Leader in the cybersecurity training sector.

ISC2 Certified Information Systems Security Professional (CISSP)

Catégorie
Satisfaction rate
4.9
Success rate
4.9

Description

Official ISC2® Training Seminar for the Certified Information Systems Security Professional (CISSP®) provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture of an organization. This training course will help students review and refresh their knowledge and identify areas they need to study for the CISSP exam. Content aligns with and comprehensively covers the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK®), ensuring relevancy across all disciplines in the field of cybersecurity.

The Certified Information Systems Security Professional (CISSP) is the most-esteemed cybersecurity certification in the world. The CISSP recognizes information security leaders who understand cybersecurity strategy, as well as hands-on implementation. It shows you have the knowledge and experience to design, develop and manage the overall security posture of an organization.

Official courseware is developed by ISC2 – creator of the CISSP CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CISSP and have completed intensive training to teach ISC2 content.

Target group

This training course is intended for professionals who have at least five years of cumulative, paid work experience in two or more of the eight domains of the ISC2 CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers. The training seminar is ideal for those working in positions such as, but not limited to:

  • Security Consultant
  • Security Manager
  • IT Director/Manager
  • Security Auditor
  • Security Architect
  • Security Analyst
  • Security Systems Engineer
  • Chief Information Security Officer
  • Security Director
  • Network Architect

Program

  • Domain 1 : Security and Risk Management
  • Domain 2 : Asset Security
  • Domain 3 : Security Architecture and Engineering
  • Domain 4 : Communication and Network Security
  • Domain 5 : Identity and Access Management (IAM)
  • Domain 6 : Security Assessment and Testing
  • Domain 7 : Security Operations
  • Domain 8 : Software Development Security

Goal

After completing this course, the student will be able to:

  • Apply fundamental concepts and methods related to the fields of information technology and security.
  • Align overall organizational operational goals with security functions and implementations.
  • Determine how to protect assets of the organization as they go through their lifecycle.
  • Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
  • Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
  • Explain the importance of cryptography and the security services it can provide in today’s digital and information age.
  • Evaluate physical security elements relative to information security needs.
  • Evaluate the elements that comprise communication and network security relative to information security needs.
  • Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
  • Determine appropriate access control models to meet business security requirements.
  • Apply physical and logical access controls to meet information security needs.
  • Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
  • Apply appropriate security controls and countermeasures to optimize an organization’s operational function and capacity.
  • Assess information systems risks to an organization’s operational endeavors.

 

Please note: Throughout this course, exam domains may be covered in several chapters. Included in the course is a table indicating where the exam outline objectives are covered in this course.

Recommended

Basic knowledge of networks and operating systems, as well as information security. Basic knowledge of audit standards and business continuity. 

Tarif

3900 €
Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
3900 €
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.