CISSP Course

Course Fee £1899.00 *Including VAT

Learn Hands-On Training

Course Material

Small Class Size

Exam Preparation

Course Completion Certificate

Tutor-Led Classes

Free Re-Training

Tutor Imparting Real-World Experience

Easy Location Accessible By Public Transport

Mode:

Classroom / Online

Classroom

Small class room

Online

Virtual-Live/ Full Support

Exclusive

1-2-1/Tailofred

Certified Information Systems Security Professional Training (CISSP)

Course description

Certified Information Systems Security Professional (CISSP) is a certification for advanced IT professionals. who want to demonstrate their skills in designing, implementing, and managing a cybersecurity program at the enterprise level. It is designed to provide a deep understanding of the Information Systems Security process and how to apply this process practically to real-life scenarios.

Mindqube Limited has designed this course to prepare the participants for the certification of Certified Information Systems Security Professional (CISSP) which provides the required skills and knowledge of the eight fundamentals.

Suitability - Who should attend?

This course is suitable for all levels.

Career Prospect

Network Security analyst

Network Security Engineer

Network Support Engineer

Schedule

Start Date End Date Timing Days Duration Mode
06/03/2023 06/05/2023 10:00 – 18:00 Monday Only 1 Day Classroom Based RESERVE NOW BOOK NOW
12/06/2023 12/08/2023 10:00 – 18:00 Monday Only 1 Day Classroom Based RESERVE NOW BOOK NOW
14/08/2023 14/10/2023 10:00 – 18:00 Monday Only 1 Day Classroom Based RESERVE NOW BOOK NOW
20/11/2023 20/12/2023 10:00 – 18:00 Monday Only 1 Day Classroom Based RESERVE NOW BOOK NOW

Schedule

Start Date :

06/03/2023

End Date :

06/05/2023

Timing :

10:00 – 18:00

Days :

Monday Only

Duration :

1 Day

Mode :

Classroom Based


Start Date :

12/06/2023

End Date :

12/08/2023

Timing :

10:00 – 18:00

Days :

Monday Only

Duration :

1 Day

Mode :

Classroom Based

Course Content

This course consists of 8 Domains.

This course covers the following topics:

1: Security and Risk Management

● Understand and Apply the Concepts of Confidentiality, Integrity, and Availability

● Evaluate and Apply Security Governance Principles

● Develop, Document, and Implement Security Policies, Standards, Procedures, and Guidelines

● Understand and Apply Threat Modelling Concepts and Methodologies

● Contribute to and Enforce Personnel Security Policies and Procedures

● Understand and Apply Risk Management Concepts

● Establish and Maintain a Security Awareness, Education, and Training Program

● Identify, Analyse and Prioritise Business Continuity Requirements

● Determine Compliance Requirements

● Understand legal and Regulatory Issues that Pertain to Information Security in a Global Context

2: Asset Security

● Identify and Classify Information and Assets

● Determining Ownership

● Using Security Baselines

● Protect Privacy

3: Security Architecture and Engineering

● Implement and Manage Engineering Processes Using Secure Design Principles

● Understand The Fundamental Concepts of Security Models

● Select Controls Based Upon Systems Security Requirements

● Understand the Security Capabilities of Information Systems

● Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, And Solution Elements

● Assess and Mitigate Vulnerabilities in Web-Based Systems, Mobile Systems, and Embedded Devices

● Apply Cryptography

● Apply Security Principles to Site and Facility Design

● Implement Site and Facility Security Controls

4: Communication and Network Security

● Implement Secure Design Principles in Network Architectures

● Secure Network Components

● Implement Secure Communication Channels According to Design

5: Identity and Access Management (IAM)

● Managing Identity and Authentication

● Controlling and Monitoring Access

6: Security Assessment and Testing

● Security Audit

● Performing Vulnerability Assessments

● Penetration Testing

● Log Reviews

● Synthetic Transactions

● Code Review and Testing

● Interface Testing

● Misuse Case Testing

● Test Coverage Analysis

● Collect Security Process Data

● Analyse Test Output and Generate Report

7: Security Operations

● Understand and Support Investigations

● Conduct Logging and Monitoring Activities

● Securely Provisioning Resources

● Understand and Apply Foundational Security Operations Concepts

● Apply Resource Protection Techniques

● Conduct Incident Management

● Operate and Maintain Detective and Preventative Measures

● Implement and Support Patch and Vulnerability Management

● Understand and Participate in Change Management Processes

● Implement Recovery Strategies

● Implement Disaster Recovery Processes

● Test Disaster Recovery Plans

● Implement and Manage Physical Security

● Address Personnel Safety and Security Concerns

8: Software Development Security

● Introducing Systems Development Controls

● Lifecycle Models

● Change and Configuration Management

● DevOps Approach

● Application Programming Interfaces

● Software Testing

● Code Repositories

● Service-Level Agreements

● Establishing Databases and Data Warehousing

● Database Management System Architecture

● Understanding Knowledge-Based System

HARDWARE

Identifying, using, and connecting hardware components and devices, including the broad knowledge about different devices that is now necessary to support the remote workforce

OPERATING SYSTEMS

Install and support Windows OS including command line & client support. System configuration imaging and troubleshooting for Mac OS, Chrome OS, Android and Linux OS.

SOFTWARE TROUBLESHOOTING

Troubleshoot PC and mobile device issues including common OS, malware and security issues.

NETWORKING

Explain types of networks and connections including TCP/IP, WIFI and SOHO

TROUBLESHOOTING

Troubleshoot real-world device and network issues quickly and efficiently

SECURITY

Identify and protect against security vulnerabilities for devices and their network connections

MOBILE DEVICES

Install & configure laptops and other mobile devices and support applications to ensure connectivity for end- users

VIRTUALIZATION & CLOUD COMPUTING

Compare & contrast cloud computing concepts & set up client-side virtualization

OPERATIONAL PROCEDURES

Follow best practices for safety, environmental impacts, and communication and professionalism

Enquire Now

Do You Have Questions ?

We'll help you to grow your career and growth.
Contact Us Today

Enquire Now