Telephone: 020 8840 4496

CISSP training for the CISSP Certification

 

Course: CISSP – Fast Track

Duration: 5 Days

Code: CISSP/082

See Course Schedule:
More Details
COURSE TITLE (COURSE CODE) No. of Days Oct 2014 Nov 2014 Dec 2014 Jan 2015 Feb 2015 Mar 2015 Apr 2015 May 2015
CISSP – CISSP Fast Track 5 06-10 03-07 01-05 12-16 02-06 02-06 13-17
Overview:
More Details

Description:

Our CISSP is competitive, comprehensive and exam focused training course. With experience of delivering more than 200 CISSP training events in Europe and around the world, training more than 1800+ CISSP delegates, the Net Security CISSP training material has been developed in house with the highest priority of ensuring CISSP aspirants pass the (ISC) CISSP Exam. The CISSP manual covers all relevant concepts, case studies, and workshops for key technical areas across the ten domains. We provide online e-learning which we recommend attending delegates to complete before they attend the course. ISC2 has recently introduced the new ‘drag and drop’ questions; these form part of the course. Furthermore, the Trainer shares key CISSP supporting material like books, question dumps and revision documents during the course. We also provide different learning techniques throughout the course and our price is unbeatable with all study aids and experience. If you do not pass first time, then attend our exam preparation again, free of charge.

All our Trainers have extensive experience in delivering CISSP training around the world. They are Industry Certified Professionals who deliver our events with pride and passion.

Workshop Activities include:

  • Various Workshop/Labs allowing delegates to gain practical knowledge and reinforce understanding of the CISSP technical domains
  • Daily doubt clearing sessions and CISSP questions and discussions in evenings regarding discussed concepts
  • Demonstrations and real world experience highlighting key points
Objectives:
More Details

What you will learn to:

  • Use the knowledge gained in a practical manner beneficial to your organisation
  • Protect your organisational assets using access control techniques and strengthen confidentiality and integrity controls from the world of cryptography
  • Secure your network architecture and design (implement Cyber security)
  • Achieve your organisational objectives such as legal & compliance, Information assurance, security and data governance
  • Enhance IT services secure delivery via Security operations, architecture and design principles
  • Implement business resiliency via Business Continuity Plan
  • You will gain a thorough understanding of the 10 domains as prescribed by (ISC)2®

The Main Goal:

The ultimate goal is to pass your CISSP examination first time.

Who should attend:
More Details
  • This is the course for you if you are aspiring to pass the CISSP examination!
  • Professionals needing to be CISSP Certified
  • Any one who is required to develop a broad and deep knowledge and understanding of IT Security Principles and implementation
Syllabus:
More Details

The 10 CISSP Domains:

1. Access Control

– a collection of mechanisms that work together to create security architecture to protect the assets of the information system
• Concepts, methodologies &techniques
• Effectiveness of access controls
• Access Control attacks

2. Telecommunications & Network Security

– discusses network structures, transmission methods, transport formats and security measures used to provide availability, integrity and confidentiality.
• Network architecture and design
• Communication channels
• Networking components
• Network attacks

3. Information Security Governance & Risk Management

– the identification of an organization’s information assets and the development, documentation and implementation of policies, standards, procedures and guidelines.
• Security governance and policy
• Information classification/ownership
• Contractual agreements and procurement processes
• Risk management concepts
• Personnel security
• Security education, training and awareness
• Certification and accreditation

4. Software Development Security

– refers to the controls that are included within systems and applications software and the steps used in their development
• Systems development life cycle (SDLC)
• Application environment and security controls
• Effectiveness of application security

5. Cryptography

-the principles, means and methods of disguising information to ensure its integrity, confidentiality and authenticity
• Encryption concepts
• Digital signatures
• Cryptanalytic attacks
• Public Key Infrastructure (PKI)
• Information hiding alternatives

6. Security Architecture and Design

– contains the concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity and availability
• Fundamental concepts of security models
• Capabilities of information systems (e.g. memory protection, virtualization)
• Countermeasure principles
• Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)

7. Operations Security

– used to identify the controls over hardware, media and the operators with access privileges to any of these resources
• Resource protection
• Incident response
• Attack prevention and response
• Preventative measures against attacks

8. Business Continuity & Disaster Recovery Planning

– addresses the preservation of the business in the face of major disruptions to normal business operations
• Business impact analysis
• Recovery strategy
• Disaster recovery process
• Provide training

9. Legal, Regulations, Investigations and Compliance

– addresses computer crime laws and regulations; the investigative measures and techniques which can be used to determine if a crime has been committed and methods to gather evidence
• Legal issues
• Investigations
• Forensic procedures
• Compliance requirements/procedures

10. Physical (Environmental) Security

– addresses the threats, vulnerabilities and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information
• Site / facility design considerations
• Perimeter security
• Internal security
• Facilities security