Training Course
Certified Information Systems Security Professional (CISSP)
Public Scheduled Course Dates
Prices per delegate. All prices exclude VAT.
Date | Location | Price | |
30 Sep - 04 Oct 2024 | Virtual |
£3750
|
|
07 Oct - 11 Oct 2024 | London |
£3750
|
|
21 Oct - 25 Oct 2024 | Virtual |
£3750
|
|
11 Nov - 15 Nov 2024 | London |
£3750
|
|
18 Nov - 22 Nov 2024 | Virtual |
£3750
|
|
02 Dec - 06 Dec 2024 | Virtual |
£3750
|
Private Training
Flexible dates, location and content. All prices exclude VAT.
Course Duration
5 DaysCertified Information Systems Security Professional (CISSP) Course Overview
SPECIAL NOTICEThe CISSP course is not delivered as a boot camp or exam prep course. Our course is a ‘theory based’ guide through the eight ISC2 domains to support your learning of the ISC2 Book of Knowledge. This course should be taken many months in advance of your CISSP exam booking. It will not substitute the considerable amount of self-study that all CISSP delegates need to undertake. This course attracts mixed ability delegates and is always tailored to meet the needs of all participants.
Aimed at security professionals, this course surveys the entire information security landscape and the technologies involved. The course addresses the eight knowledge domains that comprise the common body of knowledge (CBK) for information systems security professionals and will help delegates prepare for CISSP certification.
The course offers a theory based approach to the security process, with opportunities to discuss the immediate application of concepts and techniques described in the CBK to the real world. It can be considered as providing a good introduction to security management, architecture and engineering.
The course comprises of eight sessions that map directly to the (CBK), each one is theory based with instructor led discussions; there are no hands on labs.
Course Prerequisites
-
- We recommend that work completed in the classroom is complemented by extra reading to ensure success in the exam. The amount of extra reading required will depend on the amount of experience the delegate has. The 'mile wide, inch deep' description indicates the challenge to most delegates, not all will have 'hands on' experience spanning all 8 domains of the CBK.
- We will provide a CISSP guide book as pre-reading. It is expected that delegates review the guide and gain an appreciation of the key concepts in each of the eight CISSP domains in advance of the course. However, we do not expect delegates to be familiar with all the details of the guide book in advance of the course itself.
- We recommend delegates have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
- Delegates should have experience in at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant industry or degree level certifications) to achieve full certification. Associate status can be achieved without the full 4/5 years experience; full certification will be assigned when the correct amount of experience is obtained.
Included with this course
-
- Comprehensive course materials and exercises
Certified Information Systems Security Professional (CISSP) Course Content
-
Security and Risk Management
Understand and apply concepts of confidentiality, integrity and availability
Apply security governance principles
Compliance
Understand legal and regulatory issues that pertain to information security in a global context
Understand professional ethics
Develop and implement documented security policy, standards, procedures, and guidelines
Understand business continuity requirements
Contribute to personnel security policies
Understand and apply risk management concepts
Understand and apply threat modelling
Integrate security risk considerations into acquisition strategy and practice
Establish and manage information security education, training, and awareness -
Asset Security
Classify information and supporting assets
Determine and maintain ownership
Protect privacy
Ensure appropriate retention
Determine data security controls
Establish handling requirements -
Security Engineering
Implement and manage engineering processes using secure design principles
Understand the fundamental concepts of security models
Select controls and countermeasures based upon systems security evaluation models
Understand security capabilities of information systems
Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
Assess and mitigate the vulnerabilities in web-based systems
Assess and mitigate vulnerabilities in mobile systems
Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems
Apply cryptography
Apply secure principles to site and facility design
Design and implement physical security -
Communication & Network Security
Apply secure design principles to network architecture
Secure network components
Design and establish secure communication channels
Prevent or mitigate network attacks -
Identity & Access Management
Control physical and logical access to assets
Manage identification and authentication of people and devices
Integrate identity as a service
Integrate third-party identity services
Implement and manage authorization mechanisms
Prevent or mitigate access control attacks
Manage the identity and access provisioning lifecycle -
Security Assessment & Testing
Design and validate assessment and test strategies
Conduct security control testing
Collect security process data
Analyse and report test outputs
Understand the vulnerabilities of security architectures -
Security Operations
Understand and support investigations
Understand requirements for investigation types
Conduct logging and monitoring activities
Secure the provisioning of resources
Understand and apply foundational security operations concepts
Employ resource protection techniques
Conduct incident management
Operate and maintain preventative measures -
Software Security Development
Understand and apply security in the software development lifecycle
Enforce security controls in development environments
Assess the effectiveness of software security
Assess security impact of acquired software
- CISSP and CBK are registered certification marks of (ISC)2, Inc.
Public Scheduled Course Dates
Prices per delegate. All prices exclude VAT.
Date | Location | Price | |
30 Sep - 04 Oct 2024 | Virtual |
£3750
|
|
07 Oct - 11 Oct 2024 | London |
£3750
|
|
21 Oct - 25 Oct 2024 | Virtual |
£3750
|
|
11 Nov - 15 Nov 2024 | London |
£3750
|
|
18 Nov - 22 Nov 2024 | Virtual |
£3750
|
|
02 Dec - 06 Dec 2024 | Virtual |
£3750
|
Private Training
Flexible dates, location and content. All prices exclude VAT.
-
Certified Information Systems Security Professional (CISSP) Course Options
Please contact us to discuss options for this courseVirtualVirtualThese courses can be attended from anywhere.
- Virtual Training
What were the most useful aspects of the course
Set up and reporting
C.W. Sunderland City Council, Microsoft Project Essentials
It was excellent
J.B. Tyne and Wear Pension Fund, PowerPoint Essentials
How would you rate the course content overall
Amazing I feel I will be so much more efficient. Content was so relevant and useful. Looking forward to applying what I have learned
K.B. Education Development Trust, Excel Level 3
Excellent training, excellent facilities
A. , Computers for Beginners and Getting Started with MS Office
Following this training what are you going to do differently
Put the principles into practice autosum named ranges pivot tables
B.R.H. Quorn Foods, Excel Level 3
Great course, very interesting
J. , Redefining PowerPoint Design Create Present with Impact
What were the most useful aspects of the course
Learning how to deal with stress and recognise it
J.F. Welwyn Components Ltd, Stress Management and Powering up Your Mental Resilience
The whole course was a good refresher of previous skills
T.T. Marelli, Excel Level 3
Public Scheduled Course Dates
Prices per delegate. All prices exclude VAT.
Date | Location | Price | |
30 Sep - 04 Oct 2024 | Virtual |
£3750
|
|
07 Oct - 11 Oct 2024 | London |
£3750
|
|
21 Oct - 25 Oct 2024 | Virtual |
£3750
|
|
11 Nov - 15 Nov 2024 | London |
£3750
|
|
18 Nov - 22 Nov 2024 | Virtual |
£3750
|
|
02 Dec - 06 Dec 2024 | Virtual |
£3750
|
Private Training
Flexible dates, location and content. All prices exclude VAT.
Please contact us to discuss your Certified Information Systems Security Professional (CISSP) course, we have many solutions available to ensure you receive the best training possible.
Your CISSP course can be delivered online or in-person. You can choose your learning path and delivery style. Learn in-person or online with our virtual classrooms. Small course sizes. Course materials included. Flexible Certified Information Systems Security Professional (CISSP) course content. Expert trainers and tried & tested training methods. Many course materials available online using your personal training account.
You can master CISSP, please contact us to book a place or request a quote for your Certified Information Systems Security Professional (CISSP) course.
General Information
This CISSP course is for those looking to take the CISSP exam. Certified Information Systems Security Professional (CISSP) – Exam Preparation Training Courses in the North East of England, available in Newcastle, Durham, Washington, Sunderland, Gateshead, Darlington, Middlesbrough and Leeds. Exam Preparation - CISSP training course available in the North East including Newcastle, Durham, Washington, Sunderland, Gateshead, Darlington, Middelsbrough and Leeds. CISSP Exam Prep courses. CISSP Training Courses for Exam Preparation in Newcastle, Durham, Washington and throughout the North East.
IT Training Solutions Ltd
Oakville, 14 Durham Road West, Bowburn, Durham, DH6 5AU
0191 377 8377
ittrainingsolutions.co.uk
Printed:9/11/2024 12:45:15 AM
Oakville, 14 Durham Road West, Bowburn, Durham, DH6 5AU
0191 377 8377
ittrainingsolutions.co.uk
Printed:9/11/2024 12:45:15 AM