All courses
All courses
Course categories
Contact us

CISSP Certified Information Systems Security Professional, 5 days

Delivered at your office or a training centre, in groups or 1-2-1

Aimed at seasoned security professionals, this course surveys the entire information security landscape and the technologies involved.

Check availability in your area…

Key features

  • Live instructor-led course with 30 hours of training
  • Session runs from 9.30–5pm with normal breaks included
  • Fully certified trainer
  • Get key skills and practical knowledge
  • This course is available for delivery at your office, 1-2-1 and groups – contact us
  • Course materials included
  • Recognised course certificate

What will I learn?

The course addresses the ten knowledge domains that comprise the common body of knowledge (CBK) for information systems security professionals and will help delegates prepare for CISSP certification.

The course offers a theory based approach to the security process, with opportunities to discuss the immediate application of concepts and techniques described in the CBK to the real world. It can be considered as providing a good introduction to security management, architecture and engineering.
The course comprises ten sessions that map directly to the (CBK), each one is theory based with instructor led discussions; there are no hands on labs.

Module 1: Access Control

•Identification, Authentication, Authorisation and Accounting
•Digital Identities
•SSO
•DAC, MAC and RBAC
•Accountability
•Data Classification
•Access Control Attacks
Module 2: Security Architecture and Design

•Computer Hardware
•Operating System Architecture
•Trusted Computing Base
•OS Modes and Protection Rings
•System Architecture Design
•Security Models
•Secure Modes of Operation
•System Evaluation
Module 3: Telecommunications and Network Security

•Network Attacks
•IP and TCP headers
•Firewalls
•DNS
•IPS and IDS
•IPSEC
•VPN’s
•Wireless
•Data Communications
Module 4: Cryptography

•Hashing
•Symmetric Encipher
•Asymmetric Encipher
•Certificates
•Signatures
•PKI Public Key Cryptography
•Stream and Block Ciphers
•Cryptographic attacks
Module 5: Information Security Governance and Risk Management

•Security Management
•Risk Management
•Information Security Policies
•Controls
•Awareness

Great course, the trainer was really professional”

Martin K

•Governance
Module 6: Application Security

•Design
•Software Development Lifecycle
•Development Methodologies
•System Modeling
•Coding Methodologies
•Application Infrastructure
•Application Design Best Practices
•Databases
•Web Applications
Module 7: Operations Security

•Operations
•Roles
•Monitoring
•Auditing
•Server Management
•Configuration Management
•Storage Media
•Data Leaks
Module 8: Physical Security

•Physical Threats
•Access Control
•Fire
•Comm.’s Room
•Locks and Keys
•Utilities
Module 9: Business Continuity and Disaster Recovery Planning

•Project Plan
•Recovery and Continuity Planning
•Business Impact Analysis
•Disaster Recovery and Continuity
•Backup and DR Sites
•Drills and Tests
•Crisis
•High Availability
•Lifecycle of Recovery
Module 10: Legal, Regulations, Compliance and Investigation

•Types of Law
•Data Protection Act
•Privacy
•Intellectual Property
•Investigations
•Hackers
•Ethics
•PCI

 

Download course details as a PDF

Interested in this course? Get in touch...

Call:
01225 308979

Email:
info@go.courses

Find us at:
Go Courses Ltd.
Kemp House
152 - 160 City Road
London
United Kingdom
EC1V 2NX

Registered Office:
Go Courses Ltd.
10 Laura Place
Bath
United Kingdom
BA2 4BL

View on a map

Blog

6 challenges of being a CISO - and which training courses will help?

Security breaches are a business owner’s worst nightmare and each year it’s becoming more important to protect data against cyber threats. As we move into 2020 there are a number of challenges that a CISO will likely face. Here are the top 5 challenges facing a CISO and the training options available.

Blog

What type of cyber security training do you need? An overview of 10 types of cyber security training

Go.Courses have sourced dozens of the best cyber security training to help you if you’re an IT manager, the network infrastructure manager and everything in between. Read on for a brief overview of ten of our cyber security training course options.

Blog

General security training - what type of cyber security training do you need? Part 3

Cyber security training can help you respond and resolve problems quickly and easily. Read on for a brief overview of 5 cyber security courses, so you can choose the right training course for you or your team members.

Blog

General security training - what type of cyber security training do you need? Part 2

Cyber security training can help you respond and resolve problems quickly and easily. Read on for a brief overview of 5 cyber security courses, so you can choose the right training course for you or your team members.

Blog

General security training - what type of cyber security training do you need? Part 1

No business is safe from cybercrime, and cyberattacks can happen when you least expect it. But having the right training can prevent or fix all kinds of nightmare issues. Read on for a brief overview of 5 different cyber security courses available, so you can choose the right training course for you or your team members.

Blog

Is Microsoft Azure Certification worth it?

With Microsoft Azure Certification, technology professionals are more likely to get hired, demonstrate clear business impact, and advance their careers. Microsoft Azure courses are available in locations all over the UK. Here’s an overview of the Microsoft Azure Solutions Architect Technologies AZ-300 course which will help you achieve Azure Certification.

Delighted satisfaction rating