________________________________________________________________
Do you want to take this course remotely or in person?
Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
________________________________________________________________
Course Description: CISSP Certification (Certified Information Systems Security Professional)
This course is taught in online mode and consists of 8 units.
The duration of the course is approximately 20 hours, which is distribute between content and collaboration tools. Upon completion, the student will receive an accrediting diploma .
Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .
The course is taught in tele-training modality (100% bonus option) and in-person and tele-in-person training actions can also be carried out on demand.
Introduction
The CISSP (Certified Information Systems Security Professional) certification, from (ISC2) , validates the technical and management knowledge of the information security professional to effectively design, build and manage the security of an organization.
The content of our course is based on the CBK (Common Body of Knowledge) of ISC2 and the 8 domains of CISSP covering all disciplines of Information security. Technical topics are included, such as access controls , Cryptography , as well as those related to risk management, compliance and security operations.
Addressed to
The course is aimed at consultants, auditors, managers, businessmen and people who wish to develop and deepen their skills and concepts in the field of information security.
Course content
Introduction: Concepts about ISC2 and CISSP Certification
Domain 1 -Security and risk management
- Information classification
- Policies
- Safety standards and regulations
- Roles and responsibilities
- Risk management
- Quantitative and qualitative analysis
- Change control
- Threat model
Domain 2 – Asset Security
- Asset evaluation
- computer architecture
- Protection Mechanisms
- Certification and accreditation
Domain 3 - Security and engineering architecture
- Security models
- Security architectures
- Cloud Computing
- Mobile Systems Cryptography
Domain 4 – Communications and network security
- Secure Design Principles
- Reference Model
- Cabling
- Topologies and Access Methods
- Secure network components
Domain 5 – Identity and Access Management
- Access controls
- Identification, authentication
- Authorization and audit (AAA)
- Biometric systems
- Single Sign On (SSO)
- Authorization mechanisms
Domain 6 – Security Assessment and Testing
- Threats and Attacks
- Business Impact Analysis (BIA)
- Business Continuity Plan (BCP) and Backups
- Documentation and Security Testing (pentesting)
Domain 7 – Security Operations
- Administrative Management and Controls
- Registration and Monitoring
- Redundancy and resource availability
- Incident Management
- Preventive and Detective Measures
- Recovery Strategies (DRP)
- Physical security
Domain 8 – Security in software development
- Common Problems in Application Development
- Application Development Models
- Software Capability Maturity Model (CMM)
- Databases
- Maintenance and Support
- Types of Malware and Attacks
Previous requirements
No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.
Rates
If you are interested in taking this course in any training modality, contact us to request an offer .