Categories

Certified Information Systems Security Professional (CISSP)


Summary

The Certified Information Systems Security Professional (CISSP) course offered by The British Academy for Training and Development is designed for professionals looking to achieve the highest level of certification in information security. The CISSP is globally recognized as the premier certification for individuals in the information security profession, and it covers essential concepts and practices to effectively design, implement, and manage a cybersecurity program. In this course, participants will acquire an in-depth understanding of the eight domains of the CISSP CBK (Common Body of Knowledge), ensuring they are fully prepared for the CISSP exam. Through a comprehensive curriculum that covers various security principles, risk management strategies, and technical know-how, this course empowers participants to protect their organizations from a wide range of cybersecurity threats.

Objectives and target group

Who Should Attend?

  • Information security managers and directors.
  • IT professionals who aim to advance their careers in cybersecurity.
  • Network security engineers and professionals.
  • IT auditors and risk management professionals.
  • Consultants involved in cybersecurity and information systems.
  • Professionals seeking to earn the CISSP certification to enhance their skills and career.

Knowledge and Benefits:

After completing the program, participants will be able to master the following:

  • Gain a comprehensive understanding of the eight domains of the CISSP CBK.
  • Be well-prepared to pass the CISSP certification exam.
  • Learn to implement, manage, and assess security policies and procedures.
  • Understand the critical aspects of risk management and its application in cybersecurity.
  • Develop advanced skills to protect organizational information and mitigate security risks effectively.

Course Content

Introduction to Information Security and CISSP Overview

  • Overview of CISSP Certification
    • What is CISSP and its significance in the cybersecurity field.
    • Key concepts of information security.
    • Requirements and process of becoming CISSP certified.
  • CISSP Code of Ethics
    • Understanding the ethical principles of the CISSP certification.
    • Application of the Code of Ethics in the professional environment.
    • Handling conflicts of interest in cybersecurity.
  • Information Security Governance
    • Introduction to security governance and its importance.
    • Aligning security governance with business goals.
    • Frameworks and standards for security governance.

Security and Risk Management

  • Security Governance Principles
    • Governance structures in organizations.
    • Security roles and responsibilities.
    • Risk management frameworks and methodologies.
  • Compliance and Legal Considerations
    • Overview of relevant legal frameworks and regulations (e.g., GDPR, HIPAA).
    • Managing security compliance and audits.
    • Data privacy laws and their impact on cybersecurity.
  • Risk Management
    • Risk assessment and analysis techniques.
    • Risk mitigation strategies.
    • Business continuity and disaster recovery planning.

Asset Security

  • Information Classification and Handling
    • Techniques for classifying information assets.
    • Best practices for protecting sensitive data.
    • Data storage and transmission security.
  • Asset Security Management
    • Asset management policies and procedures.
    • Physical and logical access controls.
    • Protecting intellectual property and proprietary information.
  • Data Security Lifecycle
    • The lifecycle of data from creation to destruction.
    • Techniques for secure data disposal.
    • Data protection during transit and at rest.

Security Architecture and Engineering

  • Security Models and Architectures
    • Key security models: Bell-LaPadula, Biba, and Clark-Wilson.
    • Designing secure system architectures.
    • Security principles in system design and implementation.
  • Cryptography
    • Fundamentals of cryptography and its role in security.
    • Cryptographic algorithms and protocols.
    • Managing and implementing cryptographic systems.
  • Security in Network Design and Communication
    • Network security architecture and protocols.
    • Secure design principles for network systems.
    • Role of firewalls, VPNs, and intrusion detection systems.

Communication and Network Security

  • Network Security Fundamentals
    • Principles of network security and architecture.
    • Identifying and mitigating network vulnerabilities.
    • Network perimeter defenses and intrusion prevention.
  • Network Security Protocols
    • Understanding and implementing common security protocols (e.g., IPsec, SSL/TLS).
    • Securing wireless networks and remote access.
    • Techniques for securing network communications.
  • Secure Network Architecture and Design
    • Design considerations for secure network infrastructure.
    • Best practices for segmenting and securing network traffic.
    • Network monitoring and traffic analysis.

Identity and Access Management (IAM)

  • Access Control Models and Mechanisms
    • Understanding access control principles and models.
    • Role-based access control (RBAC) and attribute-based access control (ABAC).
    • Implementing multi-factor authentication and single sign-on (SSO).
  • Identity Management Systems
    • Technologies for managing identities (e.g., LDAP, Active Directory).
    • User lifecycle management and provisioning.
    • Protecting user credentials and authentication systems.
  • Authorization and Access Control Strategies
    • Techniques for implementing least privilege access.
    • Monitoring and auditing access control systems.
    • Managing privileged accounts and access rights.

Security Assessment and Testing

  • Security Assessment Techniques
    • Overview of vulnerability assessments and penetration testing.
    • Risk-based testing approaches.
    • Tools for conducting security assessments.
  • Security Testing Methodologies
    • Best practices for vulnerability scanning and testing.
    • How to perform effective penetration tests and system audits.
    • Post-assessment reporting and remediation.
  • Security Monitoring
    • Importance of continuous monitoring and incident response.
    • Setting up and managing Security Information and Event Management (SIEM) systems.
    • Identifying and responding to security incidents in real time.

Security Operations

  • Security Operations Principles
    • Key principles for running secure and resilient operations.
    • Security incident management and response strategies.
    • Handling security breaches and data leaks.
  • Incident Response and Recovery
    • Incident response planning and execution.
    • Crisis management and post-incident analysis.
    • Business continuity and disaster recovery planning.
  • Security Operations Monitoring
    • Implementing security operations centers (SOCs).
    • Real-time security monitoring and threat intelligence.
    • Analyzing and responding to security threats and incidents.

Software Development Security

  • Secure Software Development Lifecycle (SDLC)
    • Security considerations in each phase of the SDLC.
    • Integrating security practices into the software development process.
    • Techniques for secure coding and testing.
  • Application Security Threats and Mitigations
    • Common application security vulnerabilities (e.g., SQL injection, cross-site scripting).
    • Best practices for securing applications and software systems.
    • Tools and techniques for vulnerability scanning in applications.
  • Software Security Tools and Techniques
    • Using automated tools to detect vulnerabilities in software.
    • Threat modeling and risk assessment for applications.
    • Techniques for patching and securing software systems.

Final Review and CISSP Exam Preparation

  • Review of Key CISSP Concepts
    • Recap of the eight CISSP domains and essential concepts.
    • Key areas of focus for CISSP exam preparation.
    • Review of sample questions and answers.
  • Exam Preparation Tips and Strategies
    • Techniques for effectively preparing for the CISSP exam.
    • Time management strategies for exam day.
    • Addressing common challenges in the CISSP exam.
  • Final Q&A and Discussion
    • Clarification of any remaining doubts.
    • Final review of any weak areas.
    • Strategies for continuous learning and professional growth in cybersecurity.

Course Date

2025-04-28

2025-07-28

2025-10-27

2026-01-26

Course Cost

Note / Price varies according to the selected city

Members NO. : 1
£4500 / Member

Members NO. : 2 - 3
£3600 / Member

Members NO. : + 3
£2790 / Member

Related Course

London
Approved

RHCE on RHEL8

2025-10-20

2026-01-19

2026-04-20

2026-07-20

£5400 £5400

$data['course']