CISSP: Certified Information Systems Security Professional

Provided by

  • Sector IT
  • Course Type Online
  • Duration 1 Year
  • Price £250

Enquire about this course

About the course

About (ISC)2

(ISC)2 are the world’s leading Cybersecurity and IT Security professional organisation. It is an international, non-profit membership association for information security leaders committed to helping their members learn, grow and thrive. They have more than 125,000 certified members worldwide.

About the Course

This CISSP course will give you a comprehensive understanding of IT Network, Security and Information Systems as you will be taught the eight CISSP domains.

Course Units

Security and Risk Management

  • Confidentiality, Integrity and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures and Guidelines

Asset Security

  • Information and Asset Clarification
  • Ownership (e.g. Data Owners, System Owners)
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements (e.g. Markings, Labels, Storage)

Security Engineering

  • Engineering Processes Using Secure Design Principles
  • Fundamental Concepts of Security Models
  • Security Evaluation Models
  • Security Architectures, Designs and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design (e.g. IP & Non-IP Protocols, Segmentation)
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service (e.g. Cloud Identity)
  • Third-Party Identity Services (e.g. On-Premise)
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle (e.g. Provisioning Review)

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data (e.g. Management and Operational Controls)
  • Security Control Testing
  • Test Outputs (e.g. Automated, Manual)
  • Security Architecture Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact

Related article

Bag yourself a course this Black Friday