COURSES

Home   /   Courses   /   (ISC)² Certified Information Systems Security Professional (CISSP) Training

(ISC)² Certified Information Systems Security Professional (CISSP) Training

Leadership and Operations

This course is designed for information security professionals with deep technical and managerial knowledge and experience to effectively design, engineer and manage the overall security posture of an organization. This training course provides a comprehensive review of information systems security concepts and industry best practices, covering the following eight domains of the CISSP Common Body of Knowledge (CBK®).

Course Objectives

At the end of this course, learners will be able to:

  • Apply fundamental concepts and methods related to the fields of information technology and security
  • Align overall organizational operational goals with security functions and implementations
  • Determine how to protect assets of the organization as they go through their lifecycle
  • Leverage the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability
  • Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures
  • Explain the importance of cryptography and the security services it can provide in today’s digital and information age
  • Evaluate the physical security elements relative to information system needs
  • Evaluate the elements that comprise communication and network security relative to information security needs
  • Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1-7 to meet information security needs
  • Determine appropriate access control models to meet business security requirements
  • Apply physical and logical access controls models to meet information security needs
  • Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements
  • Apply appropriate security controls and countermeasures to optimize an organization’s operation function and capacity
  • Assess information systems risks to an organization’s operational endeavors
  • Determine appropriate controls to mitigate specific threats and vulnerabilities
  • Apply information systems security concepts to mitigate the risk of software and systems vulnerabilities through the systems’ lifecycles

Who Should Attend

The course is ideal for those working in positions such as, but not limited to:

  • Chief Information Officer
  • Chief Information Security Officer
  • Chief Technology Officer
  • Compliance Manager/Officer
  • Director of Security
  • Information Architect
  • IT Specialist/Director/Manager
  • Information Manager/Information Risk Manager or Consultant
  • Security Administrator
  • Security Architect/Analyst
  • Security Consultant
  • Security Manager
  • Security Systems Engineer/Security Engineer

Course Agenda

  • Chapter 1: The Information Security Environment
  • Chapter 2: Information Asset Security
  • Chapter 3: Identity and Access Management
  • Chapter 4: Security Architecture and Engineering
  • Chapter 5: Communication and Network Security
  • Chapter 6: Software Development Security
  • Chapter 7: Security Assessment and Testing
  • Chapter 8: Security Operations
  • Chapter 9: Putting It All Together
  • Chapter 10: CISSP Certification Information

Note: Throughout this course, exam domains may be covered in several chapters. Included in the course is a table indicating where the exam outline objectives are covered within the course. Unique icons are also used through the course materials to identify exam outline objectives.

Features of the course vary by delivery method and include:

  • Official (ISC)² course materials
  • Instruction by an (ISC)² authorized instructor (classroom and online instructor-led only)
  • Learner support by an (ISC)² authorized instructor (self-paced only)
  • Peer to peer discussions (classroom and online instructor-led only)
  • Learning activities that include case studies and a course-wide applied scenario
  • Interactive flash cards
  • Post-course assessment
  • Glossary

Course Delivery Methods

  • Classroom-Based – our Official (ISC)² Training Partners in Australia offer a range of in-person or online, instructor-led exam prep courses in your local time zone.
  • Online Instructor-Led – live online training offered over the course of 4-5 days or 2x/week for 6-8 weeks with an (ISC)² Authorized Instructor
  • Online Self-Paced – pre-recorded course for students to learn at their own pace
  • Private On-Site/Online – private in-person/virtual training for 6 or more people with an (ISC)² Authorized Instructor

Recognition

Did you know? Our certifications are accredited, recognized and endorsed by leading organizations around the world. The CISSP is recognized as a relevant certification for cybersecurity professionals in the Australian Signals Directorate (ASD) Cyber Skills Framework. It is also a recognized pre-qualifier for eligibility into the Information Security Registered Assessor Program (IRAP).

SHARE:

About the Provider

ISC2
ISC2 is an international nonprofit membership association focused on inspiring a safe and secure cyber world. ISC2 is best known for the acclaimed CISSP.

TOPICS

CISSP, Cybersecurity, Information Security