Cy Certified Information Systems Security Professional (CISSP)

Course Code: CISSP5CYBER

Book

Duration

5 Day(s)

Course Type

Public or Private

Max Delegates

12

Delivery Style

Classroom

No Upcoming Events

No upcoming Scheduled Courses. Contact us for information on booking a private course or join the waiting list for a public event.

Contact Us

The globally recognised information security certification developed by the International Information Systems Security Certification Consortium (ISC)²

CISSP is a globally recognised Information Security standard.  It reviews the entire information security landscape and the technologies involved, addressing the eight knowledge domains that comprise the common body of knowledge (CBK) for information systems security professionals.

Latest news

Celebrating Success at the KPMG Supplier Awards On Tuesday 2nd December, Quanta attended the KPMG Supplier Awards Ceremony in London….
Read More

In this industry pioneering course formed by a partnership between Kanban University and Scrum Alliance®, learn to apply Kanban principles to improve…
Read More

Descriptions

Who is this course for

Security professionals, anyone with a need for formal Information Security training.

Purpose of the course

The course uses a theory based approach via instructor led discussion of security processes with the opportunity to discuss the immediate application of concepts and techniques described in the CBK to the real world. It can be considered as providing a good introduction to security management, architecture and engineering.

You will learn how to


  • Protect assets using access control techniques

  • Strengthen confidentiality and integrity controls using the world of cryptography

  • Secure your network architecture and design (implement Cyber security)

  • Achieve organisational objectives such as legal & compliance, Information assurance, security and data governance

  • Enhance IT services secure delivery via Security operations, architecture and design principles

  • Implement business resiliency via Business Continuity Plan

  • You will gain a thorough understanding of the domains as prescribed by (ISC)2®

Benefits for you as an individual

This course demonstrates a working knowledge of information security and will confirm your dedication to the security industry. The CISSP qualification acts as a differentiator within the marketplace and will enhance your credibility. In addition it will provide you with access to valuable resources, such as networking with security peers.

Benefits for your organisation

CISSP establishes a standard Information Security best practice, offering a broad understanding of the (ISC)² CBK.  CISSP permits access to a global network of industry, subject matter and domain experts.  CISSP will add credibility to your organisations approach to Information Security with the rigor and regimen of the certification examinations.

Prerequisites

Delegates should have experience in at least two of the domains as laid out in the CBK, for 5 years or more (4 years if they have achieved relevant industry or degree level certifications) to achieve full certification. Associate status can be achieved without the full 4/5 years' experience; full certification will be assigned when the correct amount of experience is obtained.

We recommend delegates have some knowledge of all CBK domains and are encouraged to read one or two of the recommended books which can be found on the ISC2.org Reading List.

Security and Risk Management

  • Confidentiality, integrity, and availability concepts
  • Security governance principles
  • Compliance
  • Legal and regulatory issues
  • Professional ethics
  • Security policies, standards, procedures and guidelines

Asset Security

  • Information and asset classification
  • Ownership
  • Protect privacy
  • Appropriate retention
  • Data security controls
  • Handling requirements

Security Engineering

  • Engineering processes using secure design principles
  • Security models fundamental concepts
  • Security evaluation models
  • Security capabilities of information systems
  • Security architectures, designs, and solution elements vulnerabilities
  • Web-based systems vulnerabilities
  • Mobile systems vulnerabilities
  • Embedded devices and cyber-physical systems vulnerabilities
  • Cryptography
  • Site and facility design secure principles
  • Physical security

Communication and Network Security

  • Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
  • Secure network components
  • Secure communication channels
  • Network attacks

Identity and Access Management

  • Physical and logical assets control
  • Identification and authentication of people and devices
  • Identity as a service including cloud identity
  • Third-party identity and on-premise services
  • Access control attacks
  • Identity and access provisioning life-cycle

Security Assessment and Testing

  • Assessment and test strategies
  • Security process data
  • Security control testing
  • Test outputs
  • Security architectures vulnerabilities

Security Operations

  • Investigations support and requirements
  • Logging and monitoring activities
  • Provisioning of resources
  • Foundational security operations concepts
  • Resource protection techniques
  • Incident management
  • Preventative measures
  • Patch and vulnerability management
  • Change management processes
  • Recovery strategies
  • Disaster recovery processes and plans
  • Business continuity planning and exercises
  • Physical security
  • Personnel safety concerns

Software Development Security

  • Security in the software development life-cycle
  • Development environment security controls
  • Software security effectiveness
  • Acquired software security impact

Additional Exam Information

Our course is a 'theory based' guide through the 8 domains of CISSP.  The course should be taken many months before you plan on booking your Certified Information Systems Security Professional exam, as a considerable amount of self-study is needed.

When ready delegates can acquire a Pearson VUE testing voucher by following the guide on the ISC2 website.

Pre-Coursework

Delegates will receive the CISSP guide book as pre-reading.  It is expected that delegates read the guide to gain familiarity of the key concepts within the 8 CISSP domains.

Get Started

Forget trawling through endless course catalogues – Find the training that’s right for you

Learn More

Latest News from Quanta

KPMG Learning Services Award Winners!

Celebrating Success at the KPMG Supplier Awards On Tuesday 2nd December, Quanta attended the KPMG Supplier Awards Ceremony in London….
Read More

Just Launched: Scrum Better with Kanban

In this industry pioneering course formed by a partnership between Kanban University and Scrum Alliance®, learn to apply Kanban principles to improve…
Read More

Kanban and Agile: Bridging the Gap

Kanban and Agile: Bridging the Gap Quanta’s Kanban University Certified Trainer Steve Church explores the way in which Agile and…
Read More