In-house Training

ISC2 CISSP Certified Information Systems Security Professional Course

Secure Your Future: Master Cybersecurity with Certified Information Systems Security Professional (CISSP) Certification

Overview

The Certified Information Systems Security Professional (CISSP) certification is a globally recognised credential that signifies expertise in designing, implementing, and managing a best-in-class cybersecurity program. With a CISSP, you demonstrate your ability to effectively design, manage, and oversee an organisation’s overall security posture, from governance and architecture to controls, operations, and compliance.

This comprehensive certification covers eight core domains of information security:

  1. Security and Risk Management: Essential security concepts, risk management techniques, and compliance issues.
  2. Asset Security: Protecting security of assets, information, and resources.
  3. Security Architecture and Engineering: Concepts, principles, structures, and standards used to design secure systems.
  4. Communication and Network Security: Designing and protecting network security.
  5. Identity and Access Management (IAM): Controlling access to protect information assets and systems.
  6. Security Assessment and Testing: Designing, performing, and analysing security testing.
  7. Security Operations: Foundational concepts, investigations, incident management, and disaster recovery.
  8. Software Development Security: Understanding, applying, and enforcing software security.

Professionals who earn their CISSP certification join an elite group of security leaders empowered to:

  • Develop and manage organisational security practices.
  • Understand and apply international security standards.
  • Guide and direct policies and procedures with a deep knowledge of threats, laws, and regulations.
  • Utilise a holistic approach to security that encompasses both operational and strategic applications.

Whether you are an IT manager, analyst, system engineer, or security consultant, a CISSP certification is your passport to achieving higher credibility, better opportunities, and increased job security in the field of information security.”

Who Should Attend?

Chief Information Security Officer | Chief Information Officer | Director of Security | IT Director/Manager | Security Systems Engineer | Security Analyst | Security Manager | Security Auditor | Security Architect | Security Consultant | Network Architect

Learning Outcomes

Master foundational principles of information security, including confidentiality, integrity, and availability, and gain expertise in risk identification and mitigation strategies.
Learn to identify and classify information and assets, apply appropriate controls, and ensure compliance with legal and organisational requirements.
Develop skills in designing secure network architectures and implementing robust security mechanisms to prevent, detect, and mitigate attacks.
Acquire the ability to design and protect network security and manage secure communication channels across organisations.
Implement comprehensive strategies for identity management and access control, understanding authentication, authorisation, and session management.
Conduct security control testing, participate in risk assessments and audits, and master techniques for assessing and improving security measures within the organisation.

In-house Training

ISC2 CISSP Certified Information Systems Security Professional Course


Session details

  • Equip yourself with essential exam skills
  • Hands-on training customised to meet your business needs
  • Award winning trainers

Level: Intermediate

Some familiarity with topic is recommended

Key Sessions

1. Security and Risk Management
  • Understand confidentiality, integrity, and availability concepts.
  • Apply security governance principles and establish a compliance framework.
  • Develop and implement documented security policies, standards, procedures, and guidelines.
  • Understand legal and regulatory issues that pertain to information security in a global context.
  • Manage data classification and data lifecycle processes to enhance confidentiality and value.

2. Asset Security

  • Identify and classify information and assets to apply appropriate controls.
  • Establish information and asset handling requirements to maintain information security.
  • Ensure appropriate retention of information and disposal processes.
  • Determine data security controls and compliance requirements.
  • Protect privacy, ensuring proper storage and handling of sensitive information.

3. Security Architecture and Engineering

  • Analyse and implement security designs in hardware, software, and network architecture.
  • Assess and mitigate vulnerabilities in web-based systems, mobile systems, and other digital systems.
  • Apply cryptography to protect data in transit, at rest, and in use.
  • Understand principles of secure engineering and secure application design.
  • Evaluate and apply security models to maintain system integrity.

4. Communication and Network Security

  • Design and protect network architecture including IP networking, LANs, WANs, and remote access technology.
  • Secure network components and implement secure communication channels.
  • Manage secure network management and operational controls.
  • Understand network attacks and apply defensive strategies.
  • Implement secure network architecture concepts and systems design.

5. Identity and Access Management (IAM)

  • Control physical and logical access to assets.
  • Manage identification and authentication of people, devices, and services.
  • Integrate identity as a third-party service (IDaaS, Federated Identity).
  • Implement and manage authorisation mechanisms.
  • Manage the identity and access provisioning lifecycle.

6. Security Assessment and Testing

  • Design and validate assessment, test, and audit strategies to ensure proper security controls.
  • Conduct security control testing and review of configuration and patch management processes.
  • Perform vulnerability assessments and penetration testing.
  • Use logging and monitoring activities to provide security analysis.
  • Ensure the effectiveness of security controls through regular assessment and testing.

7. Security Operations

  • Understand and support investigations according to incident response protocols.
  • Manage physical security, personnel security, and the safe design of facilities.
  • Apply resource protection techniques and manage incident response.
  • Operate and configure technologies to detect and prevent attacks.
  • Understand disaster recovery processes and develop disaster recovery plans.

8. Software Development Security

  • Understand and integrate security in the Software Development Lifecycle (SDLC).
  • Manage security risks in software development and enforce software security controls.
  • Secure software applications by applying security best practices.
  • Assess the security impact of acquired software and manage the security aspects of the end-user environment.
  • Enforce compliance with secure coding standards and effectively manage software vulnerabilities.

Meet Your Facilitator

ISC2 Expert Speakers

More details coming soon

Get in touch today to find out more about this course.

Customised in-house options available for teams

Interested in any of our online trainings?

You can also choose to have them delivered in house. We will work closely with our inspiring session facilitators to tailor the content around the key development areas your team are prioritising, shape the learning outcomes around your core departmental challenges and make the most of your L&D and upskilling budget.

Enquire here for more information

Can't see what you need?

Download our training catalogue to review all available topics

Download full catalogue

Get in Touch

Empowering the public sector with meaningful actionable advice to help solve the problems worth solving. If you would like to do an in-house course, please get in touch.

Request the training catalogue

To receive a PDF copy of the Public Sector Academy training catalogue, please submit the details below:

By submitting your email address, you are consenting to Public Sector Network potentially reaching out to you about the academy offering.

Achieve great value with our customised subscription plans