Cybersecurity - Information Systems Security Professional

Course Info

Length: 1 Week

Type: Online

Available Dates

Fees

  • Dec-16-2024

    1,780

  • Jan-20-2025

    1,780

  • Feb-17-2025

    1,780

  • Mar-17-2025

    1,780

  • Apr-21-2025

    1,780

  • May-19-2025

    1,780

  • June-16-2025

    1,780

  • July-21-2025

    1,780

  • Aug-18-2025

    1,780

  • Sep-15-2025

    1,780

  • Oct-20-2025

    1,780

  • Nov-17-2025

    1,780

  • Dec-15-2025

    1,780

Course Details

Course Outline

5 days course

A.    Introduction to CISSP and Security Concepts

  • Security domains and their interrelationships
  • Security governance and risk management
  • Data classification and handling

B.    Security and Risk Management

  • Introduction to security management principles
  • Risk assessment and management
  • Security governance and policies
  • Legal and regulatory compliance

A.    Asset Security - Security Architecture and Engineering

  • Asset classification and ownership
  • Data handling and retention policies
  • Privacy protection and data security
  • Secure disposal of assets
  • Security models and frameworks
  • System and network architecture security
  • Secure design principles and controls
  • Security in the software development lifecycle

 

B.    Communication and Network Security

  • Network protocols and secure communication
  • Network architecture and segmentation
  • Secure remote access and VPNs
  • Wireless network security

 

A.    Identity and Access Management (IAM)

  • IAM concepts and principles
  • Authentication methods and mechanisms
  • Authorization and access control
  • Identity and access provisioning

B.    Security Assessment Testing

  • Vulnerability assessment and management
  • Penetration testing methodologies
  • Security control testing and auditing
  • Incident response and management

A.    Software Development Security

  • Secure software development lifecycle (SDLC)
  • Code review and testing techniques
  • Security implications of third-party software
  • Secure coding practices

B.    Security Operations

  • Security operations and monitoring
  • Incident response and recovery procedures
  • Business continuity and disaster recovery planning
  • Logging and monitoring best practices

 

A.    Security Operations Best Practices

  • Security controls and countermeasures
  • Security awareness and training programs
  • Collaboration with law enforcement and external agencies
  • Security operations metrics and reporting

B.    Review and Exam Preparation

  • Review of key concepts of the course
  • Mock CISSP practice exams
  • Exam strategies and tips