and revision documents during the course. We also provide different learning techniques throughout the course and our price is unbeatable with all study aids and experience. If you do not pass first time, then attend our exam preparation again, free of charge.

Which individual should obtain a ISC2 CISSP certification?

Although it is not limited, the ISC2 CISSP certification is ideal for these positions:

  • Security Analyst
  • Security Systems Engineer
  • Security Consultant
  • Security Manager
  • Chief Information Security Officer
  • Director of Security
  • Network Architect
  • IT Director/Manager
  • Security Auditor
  • Security Architect

All our Trainers have extensive experience in delivering CISSP training around the world. They are Industry Certified Professionals who deliver our events with pride and passion.

Workshop Activities include:

  • Various Workshop/Labs allowing delegates to gain practical knowledge and reinforce understanding of the CISSP technical domains
  • Daily doubt clearing sessions and CISSP questions and discussions in evenings regarding discussed concepts
  • Demonstrations and real world experience highlighting key points

Workshop Activities include:

  • Various Workshop/Labs allowing delegates to gain practical knowledge and reinforce understanding of the CISSP technical domains
  • Daily doubt clearing sessions and CISSP questions and discussions in evenings regarding discussed concepts
  • Demonstrations and real world experience highlighting key points
Objectives:
More Details

What you will learn to:

  • Use the knowledge gained in a practical manner beneficial to your organisation
  • Protect your organisational assets using access control techniques and strengthen confidentiality and integrity controls from the world of cryptography
  • Secure your network architecture and design (implement Cyber security)
  • Achieve your organisational objectives such as legal & compliance, Information assurance, security and data governance
  • Enhance IT services secure delivery via Security operations, architecture and design principles
  • Implement business resiliency via Business Continuity Plan
  • You will gain a thorough understanding of the 8 domains as prescribed by (ISC)2®

The Main Goal:

The ultimate goal is to pass your ISC2 CISSP examination first time.

Who should attend:
More Details
  • This is the course for you if you are aspiring to pass the CISSP examination!
  • Professionals needing to be ISC2 CISSP Certified
  • Any one who is required to develop a broad and deep knowledge and understanding of IT Security Principles and implementation
Syllabus:
More Details

The 8 Domains of the ISC2 CISSP Certifications:

  1. Security and Risk Management
  • Understand and apply concepts of confidentiality, integrity and availability
  • Establish and manage information security education, training, and awareness
  • Apply security governance principles
  • Understand legal and regulatory issues that pertain to information security in a global context
  • Understand professional ethics
  • Develop and implement documented security policy, standards, procedures, and guidelines
  • Understand business continuity requirements
  • Contribute to personnel security policies
  • Understand and apply risk management concepts
  • Understand and apply threat modelling
  • Integrate security risk considerations into acquisition strategy and practice
  1. Asset Security
  • Classify information and supporting assets (e.g., sensitivity, criticality)
  • Determine and maintain ownership (e.g., data owners, system owners, business/mission owners)
  • Protect privacy
  • Ensure appropriate retention (e.g., media, hardware, personnel)
  • Determine data security controls (e.g., data at rest, data in transit)
  • Establish handling requirements (markings, labels, storage, destruction of sensitive information)
  1. Security Engineering
  • Implement and manage engineering processes using secure design principles
  • Understand the fundamental concepts of security models (e.g., Confidentiality, Integrity, and Multi-level Models)
  • Select controls and countermeasures based upon systems security evaluation models
  • Understand security capabilities of information systems (e.g., memory protection, virtualization, trusted platform module, interfaces, fault tolerance)
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  1. Communications and Network Security
  • Apply secure design principles to network architecture (e.g., IP & non-IP protocols, segmentation)
  • Secure network components
  • Design and establish secure communication channels
  • Prevent or mitigate network attacks
  1. Identity and Access Management
  • Control physical and logical access to assets
  • Manage identification and authentication of people and devices
  • Integrate identity as a service (e.g., cloud identity)
  • Integrate third-party identity services (e.g., on premise)
  • Implement and manage authorization mechanisms
  • Prevent or mitigate access control attacks
  • Manage the identity and access provisioning lifecycle (e.g., provisioning, review)
  1. Security Assessment and Testing
  • Design and validate assessment and test strategies
  • Conduct security control testing
  • Collect security process data (e.g., management and operational controls)
  • Analyse and report test outputs (e.g., automated, manual)
  • Conduct or facilitate internal and third party audits
  1. Security Operations
  • Understand and support investigations
  • Understand requirements for investigation types
  • Conduct logging and monitoring activities
  • Secure the provisioning of resources
  • Understand and apply foundational security operations concepts
  • Employ resource protection techniques
  • Conduct incident management
  1. Software Development Security
  • Understand and apply security in the software development lifecycle
  • Enforce security controls in development environments
  • Assess the effectiveness of software security
  • Assess security impact of acquired software
SlideShow:
More Details

CISSP Training

CISSP Training

CISSP

★★★★★
5 5 1
I had a lovely time on the course and would like to pass on my thanks to the team for making it happen.

Name
Email
Review Title
Rating
Review Content

Leave a Reply