Certified Information Systems Security Professional
Course ID : ISC2 CISSP
Duration In-class (в days) : 5 days
Duration Online : 5 days
Сurriculum : in-class, Virtual Instructor-Led Training - ONLINE
Overview
Accelerate your cybersecurity career with the CISSP certification. Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program.
With a CISSP, you validate your expertise and become an ISC2 member, unlocking a broad array of exclusive resources, educational tools and peer-to-peer networking opportunities.
Prove your skills, advance your career, help earn the salary you want and gain the support of a community of cybersecurity leaders here to support you throughout your career
Audience for this course
Information security (IS) executives/experts preparing for internationally recognized certification
Objective
Prerequisites for this course
-
- CompTIA Security+ or ISC2 SSCP certification or equivalent knowledge and skills in information security fundamentals
5 years of experience in information security in 2 or more domains, such as an ISACA Certified Information Systems Auditor; CompTIA CASP security systems architect; DRII ABCP business continuity management practitioner; GIAC GASF forensics specialist, etc. - CompTIA Security+ or ISC2 SSCP or equivalent knowledge and skills in information security fundamentals
5 years of experience in information security in 2 or more domains, such as an ISACA Certified Information Systems Auditor; security systems architect; CompTIA CASP security systems architect; DRII ABCP business continuity management practitioner; GIAC GASF forensics specialist, etc.
- CompTIA Security+ or ISC2 SSCP certification or equivalent knowledge and skills in information security fundamentals
Outcomes
Recognizes cybersecurity professionals with the knowledge, skills and abilities to lead an organization’s information security program.
Outline
1. Strategic management through principles and policies
2. Personnel safety and risk management concepts
3. Business continuity planning
4. Compliance with the requirements of laws and regulators
5. Protection of assets
6. Cryptography and symmetric cryptographic algorithms
7. Infrastructure of open keys and applications
8. Safety models, design and possibilities
9. Vulnerabilities, threats and countermeasures
10. Physical safety requirements
11. Safe network architecture and protection of its components Protection of communications and network attacks
12. Control and monitoring of access
13. Safety testing and inspection Safety of operations
14. Prevention and response to incidents
15. Disaster recovery planning
16. Investigations and ethics
17. Safe development ПО
18. Malicious code and application attacks