RE129
Information technology

Cybersecurity : Certified information systems security professionnal (CISSP)

Become a Certified Information Systems Security Professional


CISSP® was the first certification in place in the information security community and is recognized by ANSI (American National Standards Institute) and ISO (International Standards Organization) standard 17024. The CISSP® certification is not only a measure of excellence in information security, but also recognized as a measure of success. This course will introduce you to the Common Body of Knowledge of IT security and help you develop a comprehensive understanding of IT security issues. You will also be prepared for the CISSP® certification exam.

Objectives

At the end of the course, participants will be able to apply the fundamentals of information systems security to improve the organization's management practices.

Is it for you ?

System and network administrators, IS security managers or any other person playing a role in IS security policy.

Prerequisite

Basic knowledge of networks and operating systems as well as information security.

Your benefits

  • Master the 8 CBK domains to structure a comprehensive cybersecurity strategy
  • Assess and manage risks by integrating governance, compliance, and business continuity
  • Design secure architectures using security models, cryptography, and effective controls
  • Implement robust identity, access, network, and communication security mechanisms
  • Audit, test, and enhance security across systems, operations, and software development
  • Content

    Module 1 - Security and Risk Management

    • Principles of security governance
    • Compliance
    • Professional ethics
    • Security in documentation
    • Risk Management
    • Threat Modeling
    • Basics of a continuity plan
    • Procurement strategy and practices
    • Personnel Security Strategies
    • Security training and awareness
    See more + / -

    Module 2 - Asset Security

    • Asset Classification
    • Information Protection
    • Data Retention
    • Data Security Control
    • Secure Data Handling

    Module 3 - Security Architecture and Engineering

    • Security in an engineering cycle
    • Security of system components
    • Security models
    • Enterprise security controls and countermeasures
    • Information Security Capabilities
    • Design and architecture of vulnerability mitigation solutions
    • Mitigation of vulnerabilities in Embedded, Mobile, and Web-based devices
    • Cryptographic concepts
    • Cryptographic techniques
    • Design of a secure physical environment
    • Physical security implementation

    Module 4 -Communications and Network Security

    • Security of network protocols
    • Security of network components
    • Security of communication channels
    • Mitigation of network attacks

    Module 5 -Identity and Access Management (IAM)

    • Physical and logical access control
    • Identification, authentication and authorization
    • Identity as a Service
    • Authorization mechanisms
    • Mitigation of access control based attacks

    Module 6 - Security Assessment and Testing

    • Testing system security controls
    • Testing software security controls
    • Security of a data collection process
    • Audits

    Module 7 - Operational Security

    • Operational Security Concepts
    • Physical security
    • Personnel Security
    • Personnel registration and tracking
    • Preventive measures
    • Resource procurement and protection
    • Patch and threat management
    • Change management
    • Incident response
    • Investigations
    • Disaster Recovery Planning
    • Disaster Recovery Strategies
    • Disaster recovery implementation

    Module 8 - Software Development Security

    • Security principles in the system life cycle
    • Security principles in the software life cycle
    • Database security in software development
    • Security controls in a development environment
    • Security assessment of software effectiveness

    Notes

    The training does not include the exam to obtain the CISSP certification.

    💡 Useful information

    Our training sessions are offered in Montreal or Quebec City, in person or in virtual format. Dates and locations are provided when you select your session below. If you have any questions regarding registration, schedules, the language of instruction, or cancellation policies, please consult our FAQ .

    Duration
    5 days
    Schedule
    9h to 16h
    Regular fee
    $3,350
    Preferential fee A preferential rate is offered to public institutions, to members of certain professional organizations as well as to companies that do a certain amount of business with Technologia. To know more, please read the "Registration and rates" section on our FAQ page. Please note that preferential rates are not available for online training courses. Discounts cannot be combined with other offers.
    $3,015
    Private or personalized training

    Do you have several employees interested in the same training course? Whether in person at your offices or remotely in virtual mode, we offer private training courses tailored to your team's needs. Group rates are available. Contact us for more details or request a quote online.

    Request a quote

    Request in-company training

    Do you have several employees interested in the same training course? Whether in person at your offices or remotely in virtual mode, we offer private training courses tailored to your team's needs. Group rates are available. Contact us for more details or request a quote online.

    Tell us more
    Added to cart View my cart