In-house Training
ISC2 CISSP Certified Information Systems Security Professional Course
Secure Your Future: Master Cybersecurity with Certified Information Systems Security Professional (CISSP) Certification
Overview
The Certified Information Systems Security Professional (CISSP) certification is a globally recognised credential that signifies expertise in designing, implementing, and managing a best-in-class cybersecurity program. With a CISSP, you demonstrate your ability to effectively design, manage, and oversee an organisation’s overall security posture, from governance and architecture to controls, operations, and compliance.
This comprehensive certification covers eight core domains of information security:
- Security and Risk Management: Essential security concepts, risk management techniques, and compliance issues.
- Asset Security: Protecting security of assets, information, and resources.
- Security Architecture and Engineering: Concepts, principles, structures, and standards used to design secure systems.
- Communication and Network Security: Designing and protecting network security.
- Identity and Access Management (IAM): Controlling access to protect information assets and systems.
- Security Assessment and Testing: Designing, performing, and analysing security testing.
- Security Operations: Foundational concepts, investigations, incident management, and disaster recovery.
- Software Development Security: Understanding, applying, and enforcing software security.
Professionals who earn their CISSP certification join an elite group of security leaders empowered to:
- Develop and manage organisational security practices.
- Understand and apply international security standards.
- Guide and direct policies and procedures with a deep knowledge of threats, laws, and regulations.
- Utilise a holistic approach to security that encompasses both operational and strategic applications.
Whether you are an IT manager, analyst, system engineer, or security consultant, a CISSP certification is your passport to achieving higher credibility, better opportunities, and increased job security in the field of information security.”
Who Should Attend?
Learning Outcomes
In-house Training
ISC2 CISSP Certified Information Systems Security Professional Course
Session details
- Equip yourself with essential exam skills
- Hands-on training customised to meet your business needs
- Award winning trainers
Level: Intermediate
Some familiarity with topic is recommended
Key Sessions
- Understand confidentiality, integrity, and availability concepts.
- Apply security governance principles and establish a compliance framework.
- Develop and implement documented security policies, standards, procedures, and guidelines.
- Understand legal and regulatory issues that pertain to information security in a global context.
- Manage data classification and data lifecycle processes to enhance confidentiality and value.
2. Asset Security
- Identify and classify information and assets to apply appropriate controls.
- Establish information and asset handling requirements to maintain information security.
- Ensure appropriate retention of information and disposal processes.
- Determine data security controls and compliance requirements.
- Protect privacy, ensuring proper storage and handling of sensitive information.
3. Security Architecture and Engineering
- Analyse and implement security designs in hardware, software, and network architecture.
- Assess and mitigate vulnerabilities in web-based systems, mobile systems, and other digital systems.
- Apply cryptography to protect data in transit, at rest, and in use.
- Understand principles of secure engineering and secure application design.
- Evaluate and apply security models to maintain system integrity.
4. Communication and Network Security
- Design and protect network architecture including IP networking, LANs, WANs, and remote access technology.
- Secure network components and implement secure communication channels.
- Manage secure network management and operational controls.
- Understand network attacks and apply defensive strategies.
- Implement secure network architecture concepts and systems design.
5. Identity and Access Management (IAM)
- Control physical and logical access to assets.
- Manage identification and authentication of people, devices, and services.
- Integrate identity as a third-party service (IDaaS, Federated Identity).
- Implement and manage authorisation mechanisms.
- Manage the identity and access provisioning lifecycle.
6. Security Assessment and Testing
- Design and validate assessment, test, and audit strategies to ensure proper security controls.
- Conduct security control testing and review of configuration and patch management processes.
- Perform vulnerability assessments and penetration testing.
- Use logging and monitoring activities to provide security analysis.
- Ensure the effectiveness of security controls through regular assessment and testing.
7. Security Operations
- Understand and support investigations according to incident response protocols.
- Manage physical security, personnel security, and the safe design of facilities.
- Apply resource protection techniques and manage incident response.
- Operate and configure technologies to detect and prevent attacks.
- Understand disaster recovery processes and develop disaster recovery plans.
8. Software Development Security
- Understand and integrate security in the Software Development Lifecycle (SDLC).
- Manage security risks in software development and enforce software security controls.
- Secure software applications by applying security best practices.
- Assess the security impact of acquired software and manage the security aspects of the end-user environment.
- Enforce compliance with secure coding standards and effectively manage software vulnerabilities.
Meet Your Facilitator
ISC2 Expert Speakers
More details coming soon
Get in touch today to find out more about this course.
Customised in-house options available for teams
Interested in any of our online trainings?
You can also choose to have them delivered in house. We will work closely with our inspiring session facilitators to tailor the content around the key development areas your team are prioritising, shape the learning outcomes around your core departmental challenges and make the most of your L&D and upskilling budget.
Enquire here for more informationCan't see what you need?
Download our training catalogue to review all available topics
Download full catalogue