Certified Information Systems Security Professional (CISSP)
 /  Certified Information Systems Security Professional (CISSP)

The CISSP Prep. course was developed to meet current demands and the growing needs of the computer industry. This course provides the student with the level of knowledge needed as part of the (ISC)2 certification requirements for the Certified Information Systems Security Professional (CISSP) certification. This certification is rapidly becoming a requirement for employment with security tasks. Students gain a solid background on security concerns, communications, infrastructure, basic cryptography, and operations.

Introduction

  • Students & Trainer Introduction
  • Who Should take This Course?
  • About (ISC)2
  • CISSP Certification & Examination
  • CBK Review, Domain & Function Areas

Security and Risk Management
Understand and apply concepts of confidentiality, integrity and availability.
Evaluate and apply security governance principles
Determine Compliance Requirements
Understand legal a& regulatory issues that pertain to information security in a global context
Understand, Adhere to, and promote professional ethics
Develop, document, and implement security policy, standards, procedures, guidelines.
Identify, Analyze, and Prioritize Business Continuity (BC) requirements

Asset Security
Identify and classify information and assets
Determine and maintain Information & Asset Ownership
Protect Privacy
Ensure appropriate asset retention
Determine data security controls
Establish information and asset handling requirements

Security Architecture and Engineering
Implement & manage engineering processes using secure design principles
Understand the fundamental concepts of security models
Select controls based upon systems security requirement
Understand security capabilities of information systems
Assess and mitigate the vulnerabilities of security architecture, designs, and solution elements.
Assess and mitigate Vulnerabilities in web-based systems
Assess and mitigate vulnerability in mobile systems
Assess and mitigate vulnerabilities in embedded devices
Apply Cryptography
Apply security principles to site and facility design
Implement site and facility security controls

Communication and Network Security
Implement security design principles in network architectures
Secure network components
Implement secure communication channels according to Design

Identity and Access Management (IAM)
Control physical and logical access to assets
Manage identification and authentication of people, devices, and services
Integrate identity as a third-party service
Implement and manage authorization mechanisms
Manage the identity and access provisioning lifecycle

Security Assessment and Testing
Design and validate assessment, test, and audit strategies
Conduct security control testing
Collect security process data
Analyze test output and generate report
Conduct or facilitate security audits

Security Operations
Understand support investigations
Understand requirements for investigation types
Conduct logging and monitoring activities
Securely provisioning resources
Understand and apply foundational security operations concepts
Apply resource protection techniques
Conduct incident management
Operate and maintain detective and preventative measures
Implement and support patch and vulnerability management
Understand and participate in change management processes
Implement recovery strategies
Implement Disaster Recovery (DR) processes
Test Disaster Recovery Plans (DRP)
Participate in Business Continuity (BC) planning and exercises
Implement and manage physical security
Address personnel safety and security concerns

Software Development Security
Understand and integrate in the software development life cycle (SDLC)
Identify and apply security controls in development environments
Assess the effectiveness of software security
Assess security impact of acquired software
Define and apply secure coding guidelines and standards

This course is beneficial to IT consultants, Managers, Security Policy Writers, Privacy Officers, Information Security Officers, Network Administrators, Security Device Administrators and Security Engineers

5 years of cumulative, paid, full time work experiences in 2 or more of the 8 domains of the (ISC)2 CISSP Common Body of Knowledge (CBK), 4 years for a four-year college degree.

CISSP exam duration is up to 6 hours. It contains 250 multiple choice and advanced innovative questions. The passing score is 700 out of 1000 points. Multiple languages available including English, French, German, Japanese, Simplified Chinese, Korean, Spanish, etc.

Candidate is required to sit for the exam at Pearson Vue Testing Center.

Singapore
  • 7 – 11 Jan 2019
  • 11 – 15 Feb 2019
  • 4 – 8 Mar 2019
  • 8 – 12 Apr 2019
  • 27 – 31 May 2019
  • 10 – 14 Jun 2019
  • 1 – 5 Jul 2019
  • 29Jul – 2 Aug 2019
  • 2 – 5 Sep 2019
  • 14 – 18 Oct 2019
  • 11- 15 Nov 2019
  • 16 – 20 Dec 2019

Book Now

 









Book Online
Enquiry

  • Duration 5 Days

Course Fee

UTAP Eligible*
Original Course Fee
$1,819.00
SME (Company Sponsored) Singaporean and Permanent Resident 1
$289.00
Singapore Citizens aged 40 years old and above 2
$289.00
Singapore Citizen and Permanent Resident aged 21 years old and above 3
$1,294.00
Singapore Citizen aged 35 years old and above, earning not more than $2,000 per month (WTS) 4
$204.00
Certification Body: To assist professionals prepare for ISC2 CISSP Exam
This course is supported by
Need more information?

Related Courses