Cissp Certification Preparation, 5 days

If you are ready to take your security career to the next level, our Certified Information Systems Security Professional (CISSP) exam preparation course will help get you there. Get instruction from our experts with real-world experience as you cover all the material you need to be fully prepared for the (ISC)2 CISSP exam. Delegates will receive a copy of the CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide (8th Edition).

All courses are available online Enquire

Select an option to show pricing

Take this course live online

£1995

Enquire
Attend this course at our centre

£1995

Enquire
Have this course at your venue

£POA

Enquire
Enterprise Learning Subscription

£POA

Enquire

Course Dates

Mon, 30 Nov
Live Online
Enquire
Mon, 7 Dec
Live Online
Enquire
Mon, 14 Dec
Live Online
Enquire
Mon, 21 Dec
Live Online
Enquire
Download course details as a PDF

Key features

  • Fully certified trainer with real world experience
  • Get key skills and practical knowledge
  • This course is available live online, onsite, on demand, in person
  • Course materials included
  • Certificates for each participant

What will I learn?

Lesson 1

Test-Taking Tips and Study Techniques
Preparation for the CISSP Exam
Submitting Required Paperwork
Resources and Study Aids
Passing the Exam the First Time

Lesson 2

Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity)
Confidentiality, integrity, and availability concepts
Security governance principles
Compliance
Legal and regulatory issues
Professional ethic
Security policies, standards, procedures and guidelines

Lesson 3

Asset Security (Protecting Security of Assets)
Information and asset classification
Ownership (e.g. data owners, system owners)
Protect privacy
Appropriate retention
Data security controls
Handling requirements (e.g. markings, labels, storage)

Lesson 4

Security Engineering (Engineering and Management of Security)
Engineering processes using secure design principles
Security models fundamental concepts
Security evaluation models
Security capabilities of information systems
Security architectures, designs, and solution elements vulnerabilities
Web-based systems vulnerabilities
Mobile systems vulnerabilities
Embedded devices and cyber-physical systems vulnerabilities
Cryptography
Site and facility design secure principles
Physical security

Lesson 5

Communication and Network Security (Designing and Protecting Network Security)
Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
Secure network components
Secure communication channels
Network attacks

Lesson 6

Identity and Access Management (Controlling Access and Managing Identity)
Physical and logical assets control
Identification and authentication of people and devices
Identity as a service (e.g. cloud identity)
Third-party identity services (e.g. on-premise)
Access control attacks
Identity and access provisioning lifecycle (e.g. provisioning review)

Lesson 7

Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
Assessment and test strategies
Security process data (e.g. management and operational controls)
Security control testing
Test outputs (e.g. automated, manual)
Security architectures vulnerabilities

Lesson 8

Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)
Investigations support and requirements
Logging and monitoring activities
Provisioning of resources
Foundational security operations concepts
Resource protection techniques
Incident management
Preventative measures
Patch and vulnerability management
Change management processes
Recovery strategies
Disaster recovery processes and plans
Business continuity planning and exercises
Physical security
Personnel safety concerns

Lesson 9

Software Development Security (Understanding, Applying, and Enforcing Software Security)
Security in the software development lifecycle
Development environment security controls
Software security effectiveness
Acquired software security impact

Lesson 10

Review and Q&A Session
Final Review and Test Prep

Prerequisites
You must have a minimum of five years of direct full-time security work experience in two or more of these 8 domains of the (ISC)² CISSP CBK:
Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity)
Asset Security (Protecting Security of Assets)
Security Engineering (Engineering and Management of Security)
Communication and Network Security (Designing and Protecting Network Security)
Identity and Access Management (Controlling Access and Managing Identity)
Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)
Software Development Security (Understanding, Applying, and Enforcing Software Security)

Target Audience
IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers, and other security professionals whose positions require CISSP certification.

 

Download course details as a PDF


Interested in this course? Get in touch...

Call:
01225 308979

Email:
info@go.courses

Find us at:
Go Courses Ltd.
Kemp House
152 - 160 City Road
London
United Kingdom
EC1V 2NX

Registered Office:
Go Courses Ltd.
10 Laura Place
Bath
United Kingdom
BA2 4BL

View on a map

Blog

What is VMware used for?

VMware is a leading provider of cloud computing software and server applications for virtualisation. Read on to find out what VMware is used for, how easy it is to learn and get certified, and much more.

Blog

6 challenges of being a CISO - and which training courses will help?

Security breaches are a business owner’s worst nightmare and each year it’s becoming more important to protect data against cyber threats. As we move into 2020 there are a number of challenges that a CISO will likely face. Here are the top 5 challenges facing a CISO and the training options available.

Blog

How many days will it take to learn AWS?

Depending on how much experience you already have, it’s possible to learn AWS in 3 days with our instructor-led courses comprising of 18 hours of training. If you’re looking to gain AWS certification this will take a little longer, as you’ll also need to prepare for the exam.

Blog

General security training - what type of cyber security training do you need? Part 1

No business is safe from cybercrime, and cyberattacks can happen when you least expect it. But having the right training can prevent or fix all kinds of nightmare issues. Read on for a brief overview of 5 different cyber security courses available, so you can choose the right training course for you or your team members.

Blog

What type of cyber security training do you need? An overview of 10 types of cyber security training

Go.Courses have sourced dozens of the best cyber security training to help you if you’re an IT manager, the network infrastructure manager and everything in between. Read on for a brief overview of ten of our cyber security training course options.

Blog

Why 2019 was an important year for Microsoft Azure certifications

You may have heard about some changes in Microsoft Azure recently. Here’s an overview of what’s changing, how to adapt and embrace these changes, and why Azure could be the best option for your IT infrastructure in 2019 and beyond.

Blog

What is ITIL Foundation - and why your business needs it

You may be wondering how to ensure you’re using ITIL properly in your business and receiving the benefits from it. We’ll help you understand the foundation of ITIL, why your business really needs it, and how to get accredited.

Blog

How do I become AWS certified?

To prepare for an AWS exam to gain AWS certification, we recommend attending a training course in your chosen role. We offer a wide range of AWS training courses at Go.Courses.

Delighted satisfaction rating