Course Details

Certified Information Systems Security Professional

Our Certified Information Systems Security Professional (CISSP) training course aims to supply delegates with a theory-based approach to learning the Information Systems security process and how to apply this process practically to real-life scenarios.

The course is based around teaching the eight fundamental domains of Information Security, which provide delegates with all the information they require to obtain a broad understanding of Information Security and pass the CISSP exam.

The CISSP certification is globally recognised as the best Information Systems Security certification for Security Professionals. Our trainers use a theory-based training strategy, allowing for a clear explanation of CISSP terminology and methodology. Delegates can easily gain a comprehensive knowledge of the Information Security process by attending this course.

The content of this course is largely centred on the eight fundamental domains of Information Security, which encompass everything delegates need to know about the topic. Despite being wholly theory-based, the CISSP certification emphasises the necessity of practically applying what is learned and effectively trains delegates to do this.

Hence, by the end of the course, delegates will have acquired the knowledge and skills required to be able to design, develop, apply, and manage a security program to prevent malicious cyber-attacks. Thus, these individuals become greatly desirable for employers and can greatly improve their employability prospects. Certified Information Systems Security Professionals are crucial additions to the team as they can prevent the occurrence of a number of potentially harmful attacks to a business’s systems.

The fundamental eight domains of Information Security are taught during this certification, providing delegates with all the information they require to pass the exam.

The following subjects will be taught during the CISSP Certification:

Security and Risk Management:

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security:

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Engineering:

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communications and Network Security:

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management:

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing:

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations:

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security:

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact

It is required for delegates to obtain a book which will be used during the course: Official (ISC)2 Guide to the CISSP CBK. 4th Edition. (ISC2 Press). - Adam Gordon

It might also prove useful to briefly read over some of this guide prior to starting the course to supplement your learning and prepare you for your CISSP training.

View Schedules Download Syllabus

ONEITECH EXPERIENCE

EXPERIENTIAL WORKSHOPS

Learn from the real-world experience of accredited industry experts and advance your knowledge with in-class activities and simulations.

ELITE PANEL OF SPCS

Interact with accredited SPCs who also have years of experience as active SAFe® practitioners.

LEARN FROM PRACTITIONERS

Learn directly from active practitioners engaged in implementing SAFe® principles in real projects.

GATEWAY TO SAFE® COMMUNITIES

Get access to a wider community of active Scaled Agile experts and enhance your practical knowledge of SAFe®.

CONTINUOUS LEARNING AND SUPPORT

Avail continuous support through monthly webinars, e-books, and conferences and keep pace with the latest industry updates.

HANDY RESOURCES

Get access to tutorials, articles, interview Q&A and case studies prepared by the industry experts with latest updates in the Agile industry.

FAQS ON LEADING SAFE ONLINE COURSE