Certified Information Security Systems Professional (CISSP) (Part Time)
 /  Certified Information Security Systems Professional (CISSP) (Part Time)

The CISSP Prep. course was developed to meet current demands and the growing needs of the computer industry. This course provides the student with the level of knowledge needed as part of the (ISC)2 certification requirements for the Certified Information Systems Security Professional (CISSP) certification.

This certification is rapidly becoming a requirement for employment with security tasks. Students gain a solid background on security concerns, communications, infrastructure, basic cryptography, and operations.

Introduction
1. Students & Trainer Introduction
2. Who Should take This Course?
3. About (ISC)2
4. CISSP Certification & Examination
5. CBK Review, Domain & Function Areas

Information Security Management
1. Information Protection Requirements
2. Organization Policy, Roles & Responsibilities
3. Security Technology & Tools
4. Standards, Baselines, Procedures, Guidelines
5. Personal Security
6. Assurance, Trusts, Confidence Mechanism
7. Countermeasures & Safeguard Selection Principles
8. Information Protection & Management Services
9. Information Protection Awareness, Training & Education

Enterprise Security Architecture
1. Information Protection Requirements
2. Objectives & Benefits of Enterprise Security Architecture
3. Security Technology & Tools
4. Enterprise Security Architecture
5. Environment Platform Security
6. Architectures Security Models
7. Assurance, Trusts & Confidence Mechanism
8. Information Protection & Management Services

Access Control Systems & Methodology
1. Information Protection Requirements
2. Importance of an Access Control Policy
3. Information Protection Environment
4. Threats Related to Access Control
5. Security Technology & Tools
6. Technology & Tools in Access Control
7. Identity Management Identification
8. Authentication Access Control Services Technology
9. Access to Data
10. Assurance, Trusts & Confidence Mechanism
11. Intrusion Prevention & Detection
12. Information Protection & Management Services
13. Penetration Testing

Application Security
1. Information Protection Requirements
2. Information Protection Environment
3. Application Environment Database
4. Data Warehousing Environment
5. Web Application Environment
6. Application Environment Threats
7. Security Technology & Tools System
8. Life Cycle Programming Languages
9. Software Protection Mechanisms
10 . Database Management
11. Assurance, Trusts & Confidence Mechanism
12. Information Protection & Management Services

Operation Security
1.Information Protection Requirements
2. Information Protection Environment
3. Threats and Elements
4. Security Technology & Tools
5. Guidelines & Tools
6. Assurance, Trusts & Confidence Mechanism
7. Configuration, Contingency & Change Management
8. Information Protection & Management Services
9.Operation System Management & Reviews

Cryptography
1. Information Protection Requirements
2. Cryptographic Systems
3. Applications of Cryptography
4. Information Protection Environment
5. Methods of Encryption Cryptanalysis
6. Attacks Import & Export Issues
7. Security Technology and Tools
8. Secret Writing Types
9. Encryption Schemes
10. Symmetric & Asymmetric Encryption Systems
11. Hybrid Encryption Systems
12. Integrity Controls Digital Signatures
13. Assurance, Trusts & Confidence Mechanism
14. Email & Internet Security
15. Information Protection & Management Services

Physical Security
1. Information Protection Requirements
2. Physical Security
3. Information Protection Environment
4. Threats & Practices
5. Security Technology & Tools
6. Elements & Functions
7. Assurance, Trusts & Confidence Mechanism
8. Testing, Checklists & Maintenance
9. Information Protection & Management Services
10. Responsibility of the Security Professional

Telecommunications, Networks & Internet Security
1. Information Protection Requirements
2. Data Networks
3. Telephony
4. Information Protection Environments
5. Remote Access Service Network
6. Protocol Networks Threats & Attacks
7. Security Technology & Tools
8. Network Access Controls
9. 
Network Availability Technologies
10. Internet & Web Security Protocol
11. Multimedia Security Technologies
12. Assurance, Trusts & Confidence Mechanism
13. Information Protection & Management Services

Business Continuity & Planning
1. Information Protection Requirements
2. Information Protection Environment
3. Security Technology & Tools
4. Business Continuity Management
5. Restoration Action Example of a Recovery Process
6. Assurance, Trusts & Confidence Mechanism
7. Information Protection & Management Services

Law, Investigation & Ethics
1. Information Protection Requirements
2. Information Protection Environment
3. Information Security Legal Issues
4. Major Legal Systems Intellectual Property Laws
5. Privacy Laws
6. Legal Liability of Corporate Offers
7. Investigation Environment
8. Computer Forensics
9. Security Technology & Tools
10. Incident Response & Handling
11. Investigation – Interviewing & Interrogation
12. Assurance, Trusts & Confidence Mechanism
13. Ethics – Reviews and Violation Reports
14. Information Protection & Management Services
15. New Laws and Regulations

This course is beneficial to IT consultants, Managers, Security Policy Writers, Privacy Officers, Information Security Officers, Network Administrators, Security Device Administrators and Security Engineers

5 years of cumulative, paid, full time work experiences in 2 or more of the 8 domains of the (ISC)2 CISSP Common Body of Knowledge (CBK), 4 years for a four-year college degree.

CISSP exam duration is up to 6 hours. It contains 250 multiple choice and advanced innovative questions. The passing score is 700 out of 1000 points. Multiple languages available including English, French, German, Japanese, Simplified Chinese, Korean, Spanish, etc.

Candidate is required to sit for the exam at Pearson Vue Testing Center.

Singapore
  • 6, 7, 13, 14, 20 Apr 2019
  • 4, 5, 11, 12, 18 May 2019
  • 7,8,14,15,21 Sep 2019

Book Now

 









Duration:
5 Days

Course Fee

Original Course Fee $1,819.00
SME (Company Sponsored) Singaporean and Permanent Resident 1 $289.00
Singapore Citizens aged 40 years old and above 2 $289.00
Singapore Citizen and Permanent Resident aged 21 years old and above 3 $1,294.00
Singapore Citizen aged 35 years old and above, earning not more than $2,000 per month (WTS) 4 $204.00

1 Small and Medium Enterprises (SME) – sponsored Singapore Citizens and Permanent Residents.
2 Singapore Citizens aged ≥ 40 years.
3 All Singapore Citizens and Permanent Residents aged ≥ 21 years.
4 Singapore Citizens aged ≥ 35 years and earning ≤ $2,000/month.
* All fees are inclusive of GST.
UTAP Eligible Course – For all UTAP Member
NTUC members enjoy 50% *unfunded course fee support for up to $250 each year when you sign up for courses supported under UTAP. Funded amount varies.
Skillsfuture Credit
All WSG-SSG Funded course are eligible for Skillsfuture Credit. Singaporean Aged 25 and above are eligible to use their Skillsfuture credit for course enrolment.

Post-Secondary Education Account (PSEA)

All Singaporean below 31 years old and entitled to utilise their PSEA account for this following course.
Participant may also opt to utilise his/her sibling PSEA account balance (if there are insufficient balance in your account).

 

How to apply?

Certification Body
To assist professionals in preparing for ISC2 CISSP exam

PSEA

SSG

Need more information?

Categories: ITIL®Part Time

Related Courses