CISSP® was the first certification in place in the information security community and is recognized by ANSI (American National Standards Institute) and ISO (International Standards Organization) standard 17024.
The CISSP® certification is not only a measure of excellence in information security, but also recognized as a measure of success.
This course will introduce you to the Common Body of Knowledge of IT security and help you develop a comprehensive understanding of IT security issues.
You will also be prepared for the CISSP® certification exam.
Duration
5 days
Schedule
See training dates for details
Regular fee
$3,350
Preferential fee
A preferential rate is offered to public institutions, to members of certain professional organizations as well as to companies that do a certain amount of business with Technologia. To know more, please read the "Registration and rates" section on our FAQ page. Please note that preferential rates are not available for online training courses. Discounts cannot be combined with other offers.
$3,015
Objectives of the training
At the end of the course, participants will be able to apply the fundamentals of information systems security to improve the organization's management practices.Targeted audience
System and network administrators, IS security managers or any other person playing a role in IS security policy.Prerequisite
Basic knowledge of networks and operating systems as well as information security.Trainers
Course architecture
The CISSP training is divided into 8 modules of computer security forming the core knowledge called the CBK, or Common Body Knowledge.
Module 1 - Security and Risk Management
- Principles of security governance
- Compliance
- Professional ethics
- Security in documentation
- Risk Management
- Threat Modeling
- Basics of a continuity plan
- Procurement strategy and practices
- Personnel Security Strategies
- Security training and awareness
Module 1 - Security and Risk Management
- Principles of security governance
- Compliance
- Professional ethics
- Security in documentation
- Risk Management
- Threat Modeling
- Basics of a continuity plan
- Procurement strategy and practices
- Personnel Security Strategies
- Security training and awareness
Module 2 - Asset Security
- Asset Classification
- Information Protection
- Data Retention
- Data Security Control
- Secure Data Handling
- Asset Classification
- Information Protection
- Data Retention
- Data Security Control
- Secure Data Handling
Module 3 - Security Architecture and Engineering
- Security in an engineering cycle
- Security of system components
- Security models
- Enterprise security controls and countermeasures
- Information Security Capabilities
- Design and architecture of vulnerability mitigation solutions
- Mitigation of vulnerabilities in Embedded, Mobile, and Web-based devices
- Cryptographic concepts
- Cryptographic techniques
- Design of a secure physical environment
- Physical security implementation
- Security in an engineering cycle
- Security of system components
- Security models
- Enterprise security controls and countermeasures
- Information Security Capabilities
- Design and architecture of vulnerability mitigation solutions
- Mitigation of vulnerabilities in Embedded, Mobile, and Web-based devices
- Cryptographic concepts
- Cryptographic techniques
- Design of a secure physical environment
- Physical security implementation
Module 4 - Communications and Network Security
- Security of network protocols
- Security of network components
- Security of communication channels
- Mitigation of network attacks
- Security of network protocols
- Security of network components
- Security of communication channels
- Mitigation of network attacks
Module 5 - Identity and Access Management (IAM)
- Physical and logical access control
- Identification, authentication and authorization
- Identity as a Service
- Authorization mechanisms
- Mitigation of access control based attacks
- Physical and logical access control
- Identification, authentication and authorization
- Identity as a Service
- Authorization mechanisms
- Mitigation of access control based attacks
Module 6 - Security Assessment and Testing
- Testing system security controls
- Testing software security controls
- Security of a data collection process
- Audits
- Testing system security controls
- Testing software security controls
- Security of a data collection process
- Audits
Module 7 - Operational Security
- Operational Security Concepts
- Physical security
- Personnel Security
- Personnel registration and tracking
- Preventive measures
- Resource procurement and protection
- Patch and threat management
- Change management
- Incident response
- Investigations
- Disaster Recovery Planning
- Disaster Recovery Strategies
- Disaster recovery implementation
- Operational Security Concepts
- Physical security
- Personnel Security
- Personnel registration and tracking
- Preventive measures
- Resource procurement and protection
- Patch and threat management
- Change management
- Incident response
- Investigations
- Disaster Recovery Planning
- Disaster Recovery Strategies
- Disaster recovery implementation
Module 8 - Software Development Security
- Security principles in the system life cycle
- Security principles in the software life cycle
- Database security in software development
- Security controls in a development environment
- Security assessment of software effectiveness
- Security principles in the system life cycle
- Security principles in the software life cycle
- Database security in software development
- Security controls in a development environment
- Security assessment of software effectiveness
Pedagogical details
Training architecture
Examples and scenarios of exam questions. Explanations on the 8 fields of competence identified by ISC2
Training Notes
The training does not include the exam to obtain the CISSP certification.
Private or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quoteDuration
5 days
Schedule
See training dates for details
Regular fee
$3,350
Preferential fee
A preferential rate is offered to public institutions, to members of certain professional organizations as well as to companies that do a certain amount of business with Technologia. To know more, please read the "Registration and rates" section on our FAQ page. Please note that preferential rates are not available for online training courses. Discounts cannot be combined with other offers.
$3,015
Private or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quote