ISC2 Information Systems Security Professional (CISSP) Training
About This Course
The ISC2 Information Systems Security Professional (CISSP) training course is meticulously designed for professionals seeking to deepen their knowledge and skills in information security. The course begins with a focus on Security and Risk Management, emphasizing professional ethics, security concepts, the legal environment, and secure design principles. Participants will gain a clear understanding of the key aspects of Asset Security, including managing information assets and data security life cycles.
Moving into the intricacies of Security Architecture and Engineering, the course covers vulnerabilities assessment, cryptographic systems, and the essentials of cryptanalysis. Communication and Network Security is another critical topic, providing insight into the OSI and TCP/IP models and their application in secure network design. Identity and Access Management (IAM) is thoroughly explored, highlighting the importance of managing identities, access controls, and authentication systems.
Additionally, the course emphasizes Security Assessment and Testing, enabling learners to design effective security assessment strategies and analyze organizational security performance. Security Operations is a key module that includes incident management, logging, and monitoring activities, as well as implementing backup and recovery strategies. The final topic, Software Development Security, delves into the vulnerabilities inherent in software systems, malware and ransomware threats, and the implementation of security controls in software development ecosystems. This course ensures that participants are well-prepared for the CISSP, equipping them with the knowledge to develop action plans, evaluate technologies, introduce security controls, and address lapses in organizational security standards.
What You'll Learn
LO1 – Assess application and infrastructure component adherence to security standards, integrating organizational security operational procedures.
LO2 – Develop specific action plans for business units, incorporating corporate security policies, standards, and guidelines.
LO3 – Evaluate technologies and tools for addressing security gaps, aligning with security policy considerations
LO4 – Introduce security controls in alignment with corporate security policies and frameworks.
LO5 – Implement security guidelines and protocols, ensuring compliance and understanding of data security controls and compliance requirements
LO6 – Review and confirm the adequacy of information security controls, focusing on types of security controls and implementation procedures
LO7 – Highlight areas for improvement in security and propose revisions to security guidelines, incorporating techniques for process assessment against security standards
LO8 – Identify and address lapses in organizational security standards, focusing on issues threatening information security and integrity.
Topics Covered
Topic 1 Security and Risk Management
Topic 2 Asset Security
Topic 3 Security Architecture and Engineering
Topic 4 Communication and Network Security
Topic 5 Identity and Access Management IAM
Topic 6 Security Assessment and Testing
Topic 7 Security Operations
Topic 8 Software Development Security
Entry Requirements
Knowledge and Skills
• Able to operate computer functions with minimum Computer Literacy Level 2 based on ICAS Computer Skills Assessment Framework
• Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
• Positive Learning Attitude
• Enthusiastic Learner
Experience
• Minimum of 1 year of working experience.
Target Year Group : 21-65 years old