Call us: 0800 0353 257
Email us: info@trainingdeals.co.uk
For all your training needs.
Lines are open 24 Hours, Monday to Sunday

Certified Information Systems Security Professional Training

CISSP is an independent information security certification which is designed to measure knowledge of eight information security domains known as the Common Body of Knowledge (CBK).
 
  • Our CISSP training courses include everything required to pass the CISSP exam and master the Common Body of Knowledge
  • Boost your information security career with a CISSP qualification, the gold standard in vendor-neutral information security certification
  • Certified CISSPs are highly respected for their skills and knowledge of information security and can earn high salaries
  • Enrol today and receive expert tuition from trusted CISSP trainers with years of industry experience
 

 

Browse our list of upcoming courses below

Book Online or Call 0800 0353 257 to speak to a training advisor

Course Date Venue Duration Price Book Online
CISSP Certified Information Systems Security Professional 21/08/2017 Birmingham 5 days £1475 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 London 5 days £1475£995 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Dublin 5 days €2005 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Hinckley 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Leicester 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Crewe 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Darlington 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Preston 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Northampton 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Warrington 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Derby 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Bromley 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Worcester 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Wolverhampton 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Warwick 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Stoke-on-Trent 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Buxton 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Solihull 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Corby 5 days £2505 Book OnlineEnquire
CISSP Certified Information Systems Security Professional 04/09/2017 Coventry 5 days £2505 Book OnlineEnquire
Previous Page Page 1 of 11
Next Page

FAQs

  • What time shall I arrive at the venue?

    Please arrive at the venue for 08:45am

  • What are the pre-requisites?

    Candidates attending this course should have the following experience: Five years full-time paid work experience Or Four years’ experience with an information security university degree in 2 or more of the following domains in CISSP: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

  • What is the duration of the course?

    5 days

  • Do I need to bring anything with me to the course?

    Note pad and pen

  • How long until I receive the course confirmation details?

    Once your booking has been placed and confirmed, you will receive an email which contains your course location, course overview, pre-course reading material (if required), course agenda and payment receipts

  • What is the experience of the instructor(s) delivering my course?

    All of our instructors are fully accredited and have over ten years of experience

Overview

Introduction

The Certified Information Systems Security Professional course is for candidates looking to gain knowledge and skills over 5 days. This course will help candidates gain professional qualifications. Certified Information systems is for those working in information security design focused environments looking to gain new attributes.

Candidates will learn how to apply appropriate retention and security controls. The trainer will give candidates an insight in how to handle requirements with markings and labels.

Pre-Requisites

Candidates attending this course should have the following experience:

  • Five years full-time paid work experience

Or

  • Four years’ experience with an information security university degree in 2 or more of the following domains in CISSP:
  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Who should attend?

  • This course should be attended by candidates interested in Information security.

Course structure

  • Classroom training (5 days)

(Exam is separate from this course)

Exam Structure

  • The exam is booked separately and is taken at a Pearson Vue Test Centre
  • Multiple choice
  • 6 hours
  • 250 questions
  • Computer-based
  • Pass mark  700/1000

What will you learn?                                          

  • How to apply appropriate retention and security controls
  • How to handle requirements with markings and labels
  • How to use the correct protection principles
  • How to evaluate security models
  • How to manage web-based and mobile system vulnerable
  • How to embed system vulnerabilities

Course Outline

Introduction

Security and Risk Management

  • Availability concepts
  • Governance principles
  • Compliance
  • Legal issues
  • Regulatory issues
  • Professional ethic
  • Security policies
  • Standards
  • Procedures
  • Guidelines

Asset Security

  • Information classification
  • Asset classification
  • Ownership
  • Privacy protecting
  • Retention
  • Data security controls
  • Handling requirements

Security Engineering

  • Engineering processes
  • Design principles
  • Fundamental concepts
  • Evaluation models
  • Information systems
  • Security capabilities
  • Security architecture
  • Mobile systems
  • Embedded devices
  • System vulnerabilities
  • Cryptography
  • Site design
  • Facility design
  • Physical security

Communication and network security

  • Secure network architecture
  • Network components
  • Communication channels
  • Network attacks

Identity and access management

  • Logical asset control
  • Identification
  • Authentication
  • Service identity
  • Third-party identity services
  • Control attacks
  • Identity lifecycle
  • Access lifecycle

Security assessment

  • Assessment strategies
  • Test strategies
  • Process data
  • Control testing
  • Test outputs
  • Security architectures

Security Operations

  • Investigating support and requirements
  • Logging and monitoring activities
  • Provisioning of resources
  • Foundational security concepts
  • Resource protection techniques
  • Incident management
  • Preventative measures
  • Vulnerability management
  • Change management processes
  • Recovery strategies
  • Disaster recovery processes
  • Business continuity planning
  • Physical security
  • Personnel safety concerns

Software Development Security

  • Security in the software development lifecycle
  • Development environment security controls
  • Software security effectiveness
  • Acquired software security impact

Conclusion 

What's Included

  • Courseware Book
  • Certificate
  • Experienced instructor
  • Refreshments 

 

Testimonials

There hasn't been any testimonials submitted to this topic

Video

We do not currently have a video for this topic

Special Bundle Offers

Choose a learning package and
start learning today!

View deals

Onsite offers

Send us your onsite requirements and we will provide a tailor made course for you!

Contact

T.  0800 0353 257
E: info@trainingdeals.co.uk

1 Bell Street, Maidenhead, Berkshire, SL6 1BU

Introduction

The Certified Information Systems Security Professional course is for candidates looking to gain knowledge and skills over 5 days. This course will help candidates gain professional qualifications. Certified Information systems is for those working in information security design focused environments looking to gain new attributes.

Candidates will learn how to apply appropriate retention and security controls. The trainer will give candidates an insight in how to handle requirements with markings and labels.

Pre-Requisites

Candidates attending this course should have the following experience:

  • Five years full-time paid work experience

Or

  • Four years’ experience with an information security university degree in 2 or more of the following domains in CISSP:
  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Who should attend?

  • This course should be attended by candidates interested in Information security.

Course structure

  • Classroom training (5 days)

(Exam is separate from this course)

Exam Structure

  • The exam is booked separately and is taken at a Pearson Vue Test Centre
  • Multiple choice
  • 6 hours
  • 250 questions
  • Computer-based
  • Pass mark  700/1000

What will you learn?                                          

  • How to apply appropriate retention and security controls
  • How to handle requirements with markings and labels
  • How to use the correct protection principles
  • How to evaluate security models
  • How to manage web-based and mobile system vulnerable
  • How to embed system vulnerabilities

Course Outline

Introduction

Security and Risk Management

  • Availability concepts
  • Governance principles
  • Compliance
  • Legal issues
  • Regulatory issues
  • Professional ethic
  • Security policies
  • Standards
  • Procedures
  • Guidelines

Asset Security

  • Information classification
  • Asset classification
  • Ownership
  • Privacy protecting
  • Retention
  • Data security controls
  • Handling requirements

Security Engineering

  • Engineering processes
  • Design principles
  • Fundamental concepts
  • Evaluation models
  • Information systems
  • Security capabilities
  • Security architecture
  • Mobile systems
  • Embedded devices
  • System vulnerabilities
  • Cryptography
  • Site design
  • Facility design
  • Physical security

Communication and network security

  • Secure network architecture
  • Network components
  • Communication channels
  • Network attacks

Identity and access management

  • Logical asset control
  • Identification
  • Authentication
  • Service identity
  • Third-party identity services
  • Control attacks
  • Identity lifecycle
  • Access lifecycle

Security assessment

  • Assessment strategies
  • Test strategies
  • Process data
  • Control testing
  • Test outputs
  • Security architectures

Security Operations

  • Investigating support and requirements
  • Logging and monitoring activities
  • Provisioning of resources
  • Foundational security concepts
  • Resource protection techniques
  • Incident management
  • Preventative measures
  • Vulnerability management
  • Change management processes
  • Recovery strategies
  • Disaster recovery processes
  • Business continuity planning
  • Physical security
  • Personnel safety concerns

Software Development Security

  • Security in the software development lifecycle
  • Development environment security controls
  • Software security effectiveness
  • Acquired software security impact

Conclusion