Certified Information Security Systems Professional
The ISC2 Certified Information Systems Security Professional (CISSP) course is an advanced, globally recognized certification designed for experienced security practitioners, managers, and executives. The CISSP certification validates deep technical and managerial competence in information security and provides a holistic understanding of security best practices and principles. This course covers the eight domains of the CISSP Common Body of Knowledge (CBK), preparing participants to tackle security challenges and to pass the CISSP certification exam.
- Gain comprehensive knowledge of the eight CISSP domains.
- Develop skills to design, implement, and manage a best-in-class cybersecurity program.
- Understand and apply security and risk management principles.
- Prepare for and successfully pass the CISSP certification exam.
After completing this course, the student will be able to:
- Apply fundamental concepts and methods related to the fields of information technology and security.
- Align overall organizational operational goals with security functions and implementations.
- Determine how to protect assets of the organization as they go through their lifecycle.
- Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
- Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
- Explain the importance of cryptography and the security services it can provide in today’s digital and information age.
- Evaluate physical security elements relative to information security needs.
- Evaluate the elements that comprise communication and network security relative to information security needs.
- Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
- Determine appropriate access control models to meet business security requirements.
- Apply physical and logical access controls to meet information security needs.
- Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
- Apply appropriate security controls and countermeasures to optimize an organization’s operational function and capacity.
- Assess information systems risks to an organization’s operational endeavours.
- Determine appropriate controls to mitigate specific threats and vulnerabilities.
- Apply information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems’ lifecycles.
- Experienced Security Practitioners
- Security Managers and Executives
- IT Professionals with a focus on cybersecurity
- A minimum of five years of cumulative, paid work experience in two or more of the eight domains of the CISSP CBK is recommended.
- ISC2 offers an Associate of ISC2 designation for those who pass the CISSP exam but lack the required experience.
Security and Risk Management | 16% |
Asset Security | 10% |
Security Architecture & Engineering | 13% |
Communication & Network Security | 13% |
Identity & Access Management (IAM) | 13% |
Security Assessment & Testing | 12% |
Upcoming Course Dates
Course Dates |
---|
29 January 2025 |
Contact Us |
Course Summary
Vendor
ISC2
Experience Level
Course Type
ILT/VILT
Course Duration
This course can be offered either as 5 consecutive classroom days or as a 6 week course offered outside of working hours – usually 2 evenings a week for 3 hours per evening.
Tech Areas
Cybersecurity