Classroom
Small class room
Online
Virtual-Live/ Full Support
Exclusive
1-2-1/Tailofred
Certified Information Systems Security Professional Training (CISSP)
Course description
Certified Information Systems Security Professional (CISSP) is a certification for advanced IT professionals. who want to demonstrate their skills in designing, implementing, and managing a cybersecurity program at the enterprise level. It is designed to provide a deep understanding of the Information Systems Security process and how to apply this process practically to real-life scenarios.
Mindqube Limited has designed this course to prepare the participants for the certification of Certified Information Systems Security Professional (CISSP) which provides the required skills and knowledge of the eight fundamentals.
Suitability - Who should attend?
This course is suitable for all levels.
Career Prospect
Network Security analyst
Network Security Engineer
Network Support Engineer
Our Training Benefits Include:
Benefit from our value-added features:
Schedule
Start Date | End Date | Timing | Days | Duration | Mode | ||
---|---|---|---|---|---|---|---|
06/03/2023 | 06/05/2023 | 10:00 – 18:00 | Monday Only | 1 Day | Classroom Based | RESERVE NOW | BOOK NOW |
12/06/2023 | 12/08/2023 | 10:00 – 18:00 | Monday Only | 1 Day | Classroom Based | RESERVE NOW | BOOK NOW |
14/08/2023 | 14/10/2023 | 10:00 – 18:00 | Monday Only | 1 Day | Classroom Based | RESERVE NOW | BOOK NOW |
20/11/2023 | 20/12/2023 | 10:00 – 18:00 | Monday Only | 1 Day | Classroom Based | RESERVE NOW | BOOK NOW |
Schedule
Start Date :
06/03/2023
End Date :
06/05/2023
Timing :
10:00 – 18:00
Days :
Monday Only
Duration :
1 Day
Mode :
Classroom Based
Start Date :
12/06/2023
End Date :
12/08/2023
Timing :
10:00 – 18:00
Days :
Monday Only
Duration :
1 Day
Mode :
Classroom Based
Course Content
This course consists of 8 Domains.
This course covers the following topics:
1: Security and Risk Management
● Understand and Apply the Concepts of Confidentiality, Integrity, and Availability
● Evaluate and Apply Security Governance Principles
● Develop, Document, and Implement Security Policies, Standards, Procedures, and Guidelines
● Understand and Apply Threat Modelling Concepts and Methodologies
● Contribute to and Enforce Personnel Security Policies and Procedures
● Understand and Apply Risk Management Concepts
● Establish and Maintain a Security Awareness, Education, and Training Program
● Identify, Analyse and Prioritise Business Continuity Requirements
● Determine Compliance Requirements
● Understand legal and Regulatory Issues that Pertain to Information Security in a Global Context
2: Asset Security
● Identify and Classify Information and Assets
● Determining Ownership
● Using Security Baselines
● Protect Privacy
3: Security Architecture and Engineering
● Implement and Manage Engineering Processes Using Secure Design Principles
● Understand The Fundamental Concepts of Security Models
● Select Controls Based Upon Systems Security Requirements
● Understand the Security Capabilities of Information Systems
● Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, And Solution Elements
● Assess and Mitigate Vulnerabilities in Web-Based Systems, Mobile Systems, and Embedded Devices
● Apply Cryptography
● Apply Security Principles to Site and Facility Design
● Implement Site and Facility Security Controls
4: Communication and Network Security
● Implement Secure Design Principles in Network Architectures
● Secure Network Components
● Implement Secure Communication Channels According to Design
5: Identity and Access Management (IAM)
● Managing Identity and Authentication
● Controlling and Monitoring Access
6: Security Assessment and Testing
● Security Audit
● Performing Vulnerability Assessments
● Penetration Testing
● Log Reviews
● Synthetic Transactions
● Code Review and Testing
● Interface Testing
● Misuse Case Testing
● Test Coverage Analysis
● Collect Security Process Data
● Analyse Test Output and Generate Report
7: Security Operations
● Understand and Support Investigations
● Conduct Logging and Monitoring Activities
● Securely Provisioning Resources
● Understand and Apply Foundational Security Operations Concepts
● Apply Resource Protection Techniques
● Conduct Incident Management
● Operate and Maintain Detective and Preventative Measures
● Implement and Support Patch and Vulnerability Management
● Understand and Participate in Change Management Processes
● Implement Recovery Strategies
● Implement Disaster Recovery Processes
● Test Disaster Recovery Plans
● Implement and Manage Physical Security
● Address Personnel Safety and Security Concerns
8: Software Development Security
● Introducing Systems Development Controls
● Lifecycle Models
● Change and Configuration Management
● DevOps Approach
● Application Programming Interfaces
● Software Testing
● Code Repositories
● Service-Level Agreements
● Establishing Databases and Data Warehousing
● Database Management System Architecture
● Understanding Knowledge-Based System
HARDWARE
Identifying, using, and connecting hardware components and devices, including the broad knowledge about different devices that is now necessary to support the remote workforce
OPERATING SYSTEMS
Install and support Windows OS including command line & client support. System configuration imaging and troubleshooting for Mac OS, Chrome OS, Android and Linux OS.
SOFTWARE TROUBLESHOOTING
Troubleshoot PC and mobile device issues including common OS, malware and security issues.
NETWORKING
Explain types of networks and connections including TCP/IP, WIFI and SOHO
TROUBLESHOOTING
Troubleshoot real-world device and network issues quickly and efficiently
SECURITY
Identify and protect against security vulnerabilities for devices and their network connections
MOBILE DEVICES
Install & configure laptops and other mobile devices and support applications to ensure connectivity for end- users
VIRTUALIZATION & CLOUD COMPUTING
Compare & contrast cloud computing concepts & set up client-side virtualization
OPERATIONAL PROCEDURES
Follow best practices for safety, environmental impacts, and communication and professionalism