CISSP-Certified Information Systems Security Professional - Certification Preparation

Gain core knowledge and experience to successfully implement and manage security programs and prepare for the 2024 CISSP certification. This 2024 updated course is the most comprehensive review of information security concepts and industry best practices, focusing on the eight domains of the CISSP-CBK (Common Body of Knowledge) that are covered in the CISSP exam.

Description

Chapter 1 Security Governance Through Principles and Policies

  • Security 101
  • Understand and Apply Security Concepts
  • Security Boundaries
  • Evaluate and Apply Security Governance Principles
  • Manage the Security Function
  • Security Policy, Standards, Procedures, and Guidelines
  • Threat Modeling
  • Supply Chain Risk Management

Chapter 2 Personnel Security and Risk Management Concepts

  • Personnel Security Policies and Procedures
  • Understand and Apply Risk Management Concepts
  • Social Engineering
  • Establish and Maintain a Security Awareness, Education, and Training Program

Chapter 3 Business Continuity Planning

  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Analysis
  • Continuity Planning
  • Plan Approval and Implementation

Chapter 4 Laws, Regulations, and Compliance

  • Categories of Laws
  • Laws
  • State Privacy Laws
  • Compliance
  • Contracting and Procurement

Chapter 5 Protecting Security of Assets

  • Identifying and Classifying Information and Assets
  • Establishing Information and Asset Handling Requirements
  • Data Protection Methods
  • Understanding Data Roles
  • Using Security Baselines

Chapter 6 Cryptography and Symmetric Key Algorithms

  • Cryptographic Foundations
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Life Cycle

Chapter 7 PKI and Cryptographic Applications

  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Hybrid Cryptography
  • Applied Cryptography
  • Cryptographic Attacks

Chapter 8 Principles of Security Models, Design, and Capabilities

  • Secure Design Principles
  • Techniques for Ensuring CIA
  • Understand the Fundamental Concepts of Security Models
  • Select Controls Based on Systems Security Requirements
  • Understand Security Capabilities

Chapter 9 Security Vulnerabilities, Threats, and Countermeasures

  • Shared Responsibility
  • Data Localization and Data Sovereignty
  • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Client‐Based Systems
  • Server‐Based Systems
  • Industrial Control Systems
  • Distributed Systems
  • High‐Performance Computing (HPC) Systems
  • Real‐Time Operating Systems
  • Internet of Things
  • Edge and Fog Computing
  • Embedded Devices and Cyber‐Physical Systems
  • Microservices
  • Infrastructure as Code
  • Immutable Architecture
  • Virtualized Systems
  • Containerization
  • Mobile Devices
  • Essential Security Protection Mechanisms
  • Common Security Architecture Flaws and Issues

Chapter 10 Physical Security Requirements

  • Apply Security Principles to Site and Facility Design
  • Implement Site and Facility Security Controls
  • Implement and Manage Physical Security

Chapter 11 Secure Network Architecture and Components

  •  OSI Model
  • TCP/IP Model
  • Analyzing Network Traffic
  • Common Application Layer Protocols
  • Transport Layer Protocols
  • Domain Name System
  • Internet Protocol (IP) Networking
  • ARP Concerns
  • Secure Communication Protocols
  • Implications of Multilayer Protocols
  • Segmentation
  • Edge Networks
  • Wireless Networks
  • Satellite Communications
  • Cellular Networks
  • Content Distribution Networks (CDNs)
  • Secure Network Components

Chapter 12 Secure Communications and Network Attacks ·       

  • Protocol Security Mechanisms
  • Secure Voice Communications
  • Remote Access Security Management
  • Multimedia Collaboration
  • Monitoring and Management
  • Load Balancing
  • Manage Email Security
  • Virtual Private Network
  • Switching and Virtual LANs
  • Network Address Translation
  • Third‐Party Connectivity
  • Switching Technologies
  • WAN Technologies
  • Fiber‐Optic Links
  • Prevent or Mitigate Network Attacks

 Chapter 13 Managing Identity and Authentication

  • Controlling Access to Assets
  • The AAA Model
  • Implementing Identity Management
  • Managing the Identity and Access Provisioning Life Cycle

Chapter 14 Controlling and Monitoring Access

  • Comparing Access Control Models
  • Implementing Authentication Systems
  • Zero‐Trust Access Policy Enforcement
  • Understanding Access Control Attacks

Chapter 15 Security Assessment and Testing

  • Building a Security Assessment and Testing Program
  • Performing Vulnerability Assessments
  • Testing Your Software
  • Training and Exercises
  • Implementing Security Management Processes and Collecting Security Process Data

Chapter 16 Managing Security Operations

  • Apply Foundational Security Operations Concepts
  • Address Personnel Safety and Security
  • Provision Information and Assets Securely
  • Managed Services in the Cloud
  • Perform Configuration Management (CM)
  • Manage Change
  • Manage Patches and Reduce Vulnerabilities

Chapter 17 Preventing and Responding to Incidents

  • Conducting Incident Management
  • Implementing Detection and Preventive Measures
  • Logging and Monitoring
  • Automating Incident Response
  • Chapter 18 Disaster Recovery Planning
  • The Nature of Disaster
  • Understand System Resilience, High Availability, and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance
  • Chapter 19 Investigations and Ethics
  • Investigations
  • Major Categories of Computer Crime
  • Ethics

Chapter 20 Software Development Security

  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehousing
  • Storage Threats
  • Understanding Knowledge‐ Based Systems

Chapter 21 Malicious Code and Application Attacks

    • Malware
    • Malware Prevention
    • Application Attacks
    • Injection Vulnerabilities
    • Exploiting Authorization Vulnerabilities
    • Exploiting Web Application Vulnerabilities
    • Application Security Controls
    • Secure Coding Practices

 

Prerequisites

To be successful in this course, you should have a minimum of five years of experience working in IT Infrastructure and Cybersecurity.

Similar events

The Certified Information Security Manager (CISM) qualification is an international professional certification offered by ISACA for Information Security Managers. The certification recognises an individual's ability to design, implement and manage an information security programme.

More Information

The Practitioners Certificate in Information Assurance Architecture (PCIAA) course prepares the student for a career in security architecture. A Security Architect (SA) is a senior-level enterprise architect role, either within a dedicated security team or as part of a more general Enterprise Architecture (EA) team.

More Information

The Practitioner Certificate in Information Risk Management (PCiIRM) provides thorough guidance on building a business focused ISMS strategy. Demonstrate your ability to deliver a robust system in line with ISO 17799, ISO 27001 and BS 7799-3 standards and make sure you are up-to-date with UK legislation, as well as international frameworks. Over five days you will work with BCS qualified professionals, learning how to understand and prevent threats to data within specific technical business environments.

More Information

This introductory course is perfect for users who are looking to make a bigger impact with the way they report on data through visualisations. The course will be of particular benefit to team leaders, management at all levels, or anyone who needs to commission the production of reports or dashboards. Please note that this course does not cover PowerBI Pro, PowerBI accessed via Microsoft 365 or SharePoint Services.

More Information

This Power BI Data Analyst Training Course will discuss the various methods and best practices that align with business and technical requirements for modelling, visualising, and analysing data with Power BI. The course will also show how to access and process data from various sources, including relational and non-relational data.

More Information

NCSC Certified consultant training course will provide the latest understanding of the scope and requirements of the Cyber Essentials Standard. This will enable you to become a fully certified Cyber Essentials Consultant. The workshop-style training tasks and tips to ensure the participant leaves with practical knowledge to implement Cyber Essentials into businesses from within any industry and of any size.

More Information

This course is for Experienced Software Developers who are completely new to C++ programming or those with elementary skills in C++, who need to gain hands-on experience of developing commercial applications.

More Information

Our ITIL® 4 Foundation training course will enable you to understand a new way to look at IT Service Management (ITSM) through a Service Value System (SVS). Our ITIL® 4 Foundation training course will educate you on how to manage IT services and achieve business value within an enterprise. It is a widely accepted approach in IT Service Management (ITSM) and will introduce you to the core principles of ITIL® best practices and concepts.

More Information

CM2 is the global enterprise standard for enterprise change and configuration management and provides a comprehensive methodology for managing the configuration of a product, system, and/or service throughout its life. It provides the most robust framework and quality management platform for creating and maintaining a digital enterprise with complete end-to-end ecosystem traceability.

More Information

This course introduces the technology fundamentals of most SAP applications (incl. SAP S/4HANA and SAP Business Suite), how SAP systems function, as well as an introduction to different user interfaces, such as SAP Fiori or SAP GUI. The training contains hands-on exercises in an SAP S/4HANA system and other SAP applications. The course will also introduce learners to the SAP strategy and provides an overview of cloud topics.

More Information

This course provides you with fundamental knowledge on how to ensure a smooth operation of SAP systems running on Application Server ABAP (AS ABAP). AS ABAP is the technological foundation of SAP S/4HANA as well as SAP Business Suite systems. In this five-day training, you will learn how to perform various administrative tasks to keep the SAP system running.

More Information

This course provides learners with a thorough overview of the deployment options available with the GROW and RISE with SAP offerings, including the platforms, processes, services and tools available to them as a customer and/or an SAP implementer. The learner will explore Business Transformation as a Service, SAP Digital Discovery Assessment, sell and delivery qualifications (e.g. PartnerEdge), and the Partner Demonstration Landscape.

More Information

This course guides learners through the fundamental requirements and knowledge necessary for customer project team key users, IT Professionals, Solution Architects, and Project Managers who are beginning their journey into RISE with SAP S/4HANA Cloud, private edition implementations.

More Information

The Certified DPO training course enables you to develop the necessary knowledge, skills and competence to effectively implement and manage a compliance framework with regard to the protection of personal data.

More Information

This is the Adobe Authorised course for new users of Adobe Photoshop. Produce and edit images to meet professional industry standards.

More Information

Please register on any session showing, this will not be the date the course takes place. Upon registration your e-learning will then be booked and all of the log in details sent to you. You can undertake the training as soon as you have received this..

More Information

Learn everything you need to start working as a Systems Engineer. While saving you hours every week. Learn the full systems engineering product development lifecycle, understand all of the jargon and have confidence in producing deliverables on your project from Day 1.

More Information

The NIST Cybersecurity Framework 800-53 Practitioner course, is an overlay course, based on the NIST Cyber Security Framework, a publication of the National Institute of Standards and Technology.

More Information

The NIST Cybersecurity Framework Foundation course, is an overlay course, based on the NIST Cyber Security Framework (NIST-CSF), a publication of the National Institute of Standards and Technology.

More Information

This course is for Experienced C++ programmers, who are looking to gain advanced skills and programming techniques using C++

More Information

This course is an introduction to Python and its main data analysis libraries, Pandas and Matplotlib for delegates with some understanding of programming concepts. It is a two-part course, the first is an introduction to Python programming, the second introduces Python's data analysis tools. For the programming environment we use JupyterLab on the Anaconda platform. Anaconda is one of the most, if not the most, popular Data Science platforms.

More Information