The Certified Information Systems Security Professional (CISSP) is an esteemed information security certification for security analysts. It was established by the International Information Systems Security Certification Consortium (ISC). This certification ensures that professionals in computer security possess standardized knowledge in the field.
The CISSP certification helps you develop expertise in defining architecture, as well as designing, building, and maintaining a secure business environment for your organization using globally recognized Information Security standards.
The British Academy For Training And Development offers this course to equip you with the skills necessary to excel in information security.
Who should attend?
• Chief Information Security Officers.
• Directors of Security.
• IT Director/Managers.
• Security Systems Engineers.
• Security Analysts, Auditors, Architect, and Consultants.
• Network Architects.
• Those wishing to develop their capabilities in this field.
Knowledge and Benefits:
After completing the program, participants will be able to master the following:
• Understand access control systems and methodology.
• Apply application and systems development security.
• Implement business continuity planning & disaster recovery planning.
• Understand Cryptography and how it's used.
• Understand law, investigation, and ethics.
• Implement operations and physical security.
• Understand security architecture and models.
• Handle security management practices.
• Understand telecommunications and networking security.
Course Content
• What is CISSP Certification?
• CISSP Certification Goals.
• Security Professional Certification Value.
• Physical (Environmental) Security.
• Security governance and policies
• Security awareness, training, and education
• Business continuity planning and disaster recovery
• Information classification and ownership
• Security models and frameworks
• System architecture and design principles
• Security capabilities of information systems
• Security controls for hardware, software, and networks
• Network architecture and protocols
• Secure network components and devices
• Secure communication channels
• Network attacks and countermeasures
• Access control models and techniques
• Identification and authentication mechanisms
• Authorization and accountability
• Identity and access provisioning lifecycle
• Security assessment methodologies
• Vulnerability assessment and management
• Penetration testing and ethical hacking
• Security controls testing and assurance
• Security operations management
• Incident response and management
• Disaster recovery planning
• Business continuity planning
• Secure software development lifecycle
• Software security testing and verification
• Secure coding practices
• Secure deployment and maintenance
• Cryptographic concepts and principles
• Symmetric and asymmetric encryption
• Public key infrastructure (PKI)
• Cryptographic protocols and applications
• Physical security threats and countermeasures
• Security architecture and design.
• Software development security.
• Information security governance.
• Telecommunications and network security.
• Business Continuity and Disaster Recovery.
• Legal regulations and Compliance.
• Security and Risk Management.
• Asset Security.
• Identity and Access Management (IAM).
• Software Development Security.
• Security Engineering.
• Communications and Network Security.
• Identity and Access Management.
• Software Development Security.
• Cyber Defense Infrastructure Support.
• Cybersecurity Management.
• CISSP challenges.
• Practical workshops and applications.
Note / Price varies according to the selected city