Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP) Training

Course Introduction:

The CISSP course is a vendor neutral training and certification program governed by non-profit international information systems security certification consortium, (ISC)2. CISSP certification was one of the first credentials in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) standard 17024:2003. CISSP training and certification helps you to become an expert who is capable of defining the IT infrastructure and in designing, building and maintaining a secure business environment using information security standards. CISSP training will validate your area of expertise and you become a member of (ISC)2, getting an access to many exclusive resources, peer to peer networking opportunities along with lot of educational tools.

Course learning objectives:

  • Learn the required skills to design the architecture and manage IT security in organization environment
  • Detailed specifications of access control administration
  • Understand and apply security governance and risk management framework
  • Intrusion detection and common methods of cyber attacks

Pre-requisites:

  • Minimum 5 years of experience as a full time employee in 2 or more of the 8 domains of the (ISC)2 CISSP common body of knowledge (CBK)
  • A waiver of 1 year experience is possible if you possess a 4 year college degree

Target Audience:

  • Network Architects
  • IT managers
  • IT heads
  • Chief information security officers (CISO)
  • IT directors
  • Security system engineers
  • Security Auditors
  • Chief information officers
  • Director Security

Contents covered in CISSP training:

  • Security and risk management
  • Asset security
  • Security architecture and Engineering
  • Communication and network security
  • Identity and access management
  • Security assessment and testing
  • Security operations
  • Software development security