Objectives of the training
At the end of the course, participants will be able to apply the fundamentals of information systems security to improve the organization's management practices.Targeted audience
System and network administrators, IS security managers or any other person playing a role in IS security policy.Prerequisite
Basic knowledge of networks and operating systems as well as information security.Trainers
Course architecture
Module 1 - Security and Risk Management
- Principles of security governance
- Compliance
- Professional ethics
- Security in documentation
- Risk Management
- Threat Modeling
- Basics of a continuity plan
- Procurement strategy and practices
- Personnel Security Strategies
- Security training and awareness
- Asset Classification
- Information Protection
- Data Retention
- Data Security Control
- Secure Data Handling
- Security in an engineering cycle
- Security of system components
- Security models
- Enterprise security controls and countermeasures
- Information Security Capabilities
- Design and architecture of vulnerability mitigation solutions
- Mitigation of vulnerabilities in Embedded, Mobile, and Web-based devices
- Cryptographic concepts
- Cryptographic techniques
- Design of a secure physical environment
- Physical security implementation
- Security of network protocols
- Security of network components
- Security of communication channels
- Mitigation of network attacks
- Physical and logical access control
- Identification, authentication and authorization
- Identity as a Service
- Authorization mechanisms
- Mitigation of access control based attacks
- Testing system security controls
- Testing software security controls
- Security of a data collection process
- Audits
- Operational Security Concepts
- Physical security
- Personnel Security
- Personnel registration and tracking
- Preventive measures
- Resource procurement and protection
- Patch and threat management
- Change management
- Incident response
- Investigations
- Disaster Recovery Planning
- Disaster Recovery Strategies
- Disaster recovery implementation
- Security principles in the system life cycle
- Security principles in the software life cycle
- Database security in software development
- Security controls in a development environment
- Security assessment of software effectiveness
Pedagogical details
Training architecture
Examples and scenarios of exam questions, Explanations on the 8 fields of competence identified by ISC2.
Training Notes
The training does not include the exam to obtain the CISSP certification.
To obtain certification, ideally 5 years' experience is required in at least 2 of the following 8 areas of information security: Risk management / law and regulations; Asset management (data classification...); Security architecture and engineering; Network and communication; Identity and access management; Security testing and assessment; Security operations (incident management, investigations, backups, tool management); Application development. However, to pass the exam, this is not required.
Private or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quotePrivate or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quote