CISSP Certified Information Systems Security Professional

CISSP Certified Information Systems Security Professional

Kestus:

40 academic hours

Toimumiskoht:

Veebikoolitus

The course offers a theory based approach to the security process, with opportunities to discuss the immediate application of concepts and techniques described in the CBK to the real world. It can be considered as providing a good introduction to security management, architecture and engineering.

ONLINE TRAINING!

The course comprises of eight sessions that map directly to the (CBK), each one is theory based with instructor led discussions; there are no hands on labs.

The QA CISSP course is not delivered as a boot camp or exam prep course. Our course is a ‘theory based’ guide through the eight ISC2 domains to support your learning of the ISC2 Book of Knowledge. This course should be taken many months in advance of your CISSP exam booking. It will not substitute the considerable amount of self-study that all CISSP delegates need to undertake. This course attracts mixed ability delegates and is always tailored to meet the needs of all participants.

Target audience:Aimed at security professionals, this course surveys the entire information security landscape and the technologies involved. The course addresses the eight knowledge domains that comprise the common body of knowledge (CBK) for information systems security professionals and will help delegates prepare for CISSP certification.

Prerequisites to the course (recommended): Delegates should have experience in at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant industry or degree level certifications) to achieve full certification. Associate status can be achieved without the full 4/5 years experience; full certification will be assigned when the correct amount of experience is obtained.

  • We recommend delegates have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
  • QA will provide a CISSP guide book as pre-reading. It is expected that delegates review the guide and gain an appreciation of the key concepts in each of the eight CISSP domains in advance of the course. However, we do not expect delegates to be familiar with all the details of the guide book in advance of the course itself.

 

We recommend that work completed in the classroom is complemented by extra reading to ensure success in the exam. The amount of extra reading required will depend on the amount of experience the delegate has. The 'mile wide, inch deep' description indicates the challenge to most delegates, not all will have 'hands on' experience spanning all 8 domains of the CBK.

Length:40 academic hours

 

The prerequisite for issuing the certificate is full participation in training.

 

The training topics and description:

Module 1. Security and Risk Management

  • Understand and apply concepts of confidentiality, integrity and availability
  • Apply security governance principles
  • Compliance
  • Understand legal and regulatory issues that pertain to information security in a global context
  • Understand professional ethics
  • Develop and implement documented security policy, standards, procedures, and guidelines
  • Understand business continuity requirements
  • Contribute to personnel security policies
  • Understand and apply risk management concepts
  • Understand and apply threat modelling
  • Integrate security risk considerations into acquisition strategy and practice
  • Establish and manage information security education, training, and awareness

 Module 2. Asset Security

  • Classify information and supporting assets
  • Determine and maintain ownership
  • Protect privacy
  • Ensure appropriate retention
  • Determine data security controls
  • Establish handling requirements

 Module 3. Security Engineering

  • Implement and manage engineering processes using secure design principles
  • Understand the fundamental concepts of security models
  • Select controls and countermeasures based upon systems security evaluation models
  • Understand security capabilities of information systems
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Assess and mitigate the vulnerabilities in web-based systems
  • Assess and mitigate vulnerabilities in mobile systems
  • Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems
  • Apply cryptography
  • Apply secure principles to site and facility design
  • Design and implement physical security

 Module 4. Communication & Network Security

  • Apply secure design principles to network architecture
  • Secure network components
  • Design and establish secure communication channels
  • Prevent or mitigate network attacks

 Module 5. Identity & Access Management

  • Control physical and logical access to assets
  • Manage identification and authentication of people and devices
  • Integrate identity as a service
  • Integrate third-party identity services
  • Implement and manage authorization mechanisms
  • Prevent or mitigate access control attacks
  • Manage the identity and access provisioning lifecycle

 Module 6. Security Assessment & Testing

  • Design and validate assessment and test strategies
  • Conduct security control testing
  • Collect security process data
  • Analyse and report test outputs
  • Understand the vulnerabilities of security architectures

 Module 7. Security Operations

  • Understand and support investigations
  • Understand requirements for investigation types
  • Conduct logging and monitoring activities
  • Secure the provisioning of resources
  • Understand and apply foundational security operations concepts
  • Employ resource protection techniques
  • Conduct incident management
  • Operate and maintain preventative measures

 Module 8. Software Security Development

  • Understand and apply security in the software development lifecycle
  • Enforce security controls in development environments
  • Assess the effectiveness of software security
  • Assess security impact of acquired software

 

CISSP and CBK are registered certification marks of (ISC)2, Inc.

The training price also includes:
teaching materials;
a trainer's consultation on the topics learned by e-mail after the training;
certificate.

You can take part in the training with the Unemployment Insurance Fund training card.

We also recommend that you get acquainted with the in-service training grants offered by the Unemployment Insurance Fund to employers: the training allowance for employers and the reimbursement of the employee's training expenses to the employer.

See you at training!

Koolitajad

  • Anthony Maxwell

    Anthony joined QA's cyber team in November 2019 bringing with him more than 20 years experience in cyber security. Prior to QA his work has taken him all over the world where he has worked with companies ranging from heavy industry, legal, government and law enforcement. His skills include security management, incident response and digital forensics, and he has developed and delivered presentations on a range of cyber-security topics notably as a keynote speaker at the Guardian cyber-security conference in Lagos, Nigeria.

    Anthony has a passion for technology generally and most things Linux, and in his spare time maintains a number of Raspberry Pi projects in various states of functionality. His certifications include CISSP, CISM and CyberSec First Responder.
    Specialist areas:

    • Forensics
    • Security management systems

    Industry experience:

    • Media
    • manufacturing
    • technology
    • finance

    Qualifications and professional membership

    • ISC2
    • ISACA
    • BCS
    • Institute of Digital Forensics

    Anthony Maxwell

    Anthony joined QA's cyber team in November 2019 bringing with him more than 20 years experience in cyber security. Prior to QA his work has taken him all over the world where he has worked with companies ranging from heavy industry, legal, government and law enforcement. His skills include security management, incident response and digital forensics, and he has developed and delivered presentations on a range of cyber-security topics notably as a keynote speaker at the Guardian cyber-security conference in Lagos, Nigeria.

    Anthony has a passion for technology generally and most things Linux, and in his spare time maintains a number of Raspberry Pi projects in various states of functionality. His certifications include CISSP, CISM and CyberSec First Responder.
    Specialist areas:

    • Forensics
    • Security management systems

    Industry experience:

    • Media
    • manufacturing
    • technology
    • finance

    Qualifications and professional membership

    • ISC2
    • ISACA
    • BCS
    • Institute of Digital Forensics
CISSP Certified Information Systems Security Professional

Kestus:

40 academic hours

Toimumiskoht:

Veebikoolitus

The course offers a theory based approach to the security process, with opportunities to discuss the immediate application of concepts and techniques described in the CBK to the real world. It can be considered as providing a good introduction to security management, architecture and engineering.

ONLINE TRAINING!

The course comprises of eight sessions that map directly to the (CBK), each one is theory based with instructor led discussions; there are no hands on labs.

The QA CISSP course is not delivered as a boot camp or exam prep course. Our course is a ‘theory based’ guide through the eight ISC2 domains to support your learning of the ISC2 Book of Knowledge. This course should be taken many months in advance of your CISSP exam booking. It will not substitute the considerable amount of self-study that all CISSP delegates need to undertake. This course attracts mixed ability delegates and is always tailored to meet the needs of all participants.

Target audience:Aimed at security professionals, this course surveys the entire information security landscape and the technologies involved. The course addresses the eight knowledge domains that comprise the common body of knowledge (CBK) for information systems security professionals and will help delegates prepare for CISSP certification.

Prerequisites to the course (recommended): Delegates should have experience in at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant industry or degree level certifications) to achieve full certification. Associate status can be achieved without the full 4/5 years experience; full certification will be assigned when the correct amount of experience is obtained.

  • We recommend delegates have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
  • QA will provide a CISSP guide book as pre-reading. It is expected that delegates review the guide and gain an appreciation of the key concepts in each of the eight CISSP domains in advance of the course. However, we do not expect delegates to be familiar with all the details of the guide book in advance of the course itself.

 

We recommend that work completed in the classroom is complemented by extra reading to ensure success in the exam. The amount of extra reading required will depend on the amount of experience the delegate has. The 'mile wide, inch deep' description indicates the challenge to most delegates, not all will have 'hands on' experience spanning all 8 domains of the CBK.

Length:40 academic hours

 

The prerequisite for issuing the certificate is full participation in training.

 

The training topics and description:

Module 1. Security and Risk Management

  • Understand and apply concepts of confidentiality, integrity and availability
  • Apply security governance principles
  • Compliance
  • Understand legal and regulatory issues that pertain to information security in a global context
  • Understand professional ethics
  • Develop and implement documented security policy, standards, procedures, and guidelines
  • Understand business continuity requirements
  • Contribute to personnel security policies
  • Understand and apply risk management concepts
  • Understand and apply threat modelling
  • Integrate security risk considerations into acquisition strategy and practice
  • Establish and manage information security education, training, and awareness

 Module 2. Asset Security

  • Classify information and supporting assets
  • Determine and maintain ownership
  • Protect privacy
  • Ensure appropriate retention
  • Determine data security controls
  • Establish handling requirements

 Module 3. Security Engineering

  • Implement and manage engineering processes using secure design principles
  • Understand the fundamental concepts of security models
  • Select controls and countermeasures based upon systems security evaluation models
  • Understand security capabilities of information systems
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Assess and mitigate the vulnerabilities in web-based systems
  • Assess and mitigate vulnerabilities in mobile systems
  • Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems
  • Apply cryptography
  • Apply secure principles to site and facility design
  • Design and implement physical security

 Module 4. Communication & Network Security

  • Apply secure design principles to network architecture
  • Secure network components
  • Design and establish secure communication channels
  • Prevent or mitigate network attacks

 Module 5. Identity & Access Management

  • Control physical and logical access to assets
  • Manage identification and authentication of people and devices
  • Integrate identity as a service
  • Integrate third-party identity services
  • Implement and manage authorization mechanisms
  • Prevent or mitigate access control attacks
  • Manage the identity and access provisioning lifecycle

 Module 6. Security Assessment & Testing

  • Design and validate assessment and test strategies
  • Conduct security control testing
  • Collect security process data
  • Analyse and report test outputs
  • Understand the vulnerabilities of security architectures

 Module 7. Security Operations

  • Understand and support investigations
  • Understand requirements for investigation types
  • Conduct logging and monitoring activities
  • Secure the provisioning of resources
  • Understand and apply foundational security operations concepts
  • Employ resource protection techniques
  • Conduct incident management
  • Operate and maintain preventative measures

 Module 8. Software Security Development

  • Understand and apply security in the software development lifecycle
  • Enforce security controls in development environments
  • Assess the effectiveness of software security
  • Assess security impact of acquired software

 

CISSP and CBK are registered certification marks of (ISC)2, Inc.

The training price also includes:
teaching materials;
a trainer's consultation on the topics learned by e-mail after the training;
certificate.

You can take part in the training with the Unemployment Insurance Fund training card.

We also recommend that you get acquainted with the in-service training grants offered by the Unemployment Insurance Fund to employers: the training allowance for employers and the reimbursement of the employee's training expenses to the employer.

See you at training!

Koolitajad

  • Anthony Maxwell

    Anthony joined QA's cyber team in November 2019 bringing with him more than 20 years experience in cyber security. Prior to QA his work has taken him all over the world where he has worked with companies ranging from heavy industry, legal, government and law enforcement. His skills include security management, incident response and digital forensics, and he has developed and delivered presentations on a range of cyber-security topics notably as a keynote speaker at the Guardian cyber-security conference in Lagos, Nigeria.

    Anthony has a passion for technology generally and most things Linux, and in his spare time maintains a number of Raspberry Pi projects in various states of functionality. His certifications include CISSP, CISM and CyberSec First Responder.
    Specialist areas:

    • Forensics
    • Security management systems

    Industry experience:

    • Media
    • manufacturing
    • technology
    • finance

    Qualifications and professional membership

    • ISC2
    • ISACA
    • BCS
    • Institute of Digital Forensics

    Anthony Maxwell

    Anthony joined QA's cyber team in November 2019 bringing with him more than 20 years experience in cyber security. Prior to QA his work has taken him all over the world where he has worked with companies ranging from heavy industry, legal, government and law enforcement. His skills include security management, incident response and digital forensics, and he has developed and delivered presentations on a range of cyber-security topics notably as a keynote speaker at the Guardian cyber-security conference in Lagos, Nigeria.

    Anthony has a passion for technology generally and most things Linux, and in his spare time maintains a number of Raspberry Pi projects in various states of functionality. His certifications include CISSP, CISM and CyberSec First Responder.
    Specialist areas:

    • Forensics
    • Security management systems

    Industry experience:

    • Media
    • manufacturing
    • technology
    • finance

    Qualifications and professional membership

    • ISC2
    • ISACA
    • BCS
    • Institute of Digital Forensics

Lisainfo

Registreerudes e-poe, e-kirja või telefoni teel, saadame Teile arve ja täpsema info osalemise kohta.
Üksteist päeva enne koolitust saadame Teile e-kirjaga meenutuse osalemise infoga.

Koolitusel osalemine on nimeline, kuid saate osalejat tasuta muuta kuni koolituse alguseni.

Koolituse eest tasumine toimub arvel viidatud arveldusarvele. Arve saadetakse maksja aadressile e-postiga. Arve tuleb tasuda enne koolituse algust arvel märgitud maksetähtajaks.

IT Koolitus on Eesti Töötukassa koolituskaardi koostööpartner. Tutvuge koolituskaardi infoga SIIN.
Täpsema info saamiseks võtke meiega ühendust telefonil 618 1727 või [email protected].

Tühistamisinfo

Kui te ei saa mingil põhjusel koolitusel osaleda, palun andke sellest teada e-posti aadressil [email protected]. Kui teatate mitteosalemisest vähemalt 7 kalendripäeva ette, lepime Teiega kokku uue aja või tagastame 100% koolituse maksumusest. Tagastame koolituse osalustasu täismahus juhul, kui pole tehtud koolituse korraldamisega seotud kulutusi (ostetud õppematerjale jms). Koolitusele mitteilmumisel, sellest mitteteatamisel või koolituse poolelijätmisel õppetasu ei tagastata.

Asukoht ja kontaktid

Aadress

Veebikoolitus

IT Koolitus Vana-Lõuna 39/1, Tallinn 6181727 [email protected]

© AS Äripäev 2000-2024
  • Aadress: Vana Lõuna 39/1, 19094 Tallinn
  • Klienditugi: 667 0099 (8:15-17:00)
  • E-post: [email protected]